<?xml version='1.0' encoding='UTF-8'?>
<nvd xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://nvd.nist.gov/feeds/cve/1.2" nvd_xml_version="1.2" pub_date="2019-10-11" xsi:schemaLocation="http://nvd.nist.gov/feeds/cve/1.2 https://scap.nist.gov/schema/nvd/nvd-cve-feed_1.2.1.xsd">
  <entry type="CVE" name="CVE-2008-0001" seq="2008-0001" published="2008-01-15" modified="2018-10-15" severity="Low" CVSS_version="2.0" CVSS_score="3.6" CVSS_base_score="3.6" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:P)">
    <desc>
      <descript source="cve">VFS in the Linux kernel before 2.6.22.16, and 2.6.23.x before 2.6.23.14, performs tests of access mode by using the flag variable instead of the acc_mode variable, which might allow local users to bypass intended permissions and remove directories.</descript>
    </desc>
    <loss_types>
      <avail/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=974a9f0b47da74e28f68b9c8645c3786aa5ace1a">http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=974a9f0b47da74e28f68b9c8645c3786aa5ace1a</ref>
      <ref source="CONFIRM" url="http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22.16">http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22.16</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00002.html">SUSE-SA:2008:006</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.html">SUSE-SA:2008:013</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2008-0055.html">RHSA-2008:0055</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019289">1019289</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0021">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0021</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1479">DSA-1479</ref>
      <ref source="CONFIRM" url="http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.23.14">http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.23.14</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:044">MDVSA-2008:044</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:112">MDVSA-2008:112</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0089.html">RHSA-2008:0089</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486485/100/0/threaded">20080117 rPSA-2008-0021-1 kernel</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27280" patch="1">27280</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-574-1">USN-574-1</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-578-1">USN-578-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0151" adv="1">ADV-2008-0151</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39672">linux-directory-security-bypass(39672)</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2146">https://issues.rpath.com/browse/RPL-2146</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9709">oval:org.mitre.oval:def:9709</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00828.html">FEDORA-2008-0748</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.6.0"/>
        <vers num="2.6.1"/>
        <vers num="2.6.2"/>
        <vers num="2.6.3"/>
        <vers num="2.6.4"/>
        <vers num="2.6.5"/>
        <vers num="2.6.6"/>
        <vers num="2.6.7"/>
        <vers num="2.6.8"/>
        <vers num="2.6.8.1"/>
        <vers num="2.6.9" edition="rc1"/>
        <vers num="2.6.9" edition="rc2"/>
        <vers num="2.6.9" edition="rc3"/>
        <vers num="2.6.9" edition="rc4"/>
        <vers num="2.6.10"/>
        <vers num="2.6.11"/>
        <vers num="2.6.11.1"/>
        <vers num="2.6.11.2"/>
        <vers num="2.6.11.3"/>
        <vers num="2.6.11.4"/>
        <vers num="2.6.11.5"/>
        <vers num="2.6.11.6"/>
        <vers num="2.6.11.7"/>
        <vers num="2.6.11.8"/>
        <vers num="2.6.11.9"/>
        <vers num="2.6.11.10"/>
        <vers num="2.6.11.11"/>
        <vers num="2.6.11.12"/>
        <vers num="2.6.12"/>
        <vers num="2.6.12.1"/>
        <vers num="2.6.12.2"/>
        <vers num="2.6.12.3"/>
        <vers num="2.6.12.4"/>
        <vers num="2.6.12.5"/>
        <vers num="2.6.12.6"/>
        <vers num="2.6.13"/>
        <vers num="2.6.13.1"/>
        <vers num="2.6.13.2"/>
        <vers num="2.6.13.3"/>
        <vers num="2.6.13.4"/>
        <vers num="2.6.13.5"/>
        <vers num="2.6.14"/>
        <vers num="2.6.14.1"/>
        <vers num="2.6.14.2"/>
        <vers num="2.6.14.3"/>
        <vers num="2.6.14.4"/>
        <vers num="2.6.14.5"/>
        <vers num="2.6.14.6"/>
        <vers num="2.6.14.7"/>
        <vers num="2.6.15"/>
        <vers num="2.6.15.1"/>
        <vers num="2.6.15.2"/>
        <vers num="2.6.15.3"/>
        <vers num="2.6.15.4"/>
        <vers num="2.6.15.5"/>
        <vers num="2.6.15.6"/>
        <vers num="2.6.15.7"/>
        <vers num="2.6.16" edition="rc1"/>
        <vers num="2.6.16.1"/>
        <vers num="2.6.16.2"/>
        <vers num="2.6.16.3"/>
        <vers num="2.6.16.4"/>
        <vers num="2.6.16.5"/>
        <vers num="2.6.16.6"/>
        <vers num="2.6.16.7"/>
        <vers num="2.6.16.8"/>
        <vers num="2.6.16.9"/>
        <vers num="2.6.16.10"/>
        <vers num="2.6.16.11"/>
        <vers num="2.6.16.12"/>
        <vers num="2.6.16.13"/>
        <vers num="2.6.16.14"/>
        <vers num="2.6.16.15"/>
        <vers num="2.6.16.16"/>
        <vers num="2.6.16.17"/>
        <vers num="2.6.16.18"/>
        <vers num="2.6.16.19"/>
        <vers num="2.6.16.20"/>
        <vers num="2.6.16.21"/>
        <vers num="2.6.16.22"/>
        <vers num="2.6.16.23"/>
        <vers num="2.6.16.24"/>
        <vers num="2.6.16.25"/>
        <vers num="2.6.16.26"/>
        <vers num="2.6.16.27"/>
        <vers num="2.6.16.28"/>
        <vers num="2.6.16.29"/>
        <vers num="2.6.16.30"/>
        <vers num="2.6.16.31" edition="-rc1"/>
        <vers num="2.6.16.31" edition="-rc2"/>
        <vers num="2.6.16.31" edition="-rc3"/>
        <vers num="2.6.16.31" edition="-rc4"/>
        <vers num="2.6.16.31" edition="-rc5"/>
        <vers num="2.6.16.32"/>
        <vers num="2.6.16.33"/>
        <vers num="2.6.16.34"/>
        <vers num="2.6.16.35"/>
        <vers num="2.6.16.36"/>
        <vers num="2.6.16.37"/>
        <vers num="2.6.16.38"/>
        <vers num="2.6.16.39"/>
        <vers num="2.6.16.40"/>
        <vers num="2.6.16.41"/>
        <vers num="2.6.16.42"/>
        <vers num="2.6.16.43"/>
        <vers num="2.6.16.44"/>
        <vers num="2.6.16.45"/>
        <vers num="2.6.16.46"/>
        <vers num="2.6.16.47"/>
        <vers num="2.6.16.48"/>
        <vers num="2.6.16.49"/>
        <vers num="2.6.16.50"/>
        <vers num="2.6.16.51"/>
        <vers num="2.6.16.52"/>
        <vers num="2.6.16.53"/>
        <vers num="2.6.16.54"/>
        <vers num="2.6.16.55"/>
        <vers num="2.6.16.56"/>
        <vers num="2.6.16.57"/>
        <vers num="2.6.16.58"/>
        <vers num="2.6.16.59"/>
        <vers num="2.6.16.60"/>
        <vers num="2.6.16.61"/>
        <vers num="2.6.16.62"/>
        <vers num="2.6.17" edition="rc1"/>
        <vers num="2.6.17" edition="rc2"/>
        <vers num="2.6.17" edition="rc3"/>
        <vers num="2.6.17" edition="rc4"/>
        <vers num="2.6.17" edition="rc5"/>
        <vers num="2.6.17" edition="rc6"/>
        <vers num="2.6.17.1"/>
        <vers num="2.6.17.2"/>
        <vers num="2.6.17.3"/>
        <vers num="2.6.17.4"/>
        <vers num="2.6.17.5"/>
        <vers num="2.6.17.6"/>
        <vers num="2.6.17.7"/>
        <vers num="2.6.17.8"/>
        <vers num="2.6.17.9"/>
        <vers num="2.6.17.10"/>
        <vers num="2.6.17.11"/>
        <vers num="2.6.17.12"/>
        <vers num="2.6.17.13"/>
        <vers num="2.6.17.14"/>
        <vers num="2.6.18" edition="rc1"/>
        <vers num="2.6.18" edition="rc2"/>
        <vers num="2.6.18" edition="rc3"/>
        <vers num="2.6.18" edition="rc4"/>
        <vers num="2.6.18" edition="rc5"/>
        <vers num="2.6.18" edition="rc6"/>
        <vers num="2.6.18" edition="rc7"/>
        <vers num="2.6.18.1"/>
        <vers num="2.6.18.2"/>
        <vers num="2.6.18.3"/>
        <vers num="2.6.18.4"/>
        <vers num="2.6.18.5"/>
        <vers num="2.6.18.6"/>
        <vers num="2.6.18.7"/>
        <vers num="2.6.18.8"/>
        <vers num="2.6.19"/>
        <vers num="2.6.19.1"/>
        <vers num="2.6.19.2"/>
        <vers num="2.6.19.3"/>
        <vers num="2.6.19.4"/>
        <vers num="2.6.19.5"/>
        <vers num="2.6.19.6"/>
        <vers num="2.6.19.7"/>
        <vers num="2.6.20"/>
        <vers num="2.6.20.1"/>
        <vers num="2.6.20.2"/>
        <vers num="2.6.20.3"/>
        <vers num="2.6.20.4"/>
        <vers num="2.6.20.5"/>
        <vers num="2.6.20.6"/>
        <vers num="2.6.20.7"/>
        <vers num="2.6.20.8"/>
        <vers num="2.6.20.9"/>
        <vers num="2.6.20.10"/>
        <vers num="2.6.20.11"/>
        <vers num="2.6.20.12"/>
        <vers num="2.6.20.13"/>
        <vers num="2.6.20.14"/>
        <vers num="2.6.20.15"/>
        <vers num="2.6.20.16"/>
        <vers num="2.6.20.17"/>
        <vers num="2.6.20.18"/>
        <vers num="2.6.20.19"/>
        <vers num="2.6.20.20"/>
        <vers num="2.6.20.21"/>
        <vers num="2.6.21"/>
        <vers num="2.6.21.1"/>
        <vers num="2.6.21.2"/>
        <vers num="2.6.21.3"/>
        <vers num="2.6.21.4"/>
        <vers num="2.6.21.5"/>
        <vers num="2.6.21.6"/>
        <vers num="2.6.21.7"/>
        <vers num="2.6.22"/>
        <vers num="2.6.22.1"/>
        <vers num="2.6.22.2"/>
        <vers num="2.6.22.3"/>
        <vers num="2.6.22.4"/>
        <vers num="2.6.22.5"/>
        <vers num="2.6.22.6"/>
        <vers num="2.6.22.7"/>
        <vers num="2.6.22.8"/>
        <vers num="2.6.22.9"/>
        <vers num="2.6.22.10"/>
        <vers num="2.6.22.11"/>
        <vers num="2.6.22.12"/>
        <vers num="2.6.22.13"/>
        <vers num="2.6.22.14"/>
        <vers num="2.6.22.15" prev="1"/>
        <vers num="2.6.23" edition="rc1"/>
        <vers num="2.6.23" edition="rc2"/>
        <vers num="2.6.23.1"/>
        <vers num="2.6.23.2"/>
        <vers num="2.6.23.3"/>
        <vers num="2.6.23.4"/>
        <vers num="2.6.23.5"/>
        <vers num="2.6.23.6"/>
        <vers num="2.6.23.7"/>
        <vers num="2.6.23.8"/>
        <vers num="2.6.23.9"/>
        <vers num="2.6.23.10"/>
        <vers num="2.6.23.11"/>
        <vers num="2.6.23.12"/>
        <vers num="2.6.23.13"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0002" seq="2008-0002" published="2008-02-11" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.8" CVSS_base_score="5.8" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Apache Tomcat 6.0.0 through 6.0.15 processes parameters in the context of the wrong request when an exception occurs during parameter processing, which might allow remote attackers to obtain sensitive information, as demonstrated by disconnecting during this processing in order to trigger the exception.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html">APPLE-SA-2008-10-09</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html">SUSE-SR:2009:004</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=139344343412337&amp;w=2">HPSBST02955</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200804-10.xml">GLSA-200804-10</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3638">3638</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3216">http://support.apple.com/kb/HT3216</ref>
      <ref source="CONFIRM" url="http://tomcat.apache.org/security-6.html">http://tomcat.apache.org/security-6.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487812/100/0/threaded">20080208 CVE-2008-0002: Tomcat information disclosure vulnerability</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/507985/100/0/threaded">20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27703">27703</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/31681">31681</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2009-0016.html">http://www.vmware.com/security/advisories/VMSA-2009-0016.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0488">ADV-2008-0488</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2780">ADV-2008-2780</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/3316">ADV-2009-3316</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00315.html">FEDORA-2008-1467</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00460.html">FEDORA-2008-1603</ref>
    </refs>
    <vuln_soft>
      <prod name="tomcat" vendor="apache">
        <vers num="6.0.5"/>
        <vers num="6.0.6"/>
        <vers num="6.0.7"/>
        <vers num="6.0.8"/>
        <vers num="6.0.9"/>
        <vers num="6.0.10"/>
        <vers num="6.0.11"/>
        <vers num="6.0.12"/>
        <vers num="6.0.13"/>
        <vers num="6.0.14"/>
        <vers num="6.0.15"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0003" seq="2008-0003" published="2008-01-08" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the PAMBasicAuthenticator::PAMCallback function in OpenPegasus CIM management server (tog-pegasus), when compiled to use PAM and without PEGASUS_USE_PAM_STANDALONE_PROC defined, might allow remote attackers to execute arbitrary code via unknown vectors, a different vulnerability than CVE-2007-5360.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01438409">HPSBMA02331</ref>
      <ref source="MLIST" url="http://lists.vmware.com/pipermail/security-announce/2008/000014.html">[Security-announce] 20080415 VMSA-2008-0007 Moderate Updated Service Console packages pcre, net-snmp, and OpenPegasus</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019159">1019159</ref>
      <ref source="VIM" url="http://www.attrition.org/pipermail/vim/2008-January/001879.html">20080115 vuldb confusion between OpenPegasus issues</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0002.html" patch="1">RHSA-2008:0002</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490917/100/0/threaded">20080416 VMSA-2008-0007 Moderate Updated Service Console packages pcre, net-snmp, and OpenPegasus</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27172">27172</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27188" patch="1">27188</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0063" adv="1">ADV-2008-0063</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0638" adv="1">ADV-2008-0638</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1234/references" adv="1">ADV-2008-1234</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1391/references" adv="1">ADV-2008-1391</ref>
      <ref source="CONFIRM" url="http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4129">http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4129</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=426578">https://bugzilla.redhat.com/show_bug.cgi?id=426578</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39527">openpegasus-pambasic-bo(39527)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10282">oval:org.mitre.oval:def:10282</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00424.html">FEDORA-2008-0506</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00480.html">FEDORA-2008-0572</ref>
    </refs>
    <vuln_soft>
      <prod name="management_server" vendor="openpegasus">
        <vers num="2.6.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0004" seq="2008-0004" published="2009-03-26" modified="2009-03-26" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was withdrawn by its CNA.  Further investigation showed that it was not a security issue.  Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2008-0005" seq="2008-0005" published="2008-01-11" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">mod_proxy_ftp in Apache 2.2.x before 2.2.7-dev, 2.0.x before 2.0.62-dev, and 1.3.x before 1.3.40-dev does not define a charset, which allows remote attackers to conduct cross-site scripting (XSS) attacks using UTF-7 encoding.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307562">http://docs.info.apple.com/article.html?artnum=307562</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html">APPLE-SA-2008-03-18</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00004.html">SUSE-SA:2008:021</ref>
      <ref source="MLIST" url="http://lists.vmware.com/pipermail/security-announce/2009/000062.html">[security-announce] 20090820 VMSA-2009-0010 VMware Hosted products update libpng and Apache HTTP Server</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=124654546101607&amp;w=2">SSRT090085</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=125631037611762&amp;w=2">HPSBUX02465</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=130497311408250&amp;w=2">SSRT090208</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200803-19.xml">GLSA-200803-19</ref>
      <ref source="SREASONRES" url="http://securityreason.com/achievement_securityalert/49">20080110 Apache (mod_proxy_ftp) Undefined Charset UTF-7 XSS Vulnerability</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3526">3526</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2008-032.htm">http://support.avaya.com/elmodocs2/security/ASA-2008-032.htm</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:014">MDVSA-2008:014</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:015">MDVSA-2008:015</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:016">MDVSA-2008:016</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0004.html">RHSA-2008:0004</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0005.html">RHSA-2008:0005</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0006.html">RHSA-2008:0006</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0007.html">RHSA-2008:0007</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0008.html">RHSA-2008:0008</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0009.html">RHSA-2008:0009</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486167/100/0/threaded">20080110 SecurityReason - Apache (mod_proxy_ftp) Undefined Charset UTF-7 XSS Vulnerability</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/505990/100/0/threaded">20090821 VMSA-2009-0010 VMware Hosted products update libpng and Apache HTTP Server</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27234">27234</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019185">1019185</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-575-1">USN-575-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0924/references">ADV-2008-0924</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1875/references">ADV-2008-1875</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39615">apache-modproxyftp-utf7-xss(39615)</ref>
      <ref source="MLIST" url="https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.httpd.apache.org%3E">[httpd-cvs] 20190815 svn commit: r1048742 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html</ref>
      <ref source="MLIST" url="https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.httpd.apache.org%3E">[httpd-cvs] 20190815 svn commit: r1048743 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10812">oval:org.mitre.oval:def:10812</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00541.html">FEDORA-2008-1711</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00562.html">FEDORA-2008-1695</ref>
    </refs>
    <vuln_soft>
      <prod name="http_server" vendor="apache">
        <vers num="1.3"/>
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0006" seq="2008-0006" published="2008-01-18" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in (1) X.Org Xserver before 1.4.1, and (2) the libfont and libXfont libraries on some platforms including Sun Solaris, allows context-dependent attackers to execute arbitrary code via a PCF font with a large difference between the last col and first col values in the PCF_BDF_ENCODINGS table.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.gentoo.org/show_bug.cgi?id=204362">http://bugs.gentoo.org/show_bug.cgi?id=204362</ref>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307562">http://docs.info.apple.com/article.html?artnum=307562</ref>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01543321">SSRT080083</ref>
      <ref source="JVN" url="http://jvn.jp/en/jp/JVN88935101/index.html">JVN#88935101</ref>
      <ref source="JVNDB" url="http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-001043.html">JVNDB-2008-001043</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html">APPLE-SA-2008-03-18</ref>
      <ref source="MLIST" url="http://lists.freedesktop.org/archives/xorg/2008-January/031918.html" patch="1">[xorg] 20080117 X.Org security advisory: multiple vulnerabilities in the X server</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00004.html">SUSE-SA:2008:003</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00005.html">SUSE-SR:2008:008</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200801-09.xml">GLSA-200801-09</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200804-05.xml">GLSA-200804-05</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019232">1019232</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-103192-1" patch="1">103192</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-201230-1">201230</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2008-038.htm">http://support.avaya.com/elmodocs2/security/ASA-2008-038.htm</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2008-077.htm">http://support.avaya.com/elmodocs2/security/ASA-2008-077.htm</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml">GLSA-200805-07</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:021">MDVSA-2008:021</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:022">MDVSA-2008:022</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:024">MDVSA-2008:024</ref>
      <ref source="OPENBSD" url="http://www.openbsd.org/errata41.html#012_xorg">[4.1] 20080208 012: SECURITY FIX: February 8, 2008</ref>
      <ref source="OPENBSD" url="http://www.openbsd.org/errata42.html#006_xorg">[4.2] 20080208 006: SECURITY FIX: February 8, 2008</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0029.html">RHSA-2008:0029</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0030.html">RHSA-2008:0030</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0064.html">RHSA-2008:0064</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487335/100/0/threaded">20080130 rPSA-2008-0032-1 xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27336" patch="1">27336</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27352">27352</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0179">ADV-2008-0179</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0184">ADV-2008-0184</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0497/references">ADV-2008-0497</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0703">ADV-2008-0703</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0924/references">ADV-2008-0924</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/3000">ADV-2008-3000</ref>
      <ref source="CONFIRM" url="http://www14.software.ibm.com/webapp/set2/subscriptions/ijhifoeblist?mode=7&amp;heading=AIX61&amp;path=/200802/SECURITY/20080227/datafile112539&amp;label=AIX%20X%20server%20multiple%20vulnerabilities">http://www14.software.ibm.com/webapp/set2/subscriptions/ijhifoeblist?mode=7&amp;heading=AIX61&amp;path=/200802/SECURITY/20080227/datafile112539&amp;label=AIX%20X%20server%20multiple%20vulnerabilities</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=428044">https://bugzilla.redhat.com/show_bug.cgi?id=428044</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39767">xorg-pcffont-bo(39767)</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2010">https://issues.rpath.com/browse/RPL-2010</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10021">oval:org.mitre.oval:def:10021</ref>
      <ref source="UBUNTU" url="https://usn.ubuntu.com/571-1/">USN-571-1</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00641.html">FEDORA-2008-0760</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00674.html">FEDORA-2008-0794</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00704.html">FEDORA-2008-0831</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00771.html">FEDORA-2008-0891</ref>
    </refs>
    <vuln_soft>
      <prod name="solaris_libfont" vendor="sun">
        <vers num=""/>
      </prod>
      <prod name="solaris_libxfont" vendor="sun">
        <vers num=""/>
      </prod>
      <prod name="xserver" vendor="x.org">
        <vers num="1.4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0007" seq="2008-0007" published="2008-02-07" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Linux kernel before 2.6.22.17, when using certain drivers that register a fault handler that does not perform range checks, allows local users to access kernel memory via an out-of-range offset.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00002.html">SUSE-SA:2008:006</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00007.html">SUSE-SA:2008:017</ref>
      <ref source="MLIST" url="http://lists.vmware.com/pipermail/security-announce/2008/000023.html">[Security-announce] 20080728 VMSA-2008-00011 Updated ESX service console packages for Samba and vmnix</ref>
      <ref source="MLIST" url="http://lkml.org/lkml/2008/2/6/457">[linux-kernel] 20080206 [patch 60/73] vm audit: add VM_DONTEXPAND to mmap for drivers that need it (CVE-2008-0007)</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019357">1019357</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0048">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0048</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1503">DSA-1503</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1504">DSA-1504</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1565">DSA-1565</ref>
      <ref source="CONFIRM" url="http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22.17">http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22.17</ref>
      <ref source="CONFIRM" url="http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.24.1">http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.24.1</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:044">MDVSA-2008:044</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:072">MDVSA-2008:072</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:112">MDVSA-2008:112</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:174">MDVSA-2008:174</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0211.html">RHSA-2008:0211</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0233.html">RHSA-2008:0233</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0237.html">RHSA-2008:0237</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0787.html">RHSA-2008:0787</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487808/100/0/threaded">20080208 rPSA-2008-0048-1 kernel</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27686">27686</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27705">27705</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-618-1">USN-618-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0445/references">ADV-2008-0445</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2222/references">ADV-2008-2222</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9412">oval:org.mitre.oval:def:9412</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.6.22.16" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0008" seq="2008-0008" published="2008-01-28" modified="2017-07-28" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The pa_drop_root function in PulseAudio 0.9.8, and a certain 0.9.9 build, does not check return values from (1) setresuid, (2) setreuid, (3) setuid, and (4) seteuid calls when attempting to drop privileges, which might allow local users to gain privileges by causing those calls to fail via attacks such as resource exhaustion.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.gentoo.org/show_bug.cgi?id=207214">http://bugs.gentoo.org/show_bug.cgi?id=207214</ref>
      <ref source="CONFIRM" url="http://pulseaudio.org/changeset/2100">http://pulseaudio.org/changeset/2100</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200802-07.xml">GLSA-200802-07</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1476">DSA-1476</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:027">MDVSA-2008:027</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27449">27449</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-573-1">USN-573-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0283" adv="1">ADV-2008-0283</ref>
      <ref source="CONFIRM" url="https://bugzilla.novell.com/show_bug.cgi?id=347822">https://bugzilla.novell.com/show_bug.cgi?id=347822</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=425481">https://bugzilla.redhat.com/show_bug.cgi?id=425481</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39992">pulseaudio-padroproot-privilege-escalation(39992)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00852.html">FEDORA-2008-0963</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00869.html">FEDORA-2008-0994</ref>
    </refs>
    <vuln_soft>
      <prod name="pulseaudio" vendor="pulseaudio">
        <vers num="0.9.6"/>
        <vers num="0.9.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0009" seq="2008-0009" published="2008-02-12" modified="2018-10-15" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The vmsplice_to_user function in fs/splice.c in the Linux kernel 2.6.22 through 2.6.24 does not validate a certain userspace pointer before dereference, which might allow local users to access arbitrary kernel memory locations.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MISC" url="http://isec.pl/vulnerabilities/isec-0026-vmsplice_to_kernel.txt">http://isec.pl/vulnerabilities/isec-0026-vmsplice_to_kernel.txt</ref>
      <ref source="CONFIRM" url="http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.24.1">http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.24.1</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487982/100/0/threaded">20080212 CSA-L03: Linux kernel vmsplice unchecked user-pointer dereference</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27704">27704</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27799">27799</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0487/references">ADV-2008-0487</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=431206">https://bugzilla.redhat.com/show_bug.cgi?id=431206</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00254.html">FEDORA-2008-1422</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00255.html">FEDORA-2008-1423</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.6.22" edition="rc6"/>
        <vers num="2.6.22.1"/>
        <vers num="2.6.22.3"/>
        <vers num="2.6.22.4"/>
        <vers num="2.6.22.5"/>
        <vers num="2.6.22.6"/>
        <vers num="2.6.22.7"/>
        <vers num="2.6.22.16"/>
        <vers num="2.6.23" edition="rc1"/>
        <vers num="2.6.23" edition="rc2"/>
        <vers num="2.6.23.1"/>
        <vers num="2.6.23.2"/>
        <vers num="2.6.23.3"/>
        <vers num="2.6.23.4"/>
        <vers num="2.6.23.5"/>
        <vers num="2.6.23.6"/>
        <vers num="2.6.23.7"/>
        <vers num="2.6.23.9"/>
        <vers num="2.6.23.14"/>
        <vers num="2.6.24" edition="rc2"/>
        <vers num="2.6.24" edition="rc3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0010" seq="2008-0010" published="2008-02-12" modified="2018-10-15" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The copy_from_user_mmap_sem function in fs/splice.c in the Linux kernel 2.6.22 through 2.6.24 does not validate a certain userspace pointer before dereference, which allow local users to read from arbitrary kernel memory locations.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MISC" url="http://isec.pl/vulnerabilities/isec-0026-vmsplice_to_kernel.txt">http://isec.pl/vulnerabilities/isec-0026-vmsplice_to_kernel.txt</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1494">DSA-1494</ref>
      <ref source="CONFIRM" url="http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.24.1">http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.24.1</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487982/100/0/threaded">20080212 CSA-L03: Linux kernel vmsplice unchecked user-pointer dereference</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27704">27704</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27796">27796</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0487/references">ADV-2008-0487</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5093">5093</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00254.html">FEDORA-2008-1422</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00255.html">FEDORA-2008-1423</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.6.22" edition="rc6"/>
        <vers num="2.6.22.1"/>
        <vers num="2.6.22.3"/>
        <vers num="2.6.22.4"/>
        <vers num="2.6.22.5"/>
        <vers num="2.6.22.6"/>
        <vers num="2.6.22.7"/>
        <vers num="2.6.22.16"/>
        <vers num="2.6.23" edition="rc1"/>
        <vers num="2.6.23" edition="rc2"/>
        <vers num="2.6.23.1"/>
        <vers num="2.6.23.2"/>
        <vers num="2.6.23.3"/>
        <vers num="2.6.23.4"/>
        <vers num="2.6.23.5"/>
        <vers num="2.6.23.6"/>
        <vers num="2.6.23.7"/>
        <vers num="2.6.23.9"/>
        <vers num="2.6.23.14"/>
        <vers num="2.6.24" edition="rc2"/>
        <vers num="2.6.24" edition="rc3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0011" seq="2008-0011" published="2008-06-11" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Microsoft DirectX 8.1 through 9.0c, and DirectX on Microsoft XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008, does not properly perform MJPEG error checking, which allows remote attackers to execute arbitrary code via a crafted MJPEG stream in a (1) AVI or (2) ASF file, aka the "MJPEG Decoder Vulnerability."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=121380194923597&amp;w=2">HPSBST02344</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020222" patch="1">1020222</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29581" patch="1">29581</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-162B.html" adv="1">TA08-162B</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1780">ADV-2008-1780</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-033">MS08-033</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5236">oval:org.mitre.oval:def:5236</ref>
    </refs>
    <vuln_soft>
      <prod name="directx" vendor="microsoft">
        <vers num="7.0"/>
        <vers num="8.1"/>
        <vers num="9.0"/>
        <vers num="10.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0012" seq="2008-0012" published="2008-11-17" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in an unspecified procedure in Trend Micro ServerProtect 5.7 and 5.58 allows remote attackers to execute arbitrary code via unknown vectors, possibly related to the product's configuration, a different vulnerability than CVE-2008-0013 and CVE-2008-0014.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://blogs.iss.net/archive/trend.html">http://blogs.iss.net/archive/trend.html</ref>
      <ref source="ISS" url="http://www.iss.net/threats/310.html">20081111 Trend Micro ServerProtect [PROCEDURE NAME REDACTED] Heap Overflows (3)</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/768681">VU#768681</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/32261">32261</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/3127">ADV-2008-3127</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39918">application-rpc-config1-bo(39918)</ref>
    </refs>
    <vuln_soft>
      <prod name="serverprotect" vendor="trend_micro">
        <vers num="5.7"/>
        <vers num="5.58"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0013" seq="2008-0013" published="2008-11-17" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in an unspecified procedure in Trend Micro ServerProtect 5.7 and 5.58 allows remote attackers to execute arbitrary code via unknown vectors, possibly related to the product's configuration, a different vulnerability than CVE-2008-0012 and CVE-2008-0014.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://blogs.iss.net/archive/trend.html">http://blogs.iss.net/archive/trend.html</ref>
      <ref source="ISS" url="http://www.iss.net/threats/310.html">20081111 Trend Micro ServerProtect [PROCEDURE NAME REDACTED] Heap Overflows (3)</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/768681">VU#768681</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/32261">32261</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/3127">ADV-2008-3127</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39919">application-rpc-config2-bo(39919)</ref>
    </refs>
    <vuln_soft>
      <prod name="serverprotect" vendor="trend_micro">
        <vers num="5.7"/>
        <vers num="5.58"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0014" seq="2008-0014" published="2008-11-17" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in an unspecified procedure in Trend Micro ServerProtect 5.7 and 5.58 allows remote attackers to execute arbitrary code via unknown vectors, possibly related to the product's configuration, a different vulnerability than CVE-2008-0012 and CVE-2008-0013.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://blogs.iss.net/archive/trend.html">http://blogs.iss.net/archive/trend.html</ref>
      <ref source="ISS" url="http://www.iss.net/threats/310.html">20081111 Trend Micro ServerProtect [PROCEDURE NAME REDACTED] Heap Overflows (3)</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/768681">VU#768681</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/32261">32261</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/3127">ADV-2008-3127</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39920">application-rpc-config3-bo(39920)</ref>
    </refs>
    <vuln_soft>
      <prod name="serverprotect" vendor="trend_micro">
        <vers num="5.7"/>
        <vers num="5.58"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0015" seq="2008-0015" published="2009-07-07" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the CComVariant::ReadFromStream function in the Active Template Library (ATL), as used in the MPEG2TuneRequest ActiveX control in msvidctl.dll in DirectShow, in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allows remote attackers to execute arbitrary code via a crafted web page, as exploited in the wild in July 2009, aka "Microsoft Video ActiveX Control Vulnerability."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://blogs.technet.com/srd/archive/2009/08/11/ms09-037-why-we-are-using-cve-s-already-used-in-ms09-035.aspx">http://blogs.technet.com/srd/archive/2009/08/11/ms09-037-why-we-are-using-cve-s-already-used-in-ms09-035.aspx</ref>
      <ref source="MISC" url="http://isc.sans.org/diary.html?storyid=6733">http://isc.sans.org/diary.html?storyid=6733</ref>
      <ref source="MISC" url="http://www.csis.dk/dk/nyheder/nyheder.asp?tekstID=799">http://www.csis.dk/dk/nyheder/nyheder.asp?tekstID=799</ref>
      <ref source="ISS" url="http://www.iss.net/threats/329.html">20090706 Multiple Microsoft Video Control ActiveX Remote Code Execution Vulnerabilities</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/180513">VU#180513</ref>
      <ref source="CONFIRM" url="http://www.microsoft.com/technet/security/advisory/972890.mspx" adv="1">http://www.microsoft.com/technet/security/advisory/972890.mspx</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/35558">35558</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/35585">35585</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1022514">1022514</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA09-187A.html">TA09-187A</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA09-195A.html">TA09-195A</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA09-223A.html">TA09-223A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/2232">ADV-2009-2232</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-032">MS09-032</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-037">MS09-037</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6333">oval:org.mitre.oval:def:6333</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6363">oval:org.mitre.oval:def:6363</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7436">oval:org.mitre.oval:def:7436</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_2003_server" vendor="microsoft">
        <vers num="-" edition="sp2:itanium"/>
        <vers num="-" edition="sp2:x64"/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition="sp2:professional_x64"/>
        <vers num="-" edition="sp2"/>
        <vers num="-" edition="sp3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0016" seq="2008-0016" published="2008-09-24" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the URL parsing implementation in Mozilla Firefox before 2.0.0.17 and SeaMonkey before 1.1.12 allows remote attackers to execute arbitrary code via a crafted UTF-8 URL in a link.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://download.novell.com/Download?buildid=WZXONb-tqBw~">http://download.novell.com/Download?buildid=WZXONb-tqBw~</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00005.html">SUSE-SA:2008:050</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.379422">SSA:2008-269-02</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.405232">SSA:2008-269-01</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.412123">SSA:2008-270-01</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1">256408</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1649">DSA-1649</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1669">DSA-1669</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2009/dsa-1696">DSA-1696</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2009/dsa-1697">DSA-1697</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:205">MDVSA-2008:205</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:206">MDVSA-2008:206</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/security/announce/2008/mfsa2008-37.html">http://www.mozilla.org/security/announce/2008/mfsa2008-37.html</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0882.html">RHSA-2008:0882</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0908.html">RHSA-2008:0908</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/31397">31397</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020913">1020913</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-645-1">USN-645-1</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-645-2">USN-645-2</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2661">ADV-2008-2661</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/0977">ADV-2009-0977</ref>
      <ref source="CONFIRM" url="https://bugzilla.mozilla.org/show_bug.cgi?id=443288" patch="1">https://bugzilla.mozilla.org/show_bug.cgi?id=443288</ref>
      <ref source="CONFIRM" url="https://bugzilla.mozilla.org/show_bug.cgi?id=451617">https://bugzilla.mozilla.org/show_bug.cgi?id=451617</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11579">oval:org.mitre.oval:def:11579</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01384.html">FEDORA-2008-8401</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01403.html">FEDORA-2008-8429</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="0.8"/>
        <vers num="0.9" edition="rc"/>
        <vers num="0.9.1"/>
        <vers num="0.9.2"/>
        <vers num="0.9.3"/>
        <vers num="0.9_rc"/>
        <vers num="0.10"/>
        <vers num="0.10.1"/>
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.4"/>
        <vers num="1.0.5"/>
        <vers num="1.0.6"/>
        <vers num="1.0.7"/>
        <vers num="1.0.8"/>
        <vers num="1.5" edition="beta1"/>
        <vers num="1.5" edition="beta2"/>
        <vers num="1.5.0.1"/>
        <vers num="1.5.0.2"/>
        <vers num="1.5.0.3"/>
        <vers num="1.5.0.4"/>
        <vers num="1.5.0.5"/>
        <vers num="1.5.0.6"/>
        <vers num="1.5.0.7"/>
        <vers num="1.5.0.8"/>
        <vers num="1.5.0.9"/>
        <vers num="1.5.0.10"/>
        <vers num="1.5.0.11"/>
        <vers num="1.5.0.12"/>
        <vers num="1.5.1"/>
        <vers num="1.5.2"/>
        <vers num="1.5.3"/>
        <vers num="1.5.4"/>
        <vers num="1.5.5"/>
        <vers num="1.5.6"/>
        <vers num="1.5.7"/>
        <vers num="1.5.8"/>
        <vers num="1.8"/>
        <vers num="2.0"/>
        <vers num="2.0.0.1"/>
        <vers num="2.0.0.10"/>
        <vers num="2.0.0.11"/>
        <vers num="2.0.0.12"/>
        <vers num="2.0.0.13"/>
        <vers num="2.0.0.14"/>
        <vers num="2.0.0.15"/>
        <vers num="2.0.0.16" prev="1"/>
      </prod>
      <prod name="seamonkey" vendor="mozilla">
        <vers num="1.0" edition=":alpha"/>
        <vers num="1.0" edition=":dev"/>
        <vers num="1.0" edition="beta"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.4"/>
        <vers num="1.0.5"/>
        <vers num="1.0.6"/>
        <vers num="1.0.7"/>
        <vers num="1.0.8"/>
        <vers num="1.0.9"/>
        <vers num="1.0.99"/>
        <vers num="1.1"/>
        <vers num="1.1.1"/>
        <vers num="1.1.10"/>
        <vers num="1.1.11" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0017" seq="2008-0017" published="2008-11-13" modified="2018-10-26" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The http-index-format MIME type parser (nsDirIndexParser) in Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 does not check for an allocation failure, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an HTTP index response with a crafted 200 header, which triggers memory corruption and a buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html" adv="1">SUSE-SA:2008:055</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1">256408</ref>
      <ref source="UBUNTU" url="http://ubuntu.com/usn/usn-667-1" adv="1">USN-667-1</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1669" adv="1">DSA-1669</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1671" adv="1">DSA-1671</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2009/dsa-1697" adv="1">DSA-1697</ref>
      <ref source="ISS" url="http://www.iss.net/threats/311.html">20081113 Mozilla Unchecked Allocation Remote Code Execution</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:228" adv="1">MDVSA-2008:228</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:230" adv="1">MDVSA-2008:230</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/security/announce/2008/mfsa2008-54.html" adv="1">http://www.mozilla.org/security/announce/2008/mfsa2008-54.html</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0977.html" adv="1">RHSA-2008:0977</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0978.html" adv="1">RHSA-2008:0978</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/32281" adv="1">32281</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1021185" adv="1">1021185</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-319A.html" adv="1">TA08-319A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/3146" adv="1">ADV-2008-3146</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/0977" adv="1">ADV-2009-0977</ref>
      <ref source="MISC" url="https://bugzilla.mozilla.org/show_bug.cgi?id=443299" adv="1">https://bugzilla.mozilla.org/show_bug.cgi?id=443299</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11005" adv="1">oval:org.mitre.oval:def:11005</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.html" adv="1">FEDORA-2008-9667</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html" adv="1">FEDORA-2008-9669</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="2.0"/>
        <vers num="2.0.0.1"/>
        <vers num="2.0.0.2"/>
        <vers num="2.0.0.3"/>
        <vers num="2.0.0.4"/>
        <vers num="2.0.0.5"/>
        <vers num="2.0.0.6"/>
        <vers num="2.0.0.7"/>
        <vers num="2.0.0.8"/>
        <vers num="2.0.0.9"/>
        <vers num="2.0.0.10"/>
        <vers num="2.0.0.11"/>
        <vers num="2.0.0.12"/>
        <vers num="2.0.0.13"/>
        <vers num="2.0.0.14"/>
        <vers num="2.0.0.15"/>
        <vers num="2.0.0.16"/>
        <vers num="2.0.0.17"/>
        <vers num="3.0" edition="beta2"/>
        <vers num="3.0.1"/>
        <vers num="3.0.2"/>
        <vers num="3.0.3"/>
      </prod>
      <prod name="seamonkey" vendor="mozilla">
        <vers num="1.0" edition="alpha"/>
        <vers num="1.0" edition="beta"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.4"/>
        <vers num="1.0.5"/>
        <vers num="1.0.6"/>
        <vers num="1.0.7"/>
        <vers num="1.0.8"/>
        <vers num="1.0.9"/>
        <vers num="1.1" edition=":alpha"/>
        <vers num="1.1" edition=":beta"/>
        <vers num="1.1" edition="alpha"/>
        <vers num="1.1" edition="beta"/>
        <vers num="1.1.1"/>
        <vers num="1.1.2"/>
        <vers num="1.1.3"/>
        <vers num="1.1.4"/>
        <vers num="1.1.5"/>
        <vers num="1.1.6"/>
        <vers num="1.1.7"/>
        <vers num="1.1.8"/>
        <vers num="1.1.9"/>
        <vers num="1.1.10"/>
        <vers num="1.1.11"/>
        <vers num="1.1.12"/>
      </prod>
      <prod name="ubuntu_linux" vendor="canonical">
        <vers num="6.06" edition=":~~lts~~~"/>
        <vers num="7.10"/>
        <vers num="8.04" edition=":~~lts~~~"/>
        <vers num="8.10"/>
      </prod>
      <prod name="debian_linux" vendor="debian">
        <vers num="4.0"/>
        <vers num="5.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0020" seq="2008-0020" published="2009-07-07" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Load method in the IPersistStreamInit interface in the Active Template Library (ATL), as used in the Microsoft Video ActiveX control in msvidctl.dll in DirectShow, in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allows remote attackers to execute arbitrary code via unknown vectors that trigger memory corruption, aka "ATL Header Memcopy Vulnerability," a different vulnerability than CVE-2008-0015.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://blogs.technet.com/srd/archive/2009/08/11/ms09-037-why-we-are-using-cve-s-already-used-in-ms09-035.aspx">http://blogs.technet.com/srd/archive/2009/08/11/ms09-037-why-we-are-using-cve-s-already-used-in-ms09-035.aspx</ref>
      <ref source="ISS" url="http://www.iss.net/threats/329.html">20090706 Multiple Microsoft Video Control ActiveX Remote Code Execution Vulnerabilities</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1022712">1022712</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA09-223A.html">TA09-223A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/2232" adv="1" patch="1">ADV-2009-2232</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-037">MS09-037</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5850">oval:org.mitre.oval:def:5850</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_2003_server" vendor="microsoft">
        <vers num="-" edition="sp2:itanium"/>
        <vers num="-" edition="sp2:x64"/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition="sp2:professional_x64"/>
        <vers num="-" edition="sp2"/>
        <vers num="-" edition="sp3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0026" seq="2008-0026" published="2008-02-14" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in Cisco Unified CallManager/Communications Manager (CUCM) 5.0/5.1 before 5.1(3a) and 6.0/6.1 before 6.1(1a) allows remote authenticated users to execute arbitrary SQL commands via the key parameter to the (1) admin and (2) user interface pages.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_advisory09186a0080949c7c.shtml">20080213 SQL injection in Cisco Unified Communications Manager</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27775">27775</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019404">1019404</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0542" adv="1">ADV-2008-0542</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40484">cucm-interface-sql-injection(40484)</ref>
    </refs>
    <vuln_soft>
      <prod name="unified_callmanager" vendor="cisco">
        <vers num="5.0"/>
        <vers num="5.0(1)"/>
        <vers num="5.0(2)"/>
        <vers num="5.0(3)"/>
        <vers num="5.0(3a)"/>
        <vers num="5.0(4)"/>
        <vers num="5.0_4a"/>
        <vers num="5.1"/>
        <vers num="6.0"/>
      </prod>
      <prod name="unified_communications_manager" vendor="cisco">
        <vers num="5.0"/>
        <vers num="5.0_1"/>
        <vers num="5.0_2"/>
        <vers num="5.0_3"/>
        <vers num="5.0_3a"/>
        <vers num="5.0_4"/>
        <vers num="5.0_4a"/>
        <vers num="5.0_4a_su1"/>
        <vers num="6.0"/>
        <vers num="6.0_1"/>
        <vers num="6.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0027" seq="2008-0027" published="2008-01-16" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in the Certificate Trust List (CTL) Provider service (CTLProvider.exe) in Cisco Unified Communications Manager (CUCM) 4.2 before 4.2(3)SR3 and 4.3 before 4.3(1)SR1, and CallManager 4.0 and 4.1 before 4.1(3)SR5c, allows remote attackers to cause a denial of service or execute arbitrary code via a long request.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://dvlabs.tippingpoint.com/advisory/TPTI-08-02">http://dvlabs.tippingpoint.com/advisory/TPTI-08-02</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3551">3551</ref>
      <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_advisory09186a0080932c61.shtml" patch="1">20080116 Cisco Unified Communications Manager CTL Provider Heap Overflow</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486432/100/0/threaded">20080116 TPTI-08-02: Cisco Call Manager CTLProvider Heap Overflow Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27313">27313</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019223">1019223</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0171">ADV-2008-0171</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39704">cisco-cucm-ctl-bo(39704)</ref>
    </refs>
    <vuln_soft>
      <prod name="unified_callmanager" vendor="cisco">
        <vers num="4.0"/>
        <vers num="4.1"/>
        <vers num="4.1(3)sr4"/>
        <vers num="4.1(3)sr5"/>
        <vers num="4.1(3)sr5b"/>
      </prod>
      <prod name="unified_communications_manager" vendor="cisco">
        <vers num="4.2"/>
        <vers num="4.2.3sr2"/>
        <vers num="4.2.3sr2b"/>
        <vers num="4.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0028" seq="2008-0028" published="2008-01-23" modified="2018-10-26" severity="High" CVSS_version="2.0" CVSS_score="7.1" CVSS_base_score="7.1" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Cisco PIX 500 Series Security Appliance and 5500 Series Adaptive Security Appliance (ASA) before 7.2(3)6 and 8.0(3), when the Time-to-Live (TTL) decrement feature is enabled, allows remote attackers to cause a denial of service (device reload) via a crafted IP packet.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CISCO" url="http://www.cisco.com/warp/public/707/cisco-sa-20080123-asa.shtml" adv="1">20080123 Cisco PIX and ASA Time-to-Live Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27418" adv="1">27418</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019262" adv="1">1019262</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019263" adv="1">1019263</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0259" adv="1">ADV-2008-0259</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39862" adv="1">pix-asa-ttl-dos(39862)</ref>
    </refs>
    <vuln_soft>
      <prod name="adaptive_security_appliance_software" vendor="cisco">
        <vers num="-"/>
        <vers num="7.0"/>
        <vers num="7.0(0)"/>
        <vers num="7.0(1)"/>
        <vers num="7.0(2)"/>
        <vers num="7.0(4)"/>
        <vers num="7.0(5)"/>
        <vers num="7.0(5.2)"/>
        <vers num="7.0(6)"/>
        <vers num="7.0(6.7)"/>
        <vers num="7.0(7)"/>
        <vers num="7.0(8)"/>
        <vers num="7.0.1"/>
        <vers num="7.0.1.4"/>
        <vers num="7.0.2"/>
        <vers num="7.0.3"/>
        <vers num="7.0.4"/>
        <vers num="7.0.4.2"/>
        <vers num="7.0.4.3"/>
        <vers num="7.0.5"/>
        <vers num="7.0.5.12"/>
        <vers num="7.0.6"/>
        <vers num="7.0.6.4"/>
        <vers num="7.0.6.8"/>
        <vers num="7.0.6.18"/>
        <vers num="7.0.6.22"/>
        <vers num="7.0.6.26"/>
        <vers num="7.0.6.29"/>
        <vers num="7.0.6.32"/>
        <vers num="7.0.7"/>
        <vers num="7.0.7.1"/>
        <vers num="7.0.7.4"/>
        <vers num="7.0.7.9"/>
        <vers num="7.0.7.12"/>
        <vers num="7.0.8" edition="interim"/>
        <vers num="7.0.8.2"/>
        <vers num="7.0.8.8"/>
        <vers num="7.0.8.12"/>
        <vers num="7.0.8.13"/>
        <vers num="7.1"/>
        <vers num="7.1(2)"/>
        <vers num="7.1(2.5)"/>
        <vers num="7.1(2.27)"/>
        <vers num="7.1(2.48)"/>
        <vers num="7.1(2.49)"/>
        <vers num="7.1(5)"/>
        <vers num="7.1.1"/>
        <vers num="7.1.2"/>
        <vers num="7.1.2.16"/>
        <vers num="7.1.2.20"/>
        <vers num="7.1.2.24"/>
        <vers num="7.1.2.28"/>
        <vers num="7.1.2.38"/>
        <vers num="7.1.2.42"/>
        <vers num="7.1.2.46"/>
        <vers num="7.1.2.49"/>
        <vers num="7.1.2.53"/>
        <vers num="7.1.2.61"/>
        <vers num="7.1.2.64"/>
        <vers num="7.1.2.72"/>
        <vers num="7.1.2.81"/>
        <vers num="7.2"/>
        <vers num="7.2(1)"/>
        <vers num="7.2(1.22)"/>
        <vers num="7.2(2)"/>
        <vers num="7.2(2.5)"/>
        <vers num="7.2(2.7)"/>
        <vers num="7.2(2.8)"/>
        <vers num="7.2(2.10)"/>
        <vers num="7.2(2.14)"/>
        <vers num="7.2(2.15)"/>
        <vers num="7.2(2.16)"/>
        <vers num="7.2(2.17)"/>
        <vers num="7.2(2.18)"/>
        <vers num="7.2(2.19)"/>
        <vers num="7.2(2.48)"/>
        <vers num="7.2(3)"/>
        <vers num="8.0(3)"/>
      </prod>
      <prod name="pix_firewall_software" vendor="cisco">
        <vers num="-"/>
        <vers num="2.7"/>
        <vers num="3.0"/>
        <vers num="3.1"/>
        <vers num="4.0"/>
        <vers num="4.1(6)"/>
        <vers num="4.1(6b)"/>
        <vers num="4.2"/>
        <vers num="4.2(1)"/>
        <vers num="4.2(2)"/>
        <vers num="4.2(5)"/>
        <vers num="4.3"/>
        <vers num="4.4"/>
        <vers num="4.4(4)"/>
        <vers num="4.4(7.202)"/>
        <vers num="4.4(8)"/>
        <vers num="5.0"/>
        <vers num="5.1"/>
        <vers num="5.1(4)"/>
        <vers num="5.1(4.206)"/>
        <vers num="5.2"/>
        <vers num="5.2(1)"/>
        <vers num="5.2(2)"/>
        <vers num="5.2(3)"/>
        <vers num="5.2(3.210)"/>
        <vers num="5.2(4)"/>
        <vers num="5.2(5)"/>
        <vers num="5.2(6)"/>
        <vers num="5.2(7)"/>
        <vers num="5.2(8)"/>
        <vers num="5.2(9)"/>
        <vers num="5.3"/>
        <vers num="5.3(1)"/>
        <vers num="5.3(1.200)"/>
        <vers num="5.3(2)"/>
        <vers num="5.3(3)"/>
        <vers num="6.0"/>
        <vers num="6.0(1)"/>
        <vers num="6.0(2)"/>
        <vers num="6.0(3)"/>
        <vers num="6.0(4)"/>
        <vers num="6.0(4.101)"/>
        <vers num="6.1"/>
        <vers num="6.1(1)"/>
        <vers num="6.1(2)"/>
        <vers num="6.1(3)"/>
        <vers num="6.1(4)"/>
        <vers num="6.1(5)"/>
        <vers num="6.1.5(104)"/>
        <vers num="6.2"/>
        <vers num="6.2(1)"/>
        <vers num="6.2(2)"/>
        <vers num="6.2(3)"/>
        <vers num="6.2(3.100)"/>
        <vers num="6.3"/>
        <vers num="6.3(1)"/>
        <vers num="6.3(2)"/>
        <vers num="6.3(3)"/>
        <vers num="6.3(3.102)"/>
        <vers num="6.3(3.109)"/>
        <vers num="6.3(5)"/>
        <vers num="7.0"/>
        <vers num="7.1"/>
        <vers num="7.2"/>
        <vers num="7.2(2)"/>
        <vers num="8.0(3)"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0029" seq="2008-0029" published="2008-01-23" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Cisco Application Velocity System (AVS) before 5.1.0 is installed with default passwords for some system accounts, which allows remote attackers to gain privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CISCO" url="http://www.cisco.com/warp/public/707/cisco-sa-20080123-avs.shtml">20080123 Default Passwords in the Application Velocity System</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27421">27421</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019259">1019259</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0260">ADV-2008-0260</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39860">ciscoavs-default-password-admin-account(39860)</ref>
    </refs>
    <vuln_soft>
      <prod name="application_velocity_system" vendor="cisco">
        <vers num="5.0.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0030" seq="2008-0030" published="2017-05-11" modified="2017-05-11" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2008. Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2008-0031" seq="2008-0031" published="2008-01-15" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.8" CVSS_base_score="5.8" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Apple QuickTime before 7.4 allows remote attackers to cause a denial of service (application termination) and execute arbitrary code via a crafted Sorenson 3 video file, which triggers memory corruption.</descript>
    </desc>
    <loss_types>
      <avail/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307301">http://docs.info.apple.com/article.html?artnum=307301</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Jan/msg00001.html">APPLE-SA-2008-01-15</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27298">27298</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019221">1019221</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-016A.html">TA08-016A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0148">ADV-2008-0148</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39695">quicktime-sorenson-code-execution(39695)</ref>
    </refs>
    <vuln_soft>
      <prod name="quicktime" vendor="apple">
        <vers num="7.3" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0032" seq="2008-0032" published="2008-01-15" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.8" CVSS_base_score="5.8" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:P)">
    <desc>
      <descript source="cve">Apple QuickTime before 7.4 allows remote attackers to execute arbitrary code via a movie file containing a Macintosh Resource record with a modified length value in the resource header, which triggers heap corruption.</descript>
    </desc>
    <loss_types>
      <avail/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307301">http://docs.info.apple.com/article.html?artnum=307301</ref>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=642" patch="1">20080115 Apple QuickTime Macintosh Resource Processing Heap Corruption Vulnerability</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Jan/msg00001.html">APPLE-SA-2008-01-15</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27301">27301</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019221">1019221</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-016A.html">TA08-016A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0148">ADV-2008-0148</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39696">quicktime-macintosh-code-execution(39696)</ref>
    </refs>
    <vuln_soft>
      <prod name="quicktime" vendor="apple">
        <vers num="7.3" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0033" seq="2008-0033" published="2008-01-15" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Apple QuickTime before 7.4 allows remote attackers to cause a denial of service (application termination) and execute arbitrary code via a movie file with Image Descriptor (IDSC) atoms containing an invalid atom size, which triggers memory corruption.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307301">http://docs.info.apple.com/article.html?artnum=307301</ref>
      <ref source="MISC" url="http://dvlabs.tippingpoint.com/advisory/TPTI-08-01">http://dvlabs.tippingpoint.com/advisory/TPTI-08-01</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Jan/msg00001.html">APPLE-SA-2008-01-15</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486413/100/0/threaded">20080115 TPTI-08-01: Apple Quicktime Image File IDSC Atom Memory Corruption Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27299">27299</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019221">1019221</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-016A.html">TA08-016A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0148" adv="1">ADV-2008-0148</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39697">quicktime-idsc-code-execution(39697)</ref>
    </refs>
    <vuln_soft>
      <prod name="quicktime" vendor="apple">
        <vers num="7.3.1.70" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0034" seq="2008-0034" published="2008-01-15" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Passcode Lock in Apple iPhone 1.0 through 1.1.2 allows users with physical access to execute applications without entering the passcode via vectors related to emergency calls.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307302">http://docs.info.apple.com/article.html?artnum=307302</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Jan/msg00000.html">APPLE-SA-2008-01-15</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27297">27297</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019219">1019219</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0147">ADV-2008-0147</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39701">iphone-passcode-lock-security-bypass(39701)</ref>
    </refs>
    <vuln_soft>
      <prod name="iphone" vendor="apple">
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.1.1"/>
        <vers num="1.1.2"/>
        <vers num="1.02"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0035" seq="2008-0035" published="2008-01-15" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Foundation, as used in Apple iPhone 1.0 through 1.1.2, iPod touch 1.1 through 1.1.2, and Mac OS X 10.5 through 10.5.1, allows remote attackers to cause a denial of service (application termination) or execute arbitrary code via a crafted URL that triggers memory corruption in Safari.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307302">http://docs.info.apple.com/article.html?artnum=307302</ref>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307430">http://docs.info.apple.com/article.html?artnum=307430</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Feb/msg00002.html">APPLE-SA-2008-02-11</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Jan/msg00000.html">APPLE-SA-2008-01-15</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27296">27296</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019220">1019220</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-043B.html">TA08-043B</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0147" adv="1">ADV-2008-0147</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0495/references" adv="1">ADV-2008-0495</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39700">iphone-ipod-foundation-code-execution(39700)</ref>
    </refs>
    <vuln_soft>
      <prod name="safari" vendor="apple">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0036" seq="2008-0036" published="2008-01-15" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in Apple QuickTime before 7.4 allows remote attackers to execute arbitrary code via a crafted compressed PICT image, which triggers the overflow during decoding.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307301">http://docs.info.apple.com/article.html?artnum=307301</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//Jul/msg00000.html">APPLE-SA-2008-07-10</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Jan/msg00001.html">APPLE-SA-2008-01-15</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27300">27300</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019221">1019221</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-016A.html">TA08-016A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0148">ADV-2008-0148</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2064/references">ADV-2008-2064</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39698">quicktime-pict-bo(39698)</ref>
    </refs>
    <vuln_soft>
      <prod name="quicktime" vendor="apple">
        <vers num="7.3" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0037" seq="2008-0037" published="2008-02-12" modified="2011-03-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">X11 in Apple Mac OS X 10.5 through 10.5.1 does not properly handle when the "Allow connections from network client" preference is disabled, which allows remote attackers to bypass intended access restrictions and connect to the X server.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307430">http://docs.info.apple.com/article.html?artnum=307430</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Feb/msg00002.html" patch="1">APPLE-SA-2008-02-11</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27736">27736</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019365">1019365</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-043B.html">TA08-043B</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0495/references">ADV-2008-0495</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.5"/>
        <vers num="10.5.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0038" seq="2008-0038" published="2008-02-12" modified="2011-03-07" severity="Low" CVSS_version="2.0" CVSS_score="1.9" CVSS_base_score="1.9" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Launch Services in Apple Mac OS X 10.5 through 10.5.1 allows an uninstalled application to be launched if it is in a Time Machine backup, which might allow local users to bypass intended security restrictions or exploit vulnerabilities in the application.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307430">http://docs.info.apple.com/article.html?artnum=307430</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Feb/msg00002.html" patch="1">APPLE-SA-2008-02-11</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27736">27736</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019360">1019360</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-043B.html">TA08-043B</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0495/references">ADV-2008-0495</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.5"/>
        <vers num="10.5.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0039" seq="2008-0039" published="2008-02-12" modified="2011-03-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Mail in Apple Mac OS X 10.4.11 allows remote attackers to execute arbitrary commands via a crafted file:// URL.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307430">http://docs.info.apple.com/article.html?artnum=307430</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Feb/msg00002.html" patch="1">APPLE-SA-2008-02-11</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27736">27736</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019361">1019361</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-043B.html">TA08-043B</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0495/references">ADV-2008-0495</ref>
    </refs>
    <vuln_soft>
      <prod name="mail" vendor="apple">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0040" seq="2008-0040" published="2008-02-12" modified="2011-03-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in NFS in Apple Mac OS X 10.5 through 10.5.1 allows remote attackers to cause a denial of service (system shutdown) or execute arbitrary code via unknown vectors related to mbuf chains that trigger memory corruption.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307430">http://docs.info.apple.com/article.html?artnum=307430</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Feb/msg00002.html" patch="1">APPLE-SA-2008-02-11</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27736">27736</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019362">1019362</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-043B.html">TA08-043B</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0495/references">ADV-2008-0495</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.5"/>
        <vers num="10.5.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0041" seq="2008-0041" published="2008-02-12" modified="2011-03-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Parental Controls in Apple Mac OS X 10.5 through 10.5.1 contacts www.apple.com "when a website is unblocked," which allows remote attackers to determine when a system is running Parental Controls.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307430">http://docs.info.apple.com/article.html?artnum=307430</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Feb/msg00002.html" patch="1">APPLE-SA-2008-02-11</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27736">27736</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019363">1019363</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-043B.html">TA08-043B</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0495/references">ADV-2008-0495</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.5"/>
        <vers num="10.5.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0042" seq="2008-0042" published="2008-02-12" modified="2011-03-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Argument injection vulnerability in Terminal.app in Terminal in Apple Mac OS X 10.4.11 and 10.5 through 10.5.1 allows remote attackers to execute arbitrary code via unspecified URL schemes.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307430">http://docs.info.apple.com/article.html?artnum=307430</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Feb/msg00002.html" patch="1">APPLE-SA-2008-02-11</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/774345">VU#774345</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27736">27736</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019364">1019364</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-043B.html">TA08-043B</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0495/references">ADV-2008-0495</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.4.11"/>
        <vers num="10.5"/>
        <vers num="10.5.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0043" seq="2008-0043" published="2008-02-07" modified="2011-03-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Format string vulnerability in Apple iPhoto before 7.1.2 allows remote attackers to execute arbitrary code via photocast subscriptions.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307398">http://docs.info.apple.com/article.html?artnum=307398</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Feb/msg00000.html" patch="1">APPLE-SA-2008-02-05</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27636">27636</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019307">1019307</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0428/references">ADV-2008-0428</ref>
    </refs>
    <vuln_soft>
      <prod name="iphoto" vendor="apple">
        <vers num="7.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0044" seq="2008-0044" published="2008-03-18" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.8" CVSS_base_score="5.8" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple buffer overflows in AFP Client in Apple Mac OS X 10.4.11 and 10.5.2 allow remote attackers to cause a denial of service (application termination) and execute arbitrary code via a crafted afp:// URL.</descript>
    </desc>
    <loss_types>
      <avail/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307562">http://docs.info.apple.com/article.html?artnum=307562</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html" patch="1">APPLE-SA-2008-03-18</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28304">28304</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28320">28320</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019640">1019640</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-079A.html">TA08-079A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0924/references">ADV-2008-0924</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41319">macos-afpclient-bo(41319)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.4.11"/>
        <vers num="10.5.2"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.4.11"/>
        <vers num="10.5.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0045" seq="2008-0045" published="2008-03-18" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.1" CVSS_base_score="7.1" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:N/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in AFP Server in Apple Mac OS X 10.4.11 allows remote attackers to bypass cross-realm authentication via unknown manipulations of Kerberos principal realm names.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307562">http://docs.info.apple.com/article.html?artnum=307562</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html" patch="1">APPLE-SA-2008-03-18</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28304">28304</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28323">28323</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019642">1019642</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-079A.html">TA08-079A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0924/references">ADV-2008-0924</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41318">macos-afpserver-security-bypass(41318)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.4.11"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.4.11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0046" seq="2008-0046" published="2008-03-18" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The Application Firewall in Apple Mac OS X 10.5.2 has an incorrect German translation for the "Set access for specific services and applications" radio button that might cause the user to believe that the button is used to restrict access only to specific services and applications, which might allow attackers to bypass intended access restrictions.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307562">http://docs.info.apple.com/article.html?artnum=307562</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html" patch="1">APPLE-SA-2008-03-18</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28304">28304</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28368">28368</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019658">1019658</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-079A.html">TA08-079A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0924/references">ADV-2008-0924</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41317">macos-applicationfirewall-weak-security(41317)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.5.2"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.5.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0047" seq="2008-0047" published="2008-03-18" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in the cgiCompileSearch function in CUPS 1.3.5, and other versions including the version bundled with Apple Mac OS X 10.5.2, when printer sharing is enabled, allows remote attackers to execute arbitrary code via crafted search expressions.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307562">http://docs.info.apple.com/article.html?artnum=307562</ref>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=674">20080318 Multiple Vendor CUPS CGI Heap Overflow Vulnerability</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html" patch="1">APPLE-SA-2008-03-18</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00005.html">SUSE-SA:2008:015</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200804-01.xml">GLSA-200804-01</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1530">DSA-1530</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:081">MDVSA-2008:081</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0192.html" adv="1">RHSA-2008:0192</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28307">28307</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019646">1019646</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-598-1">USN-598-1</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-079A.html">TA08-079A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0921/references" adv="1">ADV-2008-0921</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0924/references" adv="1">ADV-2008-0924</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10085">oval:org.mitre.oval:def:10085</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00091.html">FEDORA-2008-2131</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00105.html">FEDORA-2008-2897</ref>
    </refs>
    <vuln_soft>
      <prod name="cups" vendor="cups">
        <vers num="1.3.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0048" seq="2008-0048" published="2008-03-18" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in AppKit in Apple Mac OS X 10.4.11 allows context-dependent attackers to execute arbitrary code via the a long file name to the NSDocument API.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307562">http://docs.info.apple.com/article.html?artnum=307562</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html" patch="1">APPLE-SA-2008-03-18</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28304">28304</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28388">28388</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019647">1019647</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-079A.html">TA08-079A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0924/references">ADV-2008-0924</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41315">macos-appkit-nsdocument-bo(41315)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.4.11"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.4.11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0049" seq="2008-0049" published="2008-03-18" modified="2017-08-07" severity="Low" CVSS_version="2.0" CVSS_score="1.9" CVSS_base_score="1.9" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">AppKit in Apple Mac OS X 10.4.11 inadvertently makes an NSApplication mach port available for inter-process communication instead of inter-thread communication, which allows local users to execute arbitrary code via crafted messages to privileged applications.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307562">http://docs.info.apple.com/article.html?artnum=307562</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html" patch="1">APPLE-SA-2008-03-18</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28304">28304</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28340">28340</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019647">1019647</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-079A.html">TA08-079A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0924/references">ADV-2008-0924</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41314">macos-appkit-code-execution(41314)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.4.11"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.4.11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0050" seq="2008-0050" published="2008-03-18" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">CFNetwork in Apple Mac OS X 10.4.11 allows remote HTTPS proxy servers to spoof secure websites via data in a 502 Bad Gateway error.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307562">http://docs.info.apple.com/article.html?artnum=307562</ref>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307563">http://docs.info.apple.com/article.html?artnum=307563</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//Jul/msg00001.html">APPLE-SA-2008-07-11</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html" patch="1">APPLE-SA-2008-03-18</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28290">28290</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28356">28356</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019655">1019655</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-079A.html">TA08-079A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0920/references">ADV-2008-0920</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0924/references">ADV-2008-0924</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2094/references">ADV-2008-2094</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41313">macos-cfnetwork-502badgateway-spoofing(41313)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.4.11"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.4.11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0051" seq="2008-0051" published="2008-03-18" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.9" CVSS_base_score="6.9" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Integer overflow in CoreFoundation in Apple Mac OS X 10.4.11 might allow local users to execute arbitrary code via crafted time zone data.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307562">http://docs.info.apple.com/article.html?artnum=307562</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html" patch="1">APPLE-SA-2008-03-18</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28304">28304</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28375">28375</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019670">1019670</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-079A.html">TA08-079A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0924/references">ADV-2008-0924</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41310">macos-corefoundation-timezone-code-execution(41310)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.4.11"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.4.11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0052" seq="2008-0052" published="2008-03-18" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">CoreServices in Apple Mac OS X 10.4.11 treats .ief as a safe file type, which allows remote attackers to force Safari users into opening an .ief file in AppleWorks, even when the "Open 'Safe' files" preference is set.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307562">http://docs.info.apple.com/article.html?artnum=307562</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html" patch="1">APPLE-SA-2008-03-18</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28304">28304</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28384">28384</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019671">1019671</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-079A.html">TA08-079A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0924/references">ADV-2008-0924</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41312">macos-coreservices-weak-security(41312)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.4.11"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.4.11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0053" seq="2008-0053" published="2008-03-18" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple buffer overflows in the HP-GL/2-to-PostScript filter in CUPS before 1.3.6 might allow remote attackers to execute arbitrary code via a crafted HP-GL/2 file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307562">http://docs.info.apple.com/article.html?artnum=307562</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html" patch="1">APPLE-SA-2008-03-18</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00003.html">SUSE-SA:2008:020</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200804-01.xml">GLSA-200804-01</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1625">DSA-1625</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:081">MDVSA-2008:081</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0192.html">RHSA-2008:0192</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0206.html">RHSA-2008:0206</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28304">28304</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28334">28334</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019672">1019672</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-598-1">USN-598-1</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-079A.html">TA08-079A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0924/references" adv="1">ADV-2008-0924</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41272">macos-cups-inputvalidation-unspecified(41272)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10356">oval:org.mitre.oval:def:10356</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00105.html">FEDORA-2008-2897</ref>
    </refs>
    <vuln_soft>
      <prod name="cups" vendor="apple">
        <vers num="1.1"/>
        <vers num="1.1.1"/>
        <vers num="1.1.2"/>
        <vers num="1.1.3"/>
        <vers num="1.1.4"/>
        <vers num="1.1.5"/>
        <vers num="1.1.5-1"/>
        <vers num="1.1.5-2"/>
        <vers num="1.1.6"/>
        <vers num="1.1.6-1"/>
        <vers num="1.1.6-2"/>
        <vers num="1.1.6-3"/>
        <vers num="1.1.7"/>
        <vers num="1.1.8"/>
        <vers num="1.1.9"/>
        <vers num="1.1.9-1"/>
        <vers num="1.1.10"/>
        <vers num="1.1.10-1"/>
        <vers num="1.1.11"/>
        <vers num="1.1.12"/>
        <vers num="1.1.13"/>
        <vers num="1.1.14"/>
        <vers num="1.1.15"/>
        <vers num="1.1.16"/>
        <vers num="1.1.17"/>
        <vers num="1.1.18"/>
        <vers num="1.1.19" edition="rc1"/>
        <vers num="1.1.19" edition="rc2"/>
        <vers num="1.1.19" edition="rc3"/>
        <vers num="1.1.19" edition="rc4"/>
        <vers num="1.1.19" edition="rc5"/>
        <vers num="1.1.20" edition="rc1"/>
        <vers num="1.1.20" edition="rc2"/>
        <vers num="1.1.20" edition="rc3"/>
        <vers num="1.1.20" edition="rc4"/>
        <vers num="1.1.20" edition="rc5"/>
        <vers num="1.1.20" edition="rc6"/>
        <vers num="1.1.21" edition="rc1"/>
        <vers num="1.1.21" edition="rc2"/>
        <vers num="1.1.22" edition="rc1"/>
        <vers num="1.1.22" edition="rc2"/>
        <vers num="1.1.23" edition="rc1"/>
        <vers num="1.2" edition="b1"/>
        <vers num="1.2" edition="b2"/>
        <vers num="1.2" edition="rc1"/>
        <vers num="1.2" edition="rc2"/>
        <vers num="1.2" edition="rc3"/>
        <vers num="1.2.0"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2"/>
        <vers num="1.2.3"/>
        <vers num="1.2.4"/>
        <vers num="1.2.5"/>
        <vers num="1.2.6"/>
        <vers num="1.2.7"/>
        <vers num="1.2.8"/>
        <vers num="1.2.9"/>
        <vers num="1.2.10"/>
        <vers num="1.2.11"/>
        <vers num="1.2.12"/>
        <vers num="1.3" edition="b1"/>
        <vers num="1.3" edition="rc1"/>
        <vers num="1.3" edition="rc2"/>
        <vers num="1.3.0"/>
        <vers num="1.3.1"/>
        <vers num="1.3.2"/>
        <vers num="1.3.3"/>
        <vers num="1.3.4"/>
        <vers num="1.3.5" prev="1"/>
        <vers num="1.3.9"/>
        <vers num="1.4.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0054" seq="2008-0054" published="2008-03-18" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:P)">
    <desc>
      <descript source="cve">Foundation in Apple Mac OS X 10.4.11 might allow context-dependent attackers to execute arbitrary code via a malformed selector name to the NSSelectorFromString API, which causes an "unexpected selector" to be used.</descript>
    </desc>
    <loss_types>
      <avail/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307562">http://docs.info.apple.com/article.html?artnum=307562</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html" patch="1">APPLE-SA-2008-03-18</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28304">28304</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28341">28341</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019649">1019649</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-079A.html">TA08-079A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0924/references">ADV-2008-0924</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41355">macos-nsselectorfromstring-code-execution(41355)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.4.11"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.4.11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0055" seq="2008-0055" published="2008-03-18" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Foundation in Apple Mac OS X 10.4.11 creates world-writable directories while NSFileManager copies files recursively and only modifies the permissions afterward, which allows local users to modify copied files to cause a denial of service and possibly gain privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307562">http://docs.info.apple.com/article.html?artnum=307562</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html" patch="1">APPLE-SA-2008-03-18</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28304">28304</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28343">28343</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019649">1019649</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-079A.html">TA08-079A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0924/references">ADV-2008-0924</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41299">macos-nsfilemanager-priv-escalation(41299)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.4.11"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.4.11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0056" seq="2008-0056" published="2008-03-18" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in Foundation in Apple Mac OS X 10.4.11 allows context-dependent attackers to execute arbitrary code via a "long pathname with an unexpected structure" that triggers the overflow in NSFileManager.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307562">http://docs.info.apple.com/article.html?artnum=307562</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html" patch="1">APPLE-SA-2008-03-18</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28304">28304</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28357">28357</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019649">1019649</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-079A.html">TA08-079A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0924/references">ADV-2008-0924</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41309">macos-foundation-nsfilemanager-bo(41309)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.4.11"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.4.11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0057" seq="2008-0057" published="2008-03-18" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple integer overflows in a "legacy serialization format" parser in AppKit in Apple Mac OS X 10.4.11 allows remote attackers to execute arbitrary code via a crafted serialized property list.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307562">http://docs.info.apple.com/article.html?artnum=307562</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html" patch="1">APPLE-SA-2008-03-18</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28304">28304</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28358">28358</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019648">1019648</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-079A.html">TA08-079A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0924/references" adv="1">ADV-2008-0924</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41298">macos-appkit-parser-bo(41298)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.4.11"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.4.11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0058" seq="2008-0058" published="2008-03-18" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.8" CVSS_base_score="5.8" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:P)">
    <desc>
      <descript source="cve">Race condition in the NSURLConnection cache management functionality in Foundation for Apple Mac OS X 10.4.11 allows remote attackers to execute arbitrary code via unspecified manipulations that cause messages to be sent to a deallocated object.</descript>
    </desc>
    <loss_types>
      <avail/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307562">http://docs.info.apple.com/article.html?artnum=307562</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html" patch="1">APPLE-SA-2008-03-18</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28304">28304</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28359">28359</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019650">1019650</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-079A.html">TA08-079A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0924/references">ADV-2008-0924</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41297">macos-foundation-nsurl-code-execution(41297)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.4.11"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.4.11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0059" seq="2008-0059" published="2008-03-18" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.8" CVSS_base_score="5.8" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:P)">
    <desc>
      <descript source="cve">Race condition in NSXML in Foundation for Apple Mac OS X 10.4.11 allows context-dependent attackers to execute arbitrary code via a crafted XML file, related to "error handling logic."</descript>
    </desc>
    <loss_types>
      <avail/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307562">http://docs.info.apple.com/article.html?artnum=307562</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html" patch="1">APPLE-SA-2008-03-18</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28304">28304</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28367">28367</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019650">1019650</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-079A.html">TA08-079A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0924/references">ADV-2008-0924</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41296">macos-foundation-code-execution(41296)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.4.11"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.4.11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0060" seq="2008-0060" published="2008-03-18" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Help Viewer in Apple Mac OS X 10.4.11 and 10.5.2 allows remote attackers to execute arbitrary Applescript via a help:topic_list URL that injects HTML or JavaScript into a topic list page, as demonstrated using a help:runscript link.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307562">http://docs.info.apple.com/article.html?artnum=307562</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html" patch="1">APPLE-SA-2008-03-18</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28304">28304</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28371">28371</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019657">1019657</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-079A.html">TA08-079A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0924/references">ADV-2008-0924</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41295">macos-helpviewer-code-execution(41295)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.4.11"/>
        <vers num="10.5.2"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.4.11"/>
        <vers num="10.5.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0061" seq="2008-0061" published="2008-01-03" modified="2011-03-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">MaraDNS 1.0 before 1.0.41, 1.2 before 1.2.12.08, and 1.3 before 1.3.07.04 allows remote attackers to cause a denial of service via a crafted DNS packet that prevents an authoritative name (CNAME) record from resolving, aka "improper rotation of resource records."</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.gentoo.org/show_bug.cgi?id=204351">http://bugs.gentoo.org/show_bug.cgi?id=204351</ref>
      <ref source="CONFIRM" url="http://maradns.blogspot.com/2007/08/maradns-update-all-versions.html">http://maradns.blogspot.com/2007/08/maradns-update-all-versions.html</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200801-16.xml">GLSA-200801-16</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1445">DSA-1445</ref>
      <ref source="CONFIRM" url="http://www.maradns.org/changelog.html">http://www.maradns.org/changelog.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27124">27124</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0026">ADV-2008-0026</ref>
    </refs>
    <vuln_soft>
      <prod name="maradns" vendor="maradns">
        <vers num="1.0.00"/>
        <vers num="1.0.01"/>
        <vers num="1.0.02"/>
        <vers num="1.0.03"/>
        <vers num="1.0.04"/>
        <vers num="1.0.05"/>
        <vers num="1.0.06"/>
        <vers num="1.0.07"/>
        <vers num="1.0.08"/>
        <vers num="1.0.09"/>
        <vers num="1.0.10"/>
        <vers num="1.0.11"/>
        <vers num="1.0.12"/>
        <vers num="1.0.13"/>
        <vers num="1.0.14"/>
        <vers num="1.0.15"/>
        <vers num="1.0.16"/>
        <vers num="1.0.17"/>
        <vers num="1.0.18"/>
        <vers num="1.0.19"/>
        <vers num="1.0.20"/>
        <vers num="1.0.21"/>
        <vers num="1.0.22"/>
        <vers num="1.0.23"/>
        <vers num="1.0.24"/>
        <vers num="1.0.25"/>
        <vers num="1.0.26"/>
        <vers num="1.0.27"/>
        <vers num="1.0.28"/>
        <vers num="1.0.29"/>
        <vers num="1.0.30"/>
        <vers num="1.0.31"/>
        <vers num="1.0.32"/>
        <vers num="1.0.33"/>
        <vers num="1.0.34"/>
        <vers num="1.0.35"/>
        <vers num="1.0.36"/>
        <vers num="1.0.37"/>
        <vers num="1.0.38"/>
        <vers num="1.0.39"/>
        <vers num="1.2.12.01"/>
        <vers num="1.2.12.02"/>
        <vers num="1.2.12.03"/>
        <vers num="1.2.12.04"/>
        <vers num="1.2.12.05"/>
        <vers num="1.2.12.06"/>
        <vers num="1.2.12.07"/>
        <vers num="1.3.01"/>
        <vers num="1.3.02"/>
        <vers num="1.3.03"/>
        <vers num="1.3.04"/>
        <vers num="1.3.05"/>
        <vers num="1.3.06"/>
        <vers num="1.3.07"/>
        <vers num="1.3.07.01"/>
        <vers num="1.3.07.02"/>
        <vers num="1.3.07.03"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0062" seq="2008-0062" published="2008-03-19" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">KDC in MIT Kerberos 5 (krb5kdc) does not set a global variable for some krb4 message types, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted messages that trigger a NULL pointer dereference or double-free.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307562">http://docs.info.apple.com/article.html?artnum=307562</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html">APPLE-SA-2008-03-18</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00006.html">SUSE-SA:2008:016</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=130497213107107&amp;w=2">SSRT100495</ref>
      <ref source="CONFIRM" url="http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022520.html">http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022520.html</ref>
      <ref source="CONFIRM" url="http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022542.html">http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022542.html</ref>
      <ref source="CONFIRM" url="http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-001.txt" patch="1">http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-001.txt</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0112">http://wiki.rpath.com/Advisories:rPSA-2008-0112</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0112">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0112</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1524">DSA-1524</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200803-31.xml">GLSA-200803-31</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/895609">VU#895609</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:069">MDVSA-2008:069</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:070">MDVSA-2008:070</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:071">MDVSA-2008:071</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0164.html">RHSA-2008:0164</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0180.html">RHSA-2008:0180</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0181.html">RHSA-2008:0181</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0182.html">RHSA-2008:0182</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489761">20080318 MITKRB5-SA-2008-001: double-free, uninitialized data vulnerabilities in krb5kdc</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489883/100/0/threaded">20080319 rPSA-2008-0112-1 krb5 krb5-server krb5-services krb5-test krb5-workstation</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493080/100/0/threaded">20080604 VMSA-2008-0009 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Fusion, VMware Server, VMware VIX API, VMware ESX, VMware ESXi resolve critical security issues</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28303">28303</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019626">1019626</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-587-1">USN-587-1</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2008-0009.html">http://www.vmware.com/security/advisories/VMSA-2008-0009.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0922/references">ADV-2008-0922</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0924/references">ADV-2008-0924</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1102/references">ADV-2008-1102</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1744">ADV-2008-1744</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41275">krb5-kdc-code-execution(41275)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9496">oval:org.mitre.oval:def:9496</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00537.html">FEDORA-2008-2637</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00544.html">FEDORA-2008-2647</ref>
    </refs>
    <vuln_soft>
      <prod name="kerberos_5" vendor="mit">
        <vers num="1.6.3_kdc" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0063" seq="2008-0063" published="2008-03-19" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc) does not properly clear the unused portion of a buffer when generating an error message, which might allow remote attackers to obtain sensitive information, aka "Uninitialized stack values."</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307562">http://docs.info.apple.com/article.html?artnum=307562</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html">APPLE-SA-2008-03-18</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00006.html">SUSE-SA:2008:016</ref>
      <ref source="CONFIRM" url="http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022520.html">http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022520.html</ref>
      <ref source="CONFIRM" url="http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022542.html">http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022542.html</ref>
      <ref source="CONFIRM" url="http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-001.txt" patch="1">http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-001.txt</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0112">http://wiki.rpath.com/Advisories:rPSA-2008-0112</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0112">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0112</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1524">DSA-1524</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200803-31.xml">GLSA-200803-31</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:069">MDVSA-2008:069</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:070">MDVSA-2008:070</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:071">MDVSA-2008:071</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0164.html">RHSA-2008:0164</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0180.html">RHSA-2008:0180</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0181.html">RHSA-2008:0181</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0182.html">RHSA-2008:0182</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489761">20080318 MITKRB5-SA-2008-001: double-free, uninitialized data vulnerabilities in krb5kdc</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489883/100/0/threaded">20080319 rPSA-2008-0112-1 krb5 krb5-server krb5-services krb5-test krb5-workstation</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493080/100/0/threaded">20080604 VMSA-2008-0009 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Fusion, VMware Server, VMware VIX API, VMware ESX, VMware ESXi resolve critical security issues</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28303">28303</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019627">1019627</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-587-1">USN-587-1</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2008-0009.html">http://www.vmware.com/security/advisories/VMSA-2008-0009.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0922/references" adv="1">ADV-2008-0922</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0924/references" adv="1">ADV-2008-0924</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1102/references" adv="1">ADV-2008-1102</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1744" adv="1">ADV-2008-1744</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41277">krb5-kdc-kerberos4-info-disclosure(41277)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8916">oval:org.mitre.oval:def:8916</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00537.html">FEDORA-2008-2637</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00544.html">FEDORA-2008-2647</ref>
    </refs>
    <vuln_soft>
      <prod name="kerberos_5" vendor="mit">
        <vers num="1.6.3_kdc" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0064" seq="2008-0064" published="2008-01-31" modified="2011-03-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in Pierre-emmanuel Gougelet (1) XnView 1.91 and 1.92, (2) NConvert 4.85, and (3) libgfl280.dll in GFL SDK 2.870 for Windows allows user-assisted remote attackers to execute arbitrary code via a crafted Radiance RGBE (.hdr) file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27514">27514</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0328">ADV-2008-0328</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0329">ADV-2008-0329</ref>
    </refs>
    <vuln_soft>
      <prod name="gfl_sdk" vendor="pierreegougelet">
        <vers num="2.870" edition=":windows"/>
      </prod>
      <prod name="nconvert" vendor="pierreegougelet">
        <vers num="4.85" prev="1"/>
      </prod>
      <prod name="xnview" vendor="pierreegougelet">
        <vers num="1.91" prev="1"/>
        <vers num="1.92" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0065" seq="2008-0065" published="2008-01-22" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple stack-based buffer overflows in in_mp3.dll in Winamp 5.21, 5.5, and 5.51 allow remote attackers to execute arbitrary code via a long (1) artist or (2) name tag in Ultravox streaming metadata, related to construction of stream titles.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27344">27344</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0183">ADV-2008-0183</ref>
      <ref source="CONFIRM" url="http://www.winamp.com/player/version-history">http://www.winamp.com/player/version-history</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39778">winamp-inmp3-bo(39778)</ref>
    </refs>
    <vuln_soft>
      <prod name="nullsoft_winamp" vendor="winamp">
        <vers num="5.5"/>
        <vers num="5.21"/>
        <vers num="5.51"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0066" seq="2008-0066" published="2008-04-10" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple buffer overflows in htmsr.dll in the HTML speed reader in Autonomy (formerly Verity) KeyView, as used by IBM Lotus Notes 7.0.2 and 7.0.3, allow remote attackers to execute arbitrary code via an HTML document with (1) "large chunks of data," or a long URL in the (2) BACKGROUND attribute of a BODY element or (3) SRC attribute of an IMG element.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490828/100/0/threaded">20080414 Secunia Research: Lotus Notes htmsr.dll Buffer Overflows</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28454">28454</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019843">1019843</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1153">ADV-2008-1153</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1156">ADV-2008-1156</ref>
      <ref source="CONFIRM" url="http://www-1.ibm.com/support/docview.wss?rs=463&amp;uid=swg21298453">http://www-1.ibm.com/support/docview.wss?rs=463&amp;uid=swg21298453</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41724">autonomy-keyview-html-multiple-bo(41724)</ref>
    </refs>
    <vuln_soft>
      <prod name="keyview" vendor="autonomy">
        <vers num=""/>
      </prod>
      <prod name="lotus_notes" vendor="ibm">
        <vers num="7.0.2"/>
        <vers num="7.0.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0067" seq="2008-0067" published="2009-01-08" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple stack-based buffer overflows in HP OpenView Network Node Manager (OV NNM) 7.01, 7.51, and 7.53 allow remote attackers to execute arbitrary code via (1) long string parameters to the OpenView5.exe CGI program; (2) a long string parameter to the OpenView5.exe CGI program, related to ov.dll; or a long string parameter to the (3) getcvdata.exe, (4) ovlaunch.exe, or (5) Toolbar.exe CGI program.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=123247393715913&amp;w=2">HPSBMA02400</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/4885">4885</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/8307">8307</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1021521">1021521</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/499826/100/0/threaded">20090107 Secunia Research: HP OpenView Network Node Manager Multiple Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/33147">33147</ref>
    </refs>
    <vuln_soft>
      <prod name="openview_network_node_manager" vendor="hp">
        <vers num="7.51"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0068" seq="2008-0068" published="2008-04-16" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in OpenView5.exe in HP OpenView Network Node Manager (OV NNM) 7.01, 7.51, and 7.53 allows remote attackers to read arbitrary files via directory traversal sequences in the Action parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/closedviewx-adv.txt">http://aluigi.altervista.org/adv/closedviewx-adv.txt</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=121553649611253&amp;w=2">SSRT080043</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3814">3814</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490771">20080411 Directory traversal and multiple Denials of Service in HP OpenView NNM 7.53</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490834/100/0/threaded">20080414 Secunia Research: HP OpenView Network Node Manager OpenView5.exeDirectory Traversal</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28745">28745</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019838">1019838</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019839">1019839</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1214/references">ADV-2008-1214</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41790">hpopenview-openview5-directory-traversal(41790)</ref>
    </refs>
    <vuln_soft>
      <prod name="openview_network_node_manager" vendor="hp">
        <vers num="7.51"/>
        <vers num="7.53"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0069" seq="2008-0069" published="2008-04-02" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in XnView 1.92 and 1.92.1 allows user-assisted remote attackers to execute arbitrary code via a long FontName parameter in a slideshow (.sld) file, a different vector than CVE-2008-1461.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28579">28579</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1044/references">ADV-2008-1044</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41542">xnview-slideshow-bo(41542)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5346">5346</ref>
    </refs>
    <vuln_soft>
      <prod name="xnview" vendor="pierreegougelet">
        <vers num="1.92" prev="1"/>
        <vers num="1.92.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0070" seq="2008-0070" published="2008-03-31" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Integer overflow in Orb Networks Orb 2.00.1014 and Winamp Remote BETA allows remote attackers to execute arbitrary code via an RPC request that specifies a large number of array dimensions, which triggers a heap-based buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28431">28431</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0984/references">ADV-2008-0984</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41410">orb-dimensions-bo(41410)</ref>
    </refs>
    <vuln_soft>
      <prod name="orb" vendor="orb_networks">
        <vers num="2.0.1014"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0071" seq="2008-0071" published="2008-06-16" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The Web UI interface in (1) BitTorrent before 6.0.3 build 8642 and (2) uTorrent before 1.8beta build 10524 allows remote attackers to cause a denial of service (application crash) via an HTTP request with a malformed Range header.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3943">3943</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020266">1020266</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493269/100/0/threaded">20080611 Secunia Research: uTorrent / BitTorrent Web UI HTTP "Range" Header DoS</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29661" patch="1">29661</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020265">1020265</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1808">ADV-2008-1808</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1809">ADV-2008-1809</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5918">5918</ref>
    </refs>
    <vuln_soft>
      <prod name="bittorrent" vendor="bittorrent">
        <vers num="3.9.1"/>
        <vers num="4.0.0"/>
        <vers num="4.0.1"/>
        <vers num="4.0.2"/>
        <vers num="4.0.3"/>
        <vers num="4.0.4"/>
        <vers num="4.1.0"/>
        <vers num="4.1.1"/>
        <vers num="4.1.2"/>
        <vers num="4.1.3"/>
        <vers num="4.1.4"/>
        <vers num="4.1.5"/>
        <vers num="4.1.6"/>
        <vers num="4.1.7"/>
        <vers num="4.1.8"/>
        <vers num="4.2.0"/>
        <vers num="4.2.1"/>
        <vers num="4.2.2"/>
        <vers num="4.3.0"/>
        <vers num="4.3.1"/>
        <vers num="4.3.2"/>
        <vers num="4.3.3"/>
        <vers num="4.3.4"/>
        <vers num="4.3.5"/>
        <vers num="4.3.6"/>
        <vers num="4.4.0"/>
        <vers num="4.4.1"/>
        <vers num="4.9.2"/>
        <vers num="4.9.3"/>
        <vers num="4.9.4"/>
        <vers num="4.9.5"/>
        <vers num="4.9.6"/>
        <vers num="4.9.7"/>
        <vers num="4.9.8"/>
        <vers num="4.9.9"/>
        <vers num="4.20.0"/>
        <vers num="4.20.1"/>
        <vers num="4.20.2"/>
        <vers num="4.20.4"/>
        <vers num="4.20.6"/>
        <vers num="4.20.7"/>
        <vers num="4.20.8"/>
        <vers num="4.20.9"/>
        <vers num="4.22.0"/>
        <vers num="4.22.1"/>
        <vers num="4.22.4"/>
        <vers num="4.24.0"/>
        <vers num="4.24.2"/>
        <vers num="4.26.0"/>
        <vers num="4.27.1"/>
        <vers num="4.27.2"/>
        <vers num="5.0.0"/>
        <vers num="5.0.1"/>
        <vers num="5.0.2"/>
        <vers num="5.0.3"/>
        <vers num="5.0.4"/>
        <vers num="5.0.5"/>
        <vers num="5.0.6"/>
        <vers num="5.0.7"/>
        <vers num="5.0.8"/>
        <vers num="5.0.9"/>
        <vers num="5.2.0"/>
        <vers num="6.0"/>
        <vers num="6.0.1"/>
        <vers num="6.0.2" prev="1"/>
      </prod>
      <prod name="utorrent" vendor="utorrent">
        <vers num="1.1.1"/>
        <vers num="1.1.3"/>
        <vers num="1.1.4"/>
        <vers num="1.1.5"/>
        <vers num="1.1.6"/>
        <vers num="1.1.7"/>
        <vers num="1.2"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2"/>
        <vers num="1.3"/>
        <vers num="1.4"/>
        <vers num="1.4.2"/>
        <vers num="1.5"/>
        <vers num="1.6"/>
        <vers num="1.7"/>
        <vers num="1.7.1"/>
        <vers num="1.7.2"/>
        <vers num="1.7.3"/>
        <vers num="1.7.4"/>
        <vers num="1.7.5"/>
        <vers num="1.7.6"/>
        <vers num="1.7.7" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0072" seq="2008-0072" published="2008-03-05" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Format string vulnerability in the emf_multipart_encrypted function in mail/em-format.c in Evolution 2.12.3 and earlier allows remote attackers to execute arbitrary code via a crafted encrypted message, as demonstrated using the Version field.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00003.html">SUSE-SA:2008:014</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200803-12.xml">GLSA-200803-12</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0105">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0105</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1512" patch="1">DSA-1512</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/512491">VU#512491</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:063">MDVSA-2008:063</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0177.html" adv="1">RHSA-2008:0177</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0178.html" adv="1">RHSA-2008:0178</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492684/100/0/threaded">20080528 rPSA-2008-0105-1 evolution</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28102">28102</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019540">1019540</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-583-1">USN-583-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0768/references" adv="1">ADV-2008-0768</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41011">evolution-emfmultipart-format-string(41011)</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2310">https://issues.rpath.com/browse/RPL-2310</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10701">oval:org.mitre.oval:def:10701</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00190.html">FEDORA-2008-2290</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00195.html">FEDORA-2008-2292</ref>
    </refs>
    <vuln_soft>
      <prod name="evolution" vendor="gnome">
        <vers num="2.12.3" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0073" seq="2008-0073" published="2008-03-24" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Array index error in the sdpplin_parse function in input/libreal/sdpplin.c in xine-lib 1.1.10.1 allows remote RTSP servers to execute arbitrary code via a large streamid SDP parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00008.html">SUSE-SR:2008:007</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00001.html">SUSE-SR:2008:012</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200804-25.xml">GLSA-200804-25</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200808-01.xml">GLSA-200808-01</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=585488&amp;group_id=9655" patch="1">http://sourceforge.net/project/shownotes.php?release_id=585488&amp;group_id=9655</ref>
      <ref source="CONFIRM" url="http://wiki.videolan.org/Changelog/0.8.6f">http://wiki.videolan.org/Changelog/0.8.6f</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1536">DSA-1536</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1543">DSA-1543</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:178">MDVSA-2008:178</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:219">MDVSA-2008:219</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28312">28312</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019682">1019682</ref>
      <ref source="SLACKWARE" url="http://www.slackware.org/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.392408">SSA:2008-089-03</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-635-1">USN-635-1</ref>
      <ref source="CONFIRM" url="http://www.videolan.org/security/sa0803.php">http://www.videolan.org/security/sa0803.php</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0923">ADV-2008-0923</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0985">ADV-2008-0985</ref>
      <ref source="CONFIRM" url="http://xinehq.de/index.php/news" patch="1">http://xinehq.de/index.php/news</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41339">xinelib-sdpplinparse-bo(41339)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00143.html">FEDORA-2008-2945</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00456.html">FEDORA-2008-2569</ref>
    </refs>
    <vuln_soft>
      <prod name="xine-lib" vendor="xine">
        <vers num="1.1.10.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0074" seq="2008-0074" published="2008-02-12" modified="2019-07-03" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Microsoft Internet Information Services (IIS) 5.0 through 7.0 allows local users to gain privileges via unknown vectors related to file change notifications in the TPRoot, NNTPFile\Root, or WWWRoot folders.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=120361015026386&amp;w=2">HPSBST02314</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27101">27101</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019384">1019384</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-043C.html">TA08-043C</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0507/references">ADV-2008-0507</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-005">MS08-005</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5389">oval:org.mitre.oval:def:5389</ref>
    </refs>
    <vuln_soft>
      <prod name="internet_information_server" vendor="microsoft">
        <vers num="5.1"/>
        <vers num="6.0" edition="beta"/>
        <vers num="7.0"/>
      </prod>
      <prod name="internet_information_services" vendor="microsoft">
        <vers num="5.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0075" seq="2008-0075" published="2008-02-12" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Microsoft Internet Information Services (IIS) 5.1 through 6.0 allows remote attackers to execute arbitrary code via crafted inputs to ASP pages.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=120361015026386&amp;w=2">HPSBST02314</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27676">27676</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019385">1019385</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-043C.html">TA08-043C</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0508/references">ADV-2008-0508</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-006">MS08-006</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5308">oval:org.mitre.oval:def:5308</ref>
    </refs>
    <vuln_soft>
      <prod name="internet_information_server" vendor="microsoft">
        <vers num="5.1"/>
        <vers num="6.0" edition="beta"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0076" seq="2008-0076" published="2008-02-12" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Microsoft Internet Explorer 5.01, 6 SP1 and SP2, and 7 allows remote attackers to execute arbitrary code via crafted HTML layout combinations, aka "HTML Rendering Memory Corruption Vulnerability."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=120361015026386&amp;w=2">HPSBST02314</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27668">27668</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019379">1019379</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-043C.html">TA08-043C</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0512/references">ADV-2008-0512</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-010">MS08-010</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5487">oval:org.mitre.oval:def:5487</ref>
    </refs>
    <vuln_soft>
      <prod name="ie" vendor="microsoft">
        <vers num="5.01" edition="windows_2000_sp4"/>
        <vers num="6" edition="windows_server_2003_sp1"/>
        <vers num="6" edition="windows_server_2003_sp1_itanium"/>
        <vers num="6" edition="windows_xp_sp2"/>
        <vers num="7" edition="windows_server_2003_sp1"/>
        <vers num="7" edition="windows_xp_sp2"/>
      </prod>
      <prod name="internet_explorer" vendor="microsoft">
        <vers num="6" edition=":windows_server_2003_sp2"/>
        <vers num="6" edition=":windows_server_2003_sp2_itanium"/>
        <vers num="6" edition=":windows_server_2003_x64_edition"/>
        <vers num="6" edition=":windows_server_2003_x64_edition_sp2"/>
        <vers num="6" edition=":windows_xp_professional_x64_edition"/>
        <vers num="6" edition=":windows_xp_professional_x64_edition_sp2"/>
        <vers num="7" edition=":windows_server_2003_sp1_itanium"/>
        <vers num="7" edition=":windows_server_2003_sp2"/>
        <vers num="7" edition=":windows_server_2003_sp2_itanium"/>
        <vers num="7" edition=":windows_server_2003_x64_edition"/>
        <vers num="7" edition=":windows_server_2003_x64_edition_sp2"/>
        <vers num="7" edition=":windows_vista"/>
        <vers num="7" edition=":windows_vista_x64"/>
        <vers num="7" edition=":windows_xp_professional_x64_edition"/>
        <vers num="7" edition=":windows_xp_professional_x64_edition_sp2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0077" seq="2008-0077" published="2008-02-12" modified="2019-02-26" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Use-after-free vulnerability in Microsoft Internet Explorer 6 SP1, 6 SP2, and and 7 allows remote attackers to execute arbitrary code by assigning malformed values to certain properties, as demonstrated using the by property of an animateMotion SVG element, aka "Property Memory Corruption Vulnerability."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=661">20080212 Microsoft Internet Explorer Property Memory Corruption Vulnerability</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=120361015026386&amp;w=2">HPSBST02314</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/228569">VU#228569</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488048/100/0/threaded">20080213 ZDI-08-006: Microsoft Internet Explorer SVG animateMotion.by Code Execution Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27666">27666</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019380">1019380</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-043C.html">TA08-043C</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0512/references" adv="1">ADV-2008-0512</ref>
      <ref source="MISC" url="http://www.zerodayinitiative.com/advisories/ZDI-08-006.html">http://www.zerodayinitiative.com/advisories/ZDI-08-006.html</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-010">MS08-010</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5396">oval:org.mitre.oval:def:5396</ref>
    </refs>
    <vuln_soft>
      <prod name="ie" vendor="microsoft">
        <vers num="6" edition="sp1"/>
        <vers num="7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0078" seq="2008-0078" published="2008-02-12" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in an ActiveX control (dxtmsft.dll) in Microsoft Internet Explorer 5.01, 6 SP1 and SP2, and 7 allows remote attackers to execute arbitrary code via a crafted image, aka "Argument Handling Memory Corruption Vulnerability."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=120361015026386&amp;w=2">HPSBST02314</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27689">27689</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019381">1019381</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-043C.html">TA08-043C</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0512/references">ADV-2008-0512</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-010">MS08-010</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4904">oval:org.mitre.oval:def:4904</ref>
    </refs>
    <vuln_soft>
      <prod name="activex" vendor="microsoft">
        <vers num=""/>
      </prod>
      <prod name="ie" vendor="microsoft">
        <vers num="5.01" edition="windows_2000_sp4"/>
        <vers num="6" edition="windows_server_2003_sp1"/>
        <vers num="6" edition="windows_server_2003_sp1_itanium"/>
        <vers num="6" edition="windows_xp_sp2"/>
        <vers num="7" edition="windows_server_2003_sp1"/>
        <vers num="7" edition="windows_xp_sp2"/>
      </prod>
      <prod name="internet_explorer" vendor="microsoft">
        <vers num="6" edition=":windows_server_2003_sp2"/>
        <vers num="6" edition=":windows_server_2003_sp2_itanium"/>
        <vers num="6" edition=":windows_server_2003_x64_edition"/>
        <vers num="6" edition=":windows_server_2003_x64_edition_sp2"/>
        <vers num="6" edition=":windows_xp_professional_x64_edition"/>
        <vers num="6" edition=":windows_xp_professional_x64_edition_sp2"/>
        <vers num="7" edition=":windows_server_2003_sp1_itanium"/>
        <vers num="7" edition=":windows_server_2003_sp2"/>
        <vers num="7" edition=":windows_server_2003_sp2_itanium"/>
        <vers num="7" edition=":windows_server_2003_x64_edition"/>
        <vers num="7" edition=":windows_server_2003_x64_edition_sp2"/>
        <vers num="7" edition=":windows_vista"/>
        <vers num="7" edition=":windows_vista_x64"/>
        <vers num="7" edition=":windows_xp_professional_x64_edition"/>
        <vers num="7" edition=":windows_xp_professional_x64_edition_sp2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0079" seq="2008-0079" published="2017-05-11" modified="2017-05-11" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2008. Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2008-0080" seq="2008-0080" published="2008-02-12" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in the WebDAV Mini-Redirector in Microsoft Windows XP SP2, Server 2003 SP1 and SP2, and Vista allows remote attackers to execute arbitrary code via a crafted WebDAV response.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=120361015026386&amp;w=2">HPSBST02314</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27670">27670</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019372">1019372</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-043C.html">TA08-043C</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0509/references">ADV-2008-0509</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-007">MS08-007</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5381">oval:org.mitre.oval:def:5381</ref>
    </refs>
    <vuln_soft>
      <prod name="webdav_mini-redirector" vendor="microsoft">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0081" seq="2008-0081" published="2008-01-16" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Microsoft Excel 2000 SP3 through 2003 SP2, Viewer 2003, and Office 2004 for Mac allows user-assisted remote attackers to execute arbitrary code via crafted macros, aka "Macro Validation Vulnerability," a different vulnerability than CVE-2007-3490.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=120585858807305&amp;w=2">SSRT080028</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019200">1019200</ref>
      <ref source="MSKB" url="http://www.microsoft.com/technet/security/advisory/947563.mspx" adv="1">947563</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27305" patch="1">27305</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-071A.html">TA08-071A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0146" adv="1">ADV-2008-0146</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0846/references" adv="1">ADV-2008-0846</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-014">MS08-014</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39699">microsoft-excel-unspecified-code-execution(39699)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5546">oval:org.mitre.oval:def:5546</ref>
    </refs>
    <vuln_soft>
      <prod name="excel" vendor="microsoft">
        <vers num="2000" edition="sp3"/>
        <vers num="2002" edition="sp3"/>
        <vers num="2003" edition="sp2"/>
      </prod>
      <prod name="excel_viewer" vendor="microsoft">
        <vers num="2003"/>
      </prod>
      <prod name="office" vendor="microsoft">
        <vers num="2004" edition=":mac"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0082" seq="2008-0082" published="2008-08-12" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">An ActiveX control (Messenger.UIAutomation.1) in Windows Messenger 4.7 and 5.1 is marked as safe-for-scripting, which allows remote attackers to control the Messenger application, and "change state," obtain contact information, and establish audio or video connections without notification via unknown vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=121915960406986&amp;w=2">HPSBST02360</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/495467/100/0/threaded">20080814 Microsoft Windows Messenger Remote Illegal Access Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30551">30551</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020681">1020681</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-225A.html">TA08-225A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2354">ADV-2008-2354</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-050">MS08-050</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5995">oval:org.mitre.oval:def:5995</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_messenger" vendor="microsoft">
        <vers num="4.7"/>
        <vers num="5.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0083" seq="2008-0083" published="2008-04-08" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The (1) VBScript (VBScript.dll) and (2) JScript (JScript.dll) scripting engines 5.1 and 5.6, as used in Microsoft Windows 2000 SP4, XP SP2, and Server 2003 SP1 and SP2, do not properly decode script, which allows remote attackers to execute arbitrary code via unknown vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=120845064910729&amp;w=2">SSRT080048</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28551" patch="1">28551</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019799">1019799</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-099A.html">TA08-099A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1146/references" adv="1">ADV-2008-1146</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-022">MS08-022</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5495">oval:org.mitre.oval:def:5495</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_2000" vendor="microsoft">
        <vers num="" edition="sp4"/>
      </prod>
      <prod name="windows_2003_server" vendor="microsoft">
        <vers num="" edition=":x64"/>
        <vers num="" edition="sp1:itanium"/>
        <vers num="" edition="sp2:itanium"/>
        <vers num="" edition="sp2:x64"/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition=":x64"/>
        <vers num="" edition="sp2:x64"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0084" seq="2008-0084" published="2008-02-12" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the TCP/IP support in Microsoft Windows Vista allows remote DHCP servers to cause a denial of service (hang and restart) via a crafted DHCP packet.</descript>
    </desc>
    <sols>
      <sol source="nvd">Apply patches.

Windows Vista:
http://www.microsoft.com/downloads/de...=8ce9608b-7049-47cd-adc4-22a803877d33

Windows Vista x64 Edition:
http://www.microsoft.com/downloads/de...=d7b9c3d1-9c23-4e05-bac6-d0b327feaf53</sol>
    </sols>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=120361015026386&amp;w=2">HPSBST02314</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27634">27634</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019383">1019383</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-043C.html">TA08-043C</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0506/references">ADV-2008-0506</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-004">MS08-004</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5240">oval:org.mitre.oval:def:5240</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_vista" vendor="microsoft">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0085" seq="2008-0085" published="2008-07-08" modified="2019-02-27" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">SQL Server 7.0 SP4, 2000 SP4, 2005 SP1 and SP2, 2000 Desktop Engine (MSDE 2000) SP4, 2005 Express Edition SP1 and SP2, and 2000 Desktop Engine (WMSDE); Microsoft Data Engine (MSDE) 1.0 SP4; and Internal Database (WYukon) SP2 does not initialize memory pages when reallocating memory, which allows database operators to obtain sensitive information (database contents) via unknown vectors related to memory page reuse.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/516397/100/0/threaded" adv="1">20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020441" adv="1">1020441</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-190A.html" adv="1">TA08-190A</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2011-0003.html" adv="1" patch="1">http://www.vmware.com/security/advisories/VMSA-2011-0003.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html" adv="1">http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2022/references">ADV-2008-2022</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-040" adv="1" patch="1">MS08-040</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14213" adv="1">oval:org.mitre.oval:def:14213</ref>
    </refs>
    <vuln_soft>
      <prod name="data_engine" vendor="microsoft">
        <vers num="1.0" edition="sp4"/>
      </prod>
      <prod name="sql_server" vendor="microsoft">
        <vers num="7.0" edition="sp4"/>
        <vers num="2000" edition="sp4:~~~~itanium~"/>
        <vers num="2005" edition="sp1:~~~~itanium~"/>
        <vers num="2005" edition="sp1:~~~~x64~"/>
        <vers num="2005" edition="sp1:express"/>
        <vers num="2005" edition="sp2:~~~~itanium~"/>
        <vers num="2005" edition="sp2:~~~~x64~"/>
        <vers num="2005" edition="sp2:express"/>
      </prod>
      <prod name="sql_server_desktop_engine" vendor="microsoft">
        <vers num="2000" edition="sp4"/>
      </prod>
      <prod name="wmsde" vendor="microsoft">
        <vers num="2000"/>
      </prod>
      <prod name="wyukon" vendor="microsoft">
        <vers num="" edition="sp2:~~~~x64~"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0086" seq="2008-0086" published="2008-07-08" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="9.0" CVSS_base_score="9.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the convert function in Microsoft SQL Server 2000 SP4, 2000 Desktop Engine (MSDE 2000) SP4, and 2000 Desktop Engine (WMSDE) allows remote authenticated users to execute arbitrary code via a crafted SQL expression.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/494082/100/0/threaded">20080708 Re: [Full-disclosure] iDefense Security Advisory 07.08.08: Microsoft SQL Server Restore Integer Underflow Vulnerability</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/516397/100/0/threaded">20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020441">1020441</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-190A.html">TA08-190A</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2011-0003.html">http://www.vmware.com/security/advisories/VMSA-2011-0003.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html">http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2022/references">ADV-2008-2022</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-040">MS08-040</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14052">oval:org.mitre.oval:def:14052</ref>
    </refs>
    <vuln_soft>
      <prod name="data_engine" vendor="microsoft">
        <vers num="1.0" edition="sp4"/>
      </prod>
      <prod name="sql_server" vendor="microsoft">
        <vers num="7.0" edition="sp4"/>
        <vers num="2000" edition="sp4"/>
        <vers num="2005" edition="sp2"/>
      </prod>
      <prod name="sql_server_desktop_engine" vendor="microsoft">
        <vers num="2000" edition="sp4"/>
      </prod>
      <prod name="sql_server_express_edition" vendor="microsoft">
        <vers num="2005" edition="sp2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0087" seq="2008-0087" published="2008-04-08" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="8.8" CVSS_base_score="8.8" CVSS_impact_subscore="9.2" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:C/A:C)">
    <desc>
      <descript source="cve">The DNS client in Microsoft Windows 2000 SP4, XP SP2, Server 2003 SP1 and SP2, and Vista uses predictable DNS transaction IDs, which allows remote attackers to spoof DNS responses.</descript>
    </desc>
    <loss_types>
      <avail/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=120845064910729&amp;w=2" adv="1">SSRT080048</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490575/100/0/threaded">20080408 Microsoft Windows DNS Stub Resolver Cache Poisoning (MS08-020)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28553" adv="1" patch="1">28553</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019802" adv="1">1019802</ref>
      <ref source="MISC" url="http://www.trusteer.com/docs/windowsresolver.html">http://www.trusteer.com/docs/windowsresolver.html</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-099A.html" adv="1">TA08-099A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1144/references">ADV-2008-1144</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-020">MS08-020</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5314" adv="1">oval:org.mitre.oval:def:5314</ref>
    </refs>
    <vuln_soft>
      <prod name="windows-nt" vendor="microsoft">
        <vers num="xp" edition="sp2:~~pro~~x64~"/>
      </prod>
      <prod name="windows_2000" vendor="microsoft">
        <vers num="" edition="sp4"/>
      </prod>
      <prod name="windows_2003_server" vendor="microsoft">
        <vers num="" edition="sp1:~~~~itanium~"/>
        <vers num="" edition="sp2:~~~~itanium~"/>
        <vers num="" edition="sp2:~~~~x64~"/>
      </prod>
      <prod name="windows_vista" vendor="microsoft">
        <vers num="" edition=":~~~~x64~"/>
        <vers num="-"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0088" seq="2008-0088" published="2008-02-12" modified="2019-04-30" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Active Directory on Microsoft Windows 2000 and Windows Server 2003, and Active Directory Application Mode (ADAM) on XP and Server 2003, allows remote attackers to cause a denial of service (hang and restart) via a crafted LDAP request.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=120361015026386&amp;w=2">HPSBST02314</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27638">27638</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019382">1019382</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-043C.html">TA08-043C</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0505/references">ADV-2008-0505</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-003">MS08-003</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5181">oval:org.mitre.oval:def:5181</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_2000" vendor="microsoft">
        <vers num="" edition="sp4"/>
      </prod>
      <prod name="windows_2003_server" vendor="microsoft">
        <vers num="sp1"/>
        <vers num="sp2"/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0089" seq="2008-0089" published="2008-01-03" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in uprofile.php in ClipShare allows remote attackers to execute arbitrary SQL commands via the UID parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27108">27108</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39364">clipshare-uprofile-sql-injection(39364)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4830">4830</ref>
    </refs>
    <vuln_soft>
      <prod name="clipshare" vendor="clip-share">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0090" seq="2008-0090" published="2008-01-03" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">A certain ActiveX control in npUpload.dll in DivX Player 6.6.0 allows remote attackers to cause a denial of service (Internet Explorer 7 crash) via a long argument to the SetPassword method.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27106">27106</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39386">divxwebplayer-npUpload-dos(39386)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4829">4829</ref>
    </refs>
    <vuln_soft>
      <prod name="divx_player" vendor="divx">
        <vers num="6.6.0"/>
      </prod>
      <prod name="ie" vendor="microsoft">
        <vers num="7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0091" seq="2008-0091" published="2008-01-03" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in download2.php in AGENCY4NET WEBFTP 1 allows remote attackers to read and delete arbitrary files via a .. (dot dot) in the file parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="VIM" url="http://www.attrition.org/pipermail/vim/2008-January/001865.html">20080104 true: AGENCY4NET WEBFTP directory traversal; deletion possible</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27092">27092</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0051">ADV-2008-0051</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39343">agency4net-download2-directory-traversal(39343)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4828">4828</ref>
    </refs>
    <vuln_soft>
      <prod name="webftp" vendor="agency4net">
        <vers num="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0092" seq="2008-0092" published="2008-01-03" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php in the search module in Appalachian State University phpWebSite 1.4.0 allows remote attackers to inject arbitrary web script or HTML via the search parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://phpwebsite.appstate.edu/blog/2143">http://phpwebsite.appstate.edu/blog/2143</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3511">3511</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/485704/100/0/threaded">20080101 Cross-Site Scripting (XSS) in phpWebSite 1.4.0 search</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27090">27090</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39391">phpwebsite-search-xss(39391)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpwebsite" vendor="phpwebsite">
        <vers num="1.4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0093" seq="2008-0093" published="2008-01-07" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in newticket.php in eTicket 1.5.5.2, and 1.5.6 RC2 and RC3, allow remote attackers to inject arbitrary web script or HTML via the (1) Name and (2) Subject parameters.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.digitrustgroup.com/advisories/web-application-security-eticket.html">http://www.digitrustgroup.com/advisories/web-application-security-eticket.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27130">27130</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39400">eticket-name-subject-xss(39400)</ref>
    </refs>
    <vuln_soft>
      <prod name="eticket" vendor="eticket">
        <vers num="1.5.5.2"/>
        <vers num="1.5.6_rc2"/>
        <vers num="1.5.6_rc3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0094" seq="2008-0094" published="2008-01-07" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple directory traversal vulnerabilities in MODx Content Management System 0.9.6.1 allow remote attackers to (1) include and execute arbitrary local files via a .. (dot dot) in the as_language parameter to assets/snippets/AjaxSearch/AjaxSearch.php, reached through index-ajax.php; and (2) read arbitrary local files via a .. (dot dot) in the file parameter to assets/js/htcmime.php.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://modxcms.com/forums/index.php/topic,21290.0.html">http://modxcms.com/forums/index.php/topic,21290.0.html</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3522">3522</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/485707/100/0/threaded">20080102 MODx CMS Source code disclosure, local file inclusion</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27096">27096</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27097">27097</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39352">modx-ajaxsearch-file-include(39352)</ref>
    </refs>
    <vuln_soft>
      <prod name="modxcms" vendor="modxcms">
        <vers num="0.9.6.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0095" seq="2008-0095" published="2008-01-07" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The SIP channel driver in Asterisk Open Source 1.4.x before 1.4.17, Business Edition before C.1.0-beta8, AsteriskNOW before beta7, Appliance Developer Kit before Asterisk 1.4 revision 95946, and Appliance s800i 1.0.x before 1.0.3.4 allows remote attackers to cause a denial of service (daemon crash) via a BYE message with an Also (Also transfer) header, which triggers a NULL pointer dereference.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugs.digium.com/view.php?id=11637" patch="1">http://bugs.digium.com/view.php?id=11637</ref>
      <ref source="CONFIRM" url="http://downloads.digium.com/pub/security/AST-2008-001.html" patch="1">http://downloads.digium.com/pub/security/AST-2008-001.html</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3520">3520</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/485727/100/0/threaded">20080102 AST-2008-001: Crash from transfer using BYE with Also header</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27110" patch="1">27110</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019152">1019152</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0019">ADV-2008-0019</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39361">asterisk-bye-also-dos(39361)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00166.html">FEDORA-2008-0198</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00167.html">FEDORA-2008-0199</ref>
    </refs>
    <vuln_soft>
      <prod name="asterisk_appliance_developer_kit" vendor="asterisk">
        <vers num="1.4_revision_95945" prev="1"/>
      </prod>
      <prod name="asterisk_business_edition" vendor="asterisk">
        <vers num="c.1.0beta7" prev="1"/>
      </prod>
      <prod name="asterisknow" vendor="asterisk">
        <vers num="beta_6" prev="1"/>
      </prod>
      <prod name="open_source" vendor="asterisk">
        <vers num="1.4.16" prev="1"/>
      </prod>
      <prod name="s800i" vendor="asterisk">
        <vers num="1.0.3.3" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0096" seq="2008-0096" published="2008-01-07" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple buffer overflows in Georgia SoftWorks SSH2 Server (GSW_SSHD) 7.01.0003 and earlier allow remote attackers to execute arbitrary code via a (1) a long username, which triggers an overflow in the log function; or (2) a long password.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/gswsshit-adv.txt">http://aluigi.altervista.org/adv/gswsshit-adv.txt</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3517">3517</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/485725/100/0/threaded">20080102 Multiple vulnerabilities in Georgia SoftWorks SSH2 Server 7.01.0003</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27103">27103</ref>
    </refs>
    <vuln_soft>
      <prod name="ssh2_server" vendor="georgia_softworks">
        <vers num="7.01.0003" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0097" seq="2008-0097" published="2008-01-07" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Format string vulnerability in the log function in Georgia SoftWorks SSH2 Server (GSW_SSHD) 7.01.0003 and earlier allows remote attackers to execute arbitrary code via format string specifiers in the username field, as demonstrated by a certain LoginPassword message.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/gswsshit-adv.txt">http://aluigi.altervista.org/adv/gswsshit-adv.txt</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3517">3517</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/485725/100/0/threaded">20080102 Multiple vulnerabilities in Georgia SoftWorks SSH2 Server 7.01.0003</ref>
    </refs>
    <vuln_soft>
      <prod name="ssh2_server" vendor="georgia_softworks">
        <vers num="7.01.0003" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0098" seq="2008-0098" published="2008-01-07" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in RealPlayer 11 build 6.0.14.748 allows remote attackers to execute arbitrary code via unspecified vectors.  NOTE: As of 20080103, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://gleg.net/realplayer11.html">http://gleg.net/realplayer11.html</ref>
      <ref source="MLIST" url="http://lists.immunitysec.com/pipermail/dailydave/2008-January/004811.html">[Dailydave] 20080101 0day RealPlayer exploit demo</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27091">27091</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019153">1019153</ref>
      <ref source="MISC" url="http://www.us-cert.gov/current/index.html#public_exploit_code_for_realplayer">http://www.us-cert.gov/current/index.html#public_exploit_code_for_realplayer</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0016">ADV-2008-0016</ref>
    </refs>
    <vuln_soft>
      <prod name="realplayer" vendor="realnetworks">
        <vers num="11_build_6.0.14.748"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0099" seq="2008-0099" published="2008-01-07" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in MyPHP Forum 3.0 and earlier allow remote attackers to execute arbitrary SQL commands via the searchtext parameter to search.php, and unspecified other vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27118">27118</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4831">4831</ref>
    </refs>
    <vuln_soft>
      <prod name="myphp_forum" vendor="myphp_forum">
        <vers num="3.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0100" seq="2008-0100" published="2008-01-07" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the Scene::errorf function in Scene.cpp in White_Dune 0.29 beta791 and earlier allows remote attackers to execute arbitrary code via a long string in a .WRL file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/whitedunboffs-adv.txt">http://aluigi.altervista.org/adv/whitedunboffs-adv.txt</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3516">3516</ref>
      <ref source="CONFIRM" url="http://vrml.cip.ica.uni-stuttgart.de/dune/news.html">http://vrml.cip.ica.uni-stuttgart.de/dune/news.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/485724/100/0/threaded">20080102 Buffer-overflow and format string in White_Dune 0.29beta791</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27102" patch="1">27102</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39385">whitedune-sceneerrorf-bo(39385)</ref>
    </refs>
    <vuln_soft>
      <prod name="white_dune" vendor="white_dune">
        <vers num="0.29beta791" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0101" seq="2008-0101" published="2008-01-07" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Format string vulnerability in the swDebugf function in DuneApp.cpp in White_Dune 0.29 beta791 and earlier allows remote attackers to execute arbitrary code via format string specifiers in a .WRL file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/whitedunboffs-adv.txt">http://aluigi.altervista.org/adv/whitedunboffs-adv.txt</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3516">3516</ref>
      <ref source="CONFIRM" url="http://vrml.cip.ica.uni-stuttgart.de/dune/news.html">http://vrml.cip.ica.uni-stuttgart.de/dune/news.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/485724/100/0/threaded">20080102 Buffer-overflow and format string in White_Dune 0.29beta791</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27102" patch="1">27102</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39388">whitedune-swdegugf-format-string(39388)</ref>
    </refs>
    <vuln_soft>
      <prod name="white_dune" vendor="white_dune">
        <vers num="0.29beta791" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0102" seq="2008-0102" published="2008-02-12" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Microsoft Office Publisher 2000, 2002, and 2003 SP2 allows remote attackers to execute arbitrary code via a crafted .pub file, related to invalid "memory values," aka "Publisher Invalid Memory Reference Vulnerability."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=120361015026386&amp;w=2">HPSBST02314</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27739">27739</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019376">1019376</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-043C.html">TA08-043C</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0514/references">ADV-2008-0514</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-012">MS08-012</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5305">oval:org.mitre.oval:def:5305</ref>
    </refs>
    <vuln_soft>
      <prod name="publisher" vendor="microsoft">
        <vers num="2000"/>
        <vers num="2002"/>
        <vers num="2003" edition="sp2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0103" seq="2008-0103" published="2008-02-12" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Microsoft Office 2000 SP3, Office XP SP3, Office 2003 SP2, and Office 2004 for Mac allows remote attackers to execute arbitrary code via an Office document that contains a malformed object, related to a "memory handling error," aka "Microsoft Office Execution Jump Vulnerability."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=120361015026386&amp;w=2">HPSBST02314</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27738">27738</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019375">1019375</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-043C.html">TA08-043C</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0515/references">ADV-2008-0515</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-013">MS08-013</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5407">oval:org.mitre.oval:def:5407</ref>
    </refs>
    <vuln_soft>
      <prod name="office" vendor="microsoft">
        <vers num="2000" edition="sp3"/>
        <vers num="2003" edition="sp2"/>
        <vers num="2004" edition=":mac%2bos"/>
        <vers num="xp" edition="sp3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0104" seq="2008-0104" published="2008-02-12" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Microsoft Office Publisher 2000, 2002, and 2003 SP2 allows remote attackers to execute arbitrary code via a crafted .pub file, aka "Publisher Memory Corruption Vulnerability."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=120361015026386&amp;w=2">HPSBST02314</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27740">27740</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019377">1019377</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-043C.html">TA08-043C</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0514/references">ADV-2008-0514</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-012">MS08-012</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4547">oval:org.mitre.oval:def:4547</ref>
    </refs>
    <vuln_soft>
      <prod name="office" vendor="microsoft">
        <vers num="2000"/>
        <vers num="2003" edition="sp2"/>
        <vers num="xp"/>
      </prod>
      <prod name="publisher" vendor="microsoft">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0105" seq="2008-0105" published="2008-02-12" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Microsoft Works 6 File Converter, as used in Office 2003 SP2 and SP3, Works 8.0, and Works Suite 2005, allows remote attackers to execute arbitrary code via a .wps file with crafted section header index table information, aka "Microsoft Works File Converter Index Table Vulnerability."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=120361015026386&amp;w=2">HPSBST02314</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27658">27658</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019387">1019387</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-043C.html">TA08-043C</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0513/references">ADV-2008-0513</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-011">MS08-011</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5009">oval:org.mitre.oval:def:5009</ref>
    </refs>
    <vuln_soft>
      <prod name="office" vendor="microsoft">
        <vers num="2003" edition="sp2"/>
        <vers num="2003" edition="sp3"/>
      </prod>
      <prod name="works" vendor="microsoft">
        <vers num="8.0"/>
        <vers num="2005"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0106" seq="2008-0106" published="2008-07-08" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="9.0" CVSS_base_score="9.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in Microsoft SQL Server 2005 SP1 and SP2, and 2005 Express Edition SP1 and SP2, allows remote authenticated users to execute arbitrary code via a crafted insert statement.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/494082/100/0/threaded">20080708 Re: [Full-disclosure] iDefense Security Advisory 07.08.08: Microsoft SQL Server Restore Integer Underflow Vulnerability</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/516397/100/0/threaded">20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020441">1020441</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-190A.html">TA08-190A</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2011-0003.html">http://www.vmware.com/security/advisories/VMSA-2011-0003.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html">http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2022/references">ADV-2008-2022</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-040">MS08-040</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13785">oval:org.mitre.oval:def:13785</ref>
    </refs>
    <vuln_soft>
      <prod name="data_engine" vendor="microsoft">
        <vers num="1.0" edition="sp4"/>
      </prod>
      <prod name="sql_server" vendor="microsoft">
        <vers num="7.0" edition="sp4"/>
        <vers num="2000" edition="sp4"/>
        <vers num="2005" edition="sp2"/>
      </prod>
      <prod name="sql_server_desktop_engine" vendor="microsoft">
        <vers num="2000" edition="sp4"/>
      </prod>
      <prod name="sql_server_express_edition" vendor="microsoft">
        <vers num="2005" edition="sp2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0107" seq="2008-0107" published="2008-07-08" modified="2019-02-26" severity="High" CVSS_version="2.0" CVSS_score="9.0" CVSS_base_score="9.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Integer underflow in SQL Server 7.0 SP4, 2000 SP4, 2005 SP1 and SP2, 2000 Desktop Engine (MSDE 2000) SP4, 2005 Express Edition SP1 and SP2, and 2000 Desktop Engine (WMSDE); Microsoft Data Engine (MSDE) 1.0 SP4; and Internal Database (WYukon) SP2 allows remote authenticated users to execute arbitrary code via a (1) SMB or (2) WebDAV pathname for an on-disk file (aka stored backup file) with a crafted record size value, which triggers a heap-based buffer overflow, aka "SQL Server Memory Corruption Vulnerability."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=723">20080708 Microsoft SQL Server Restore Integer Underflow Vulnerability</ref>
      <ref source="MISC" url="http://www.insomniasec.com/advisories/ISVA-080709.1.htm">http://www.insomniasec.com/advisories/ISVA-080709.1.htm</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/494082/100/0/threaded">20080708 Re: [Full-disclosure] iDefense Security Advisory 07.08.08: Microsoft SQL Server Restore Integer Underflow Vulnerability</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/516397/100/0/threaded">20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30119">30119</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020441">1020441</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-190A.html">TA08-190A</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2011-0003.html">http://www.vmware.com/security/advisories/VMSA-2011-0003.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html">http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2022/references" adv="1">ADV-2008-2022</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-040">MS08-040</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13936">oval:org.mitre.oval:def:13936</ref>
    </refs>
    <vuln_soft>
      <prod name="data_engine" vendor="microsoft">
        <vers num="1.0" edition="sp4"/>
      </prod>
      <prod name="sql_server" vendor="microsoft">
        <vers num="7.0" edition="sp4"/>
        <vers num="2000" edition="sp4:itanium"/>
        <vers num="2005" edition="sp1:express"/>
        <vers num="2005" edition="sp1:itanium"/>
        <vers num="2005" edition="sp1:x64"/>
        <vers num="2005" edition="sp2:express"/>
        <vers num="2005" edition="sp2:itanium"/>
        <vers num="2005" edition="sp2:x64"/>
      </prod>
      <prod name="sql_server_desktop_engine" vendor="microsoft">
        <vers num="2000" edition="sp4"/>
      </prod>
      <prod name="wmsde" vendor="microsoft">
        <vers num="2000"/>
      </prod>
      <prod name="wyukon" vendor="microsoft">
        <vers num="" edition="sp2:x64"/>
      </prod>
      <prod name="windows_server_2008" vendor="microsoft">
        <vers num="" edition=":x32"/>
        <vers num="" edition=":x64"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0108" seq="2008-0108" published="2008-02-12" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in wkcvqd01.dll in Microsoft Works 6 File Converter, as used in Office 2003 SP2 and SP3, Works 8.0, and Works Suite 2005, allows remote attackers to execute arbitrary code via a .wps file with crafted field lengths, aka "Microsoft Works File Converter Field Length Vulnerability."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=660">20080208 Microsoft Office Works Converter Stack-based Buffer Overflow Vulnerability</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=120361015026386&amp;w=2">HPSBST02314</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27659">27659</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019388">1019388</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-043C.html">TA08-043C</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0513/references" adv="1">ADV-2008-0513</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-011">MS08-011</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5202">oval:org.mitre.oval:def:5202</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5107">5107</ref>
    </refs>
    <vuln_soft>
      <prod name="office" vendor="microsoft">
        <vers num="2003" edition="sp2"/>
        <vers num="2003" edition="sp3"/>
      </prod>
      <prod name="works" vendor="microsoft">
        <vers num="8.0"/>
        <vers num="2005"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0109" seq="2008-0109" published="2008-02-12" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Word in Microsoft Office 2000 SP3, XP SP3, Office 2003 SP2, and Office Word Viewer 2003 allows remote attackers to execute arbitrary code via crafted fields within the File Information Block (FIB) of a Word file, which triggers length calculation errors and memory corruption.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=120361015026386&amp;w=2">HPSBST02314</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/692417">VU#692417</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488071/100/0/threaded">20080213 [Reversemode Advisory] February Advisories : Microsoft Word 2003 + Fortinet Forticlient</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27656">27656</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019374">1019374</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-043C.html">TA08-043C</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0511/references" adv="1">ADV-2008-0511</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-009">MS08-009</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5073">oval:org.mitre.oval:def:5073</ref>
    </refs>
    <vuln_soft>
      <prod name="office" vendor="microsoft">
        <vers num="2000" edition="sp3"/>
        <vers num="2003" edition="sp2"/>
        <vers num="xp" edition="sp3"/>
      </prod>
      <prod name="word" vendor="microsoft">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0110" seq="2008-0110" published="2008-03-11" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Microsoft Outlook in Office 2000 SP3, XP SP3, 2003 SP2 and Sp3, and Office System allows user-assisted remote attackers to execute arbitrary code via a crafted mailto URI.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=120585858807305&amp;w=2">SSRT080028</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/393305">VU#393305</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28147" patch="1">28147</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019579">1019579</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-071A.html">TA08-071A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0847/references">ADV-2008-0847</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-015">MS08-015</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5278">oval:org.mitre.oval:def:5278</ref>
    </refs>
    <vuln_soft>
      <prod name="office" vendor="microsoft">
        <vers num="2000" edition="sp3"/>
        <vers num="2003" edition="sp2"/>
        <vers num="2003" edition="sp3"/>
        <vers num="2007"/>
        <vers num="xp" edition="sp3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0111" seq="2008-0111" published="2008-03-11" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Microsoft Excel 2000 SP3 through 2007, Viewer 2003, Compatibility Pack, and Office 2004 for Mac allows user-assisted remote attackers to execute arbitrary code via crafted data validation records, aka "Excel Data Validation Record Vulnerability."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=120585858807305&amp;w=2">SSRT080028</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28094" patch="1">28094</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019582">1019582</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-071A.html" patch="1">TA08-071A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0846/references">ADV-2008-0846</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-014">MS08-014</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5114">oval:org.mitre.oval:def:5114</ref>
    </refs>
    <vuln_soft>
      <prod name="excel" vendor="microsoft">
        <vers num="2000" edition="sp3"/>
        <vers num="2002" edition="sp3"/>
        <vers num="2003" edition="sp2"/>
      </prod>
      <prod name="excel_viewer" vendor="microsoft">
        <vers num="2003"/>
      </prod>
      <prod name="office" vendor="microsoft">
        <vers num="2004" edition=":mac"/>
        <vers num="2007"/>
      </prod>
      <prod name="office_compatibility_pack_for_word_excel_ppt_2007" vendor="microsoft">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0112" seq="2008-0112" published="2008-03-11" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Microsoft Excel 2000 SP3, and Office for Mac 2004 and 2008 allows user-assisted remote attackers to execute arbitrary code via a crafted .SLK file that is not properly handled when importing the file, aka "Excel File Import Vulnerability."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=120585858807305&amp;w=2">SSRT080028</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28095" patch="1">28095</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019583">1019583</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-071A.html" patch="1">TA08-071A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0846/references">ADV-2008-0846</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-014">MS08-014</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5284">oval:org.mitre.oval:def:5284</ref>
    </refs>
    <vuln_soft>
      <prod name="excel" vendor="microsoft">
        <vers num="2000" edition="sp3"/>
      </prod>
      <prod name="office" vendor="microsoft">
        <vers num="2004" edition=":mac"/>
        <vers num="2008" edition=":mac"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0113" seq="2008-0113" published="2008-03-11" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Microsoft Office Excel Viewer 2003 up to SP3 allows user-assisted remote attackers to execute arbitrary code via an Excel document with malformed cell comments that trigger memory corruption from an "allocation error," aka "Microsoft Office Cell Parsing Memory Corruption Vulnerability."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=120585858807305&amp;w=2">SSRT080028</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489415/100/0/threaded">20080311 ZDI-08-008: Microsoft Excel BIFF File Format Cell Record Parsing Memory Corruption Vulnerability</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019578">1019578</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-071A.html">TA08-071A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0848/references" adv="1">ADV-2008-0848</ref>
      <ref source="MISC" url="http://www.zerodayinitiative.com/advisories/ZDI-08-008">http://www.zerodayinitiative.com/advisories/ZDI-08-008</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-016">MS08-016</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5421">oval:org.mitre.oval:def:5421</ref>
    </refs>
    <vuln_soft>
      <prod name="excel_viewer" vendor="microsoft">
        <vers num="2003"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0114" seq="2008-0114" published="2008-03-11" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Microsoft Excel 2000 SP3 through 2003 SP2, Viewer 2003, and Office for Mac 2004 allows user-assisted remote attackers to execute arbitrary code via crafted Style records that trigger memory corruption.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=120585858807305&amp;w=2">SSRT080028</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28166" patch="1">28166</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019584">1019584</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-071A.html" patch="1">TA08-071A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0846/references">ADV-2008-0846</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-014">MS08-014</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5456">oval:org.mitre.oval:def:5456</ref>
    </refs>
    <vuln_soft>
      <prod name="excel" vendor="microsoft">
        <vers num="2000" edition="sp3"/>
        <vers num="2002" edition="sp3"/>
      </prod>
      <prod name="excel_viewer" vendor="microsoft">
        <vers num="2003"/>
      </prod>
      <prod name="office" vendor="microsoft">
        <vers num="2004" edition=":mac"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0115" seq="2008-0115" published="2008-03-11" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Microsoft Excel 2000 SP3 through 2007, Viewer 2003, Compatibility Pack, and Office for Mac 2004 allows user-assisted remote attackers to execute arbitrary code via malformed formulas, aka "Excel Formula Parsing Vulnerability."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=120585858807305&amp;w=2">SSRT080028</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28167" patch="1">28167</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019585">1019585</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-071A.html" patch="1">TA08-071A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0846/references">ADV-2008-0846</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-014">MS08-014</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5512">oval:org.mitre.oval:def:5512</ref>
    </refs>
    <vuln_soft>
      <prod name="excel" vendor="microsoft">
        <vers num="2000" edition="sp3"/>
        <vers num="2002" edition="sp3"/>
        <vers num="2003" edition="sp2"/>
        <vers num="2007"/>
      </prod>
      <prod name="excel_viewer" vendor="microsoft">
        <vers num="2003"/>
      </prod>
      <prod name="office" vendor="microsoft">
        <vers num="2004" edition=":mac"/>
      </prod>
      <prod name="office_compatibility_pack_for_word_excel_ppt_2007" vendor="microsoft">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0116" seq="2008-0116" published="2008-03-11" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Microsoft Excel 2000 SP3 through 2003 SP2, Viewer 2003, Compatibility Pack, and Office 2004 and 2008 for Mac allows user-assisted remote attackers to execute arbitrary code via malformed tags in rich text, aka "Excel Rich Text Validation Vulnerability."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://dvlabs.tippingpoint.com/advisory/TPTI-08-03">http://dvlabs.tippingpoint.com/advisory/TPTI-08-03</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=120585858807305&amp;w=2">SSRT080028</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489430/100/0/threaded">20080311 TPTI-08-03: Microsoft Excel Rich Text Memory Corruption Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28168" patch="1">28168</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019586">1019586</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-071A.html" patch="1">TA08-071A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0846/references" adv="1">ADV-2008-0846</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-014">MS08-014</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5212">oval:org.mitre.oval:def:5212</ref>
    </refs>
    <vuln_soft>
      <prod name="excel" vendor="microsoft">
        <vers num="2000" edition="sp3"/>
        <vers num="2002" edition="sp3"/>
        <vers num="2003" edition="sp2"/>
      </prod>
      <prod name="excel_viewer" vendor="microsoft">
        <vers num="2003"/>
      </prod>
      <prod name="office" vendor="microsoft">
        <vers num="2004" edition=":mac"/>
        <vers num="2008" edition=":mac"/>
      </prod>
      <prod name="office_compatibility_pack_for_word_excel_ppt_2007" vendor="microsoft">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0117" seq="2008-0117" published="2008-03-11" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Microsoft Excel 2000 SP3 and 2002 SP2, and Office 2004 and 2008 for Mac, allows user-assisted remote attackers to execute arbitrary code via crafted conditional formatting values, aka "Excel Conditional Formatting Vulnerability."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=120585858807305&amp;w=2">SSRT080028</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28170" patch="1">28170</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019587">1019587</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-071A.html" patch="1">TA08-071A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0846/references">ADV-2008-0846</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-014">MS08-014</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5508">oval:org.mitre.oval:def:5508</ref>
    </refs>
    <vuln_soft>
      <prod name="compatibility_pack_word_excel_powerpoint_2007" vendor="microsoft">
        <vers num=""/>
      </prod>
      <prod name="excel" vendor="microsoft">
        <vers num="2000" edition="sp3"/>
        <vers num="2002" edition="sp3"/>
        <vers num="2003" edition="sp2"/>
        <vers num="2007"/>
      </prod>
      <prod name="excel_viewer" vendor="microsoft">
        <vers num="2003"/>
      </prod>
      <prod name="office" vendor="microsoft">
        <vers num="2000" edition="sp3"/>
        <vers num="2003" edition="sp2"/>
        <vers num="2004" edition=":mac"/>
        <vers num="2007"/>
        <vers num="2008" edition=":mac"/>
        <vers num="xp" edition="sp3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0118" seq="2008-0118" published="2008-03-11" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Microsoft Office 2000 SP3, XP SP3, 2003 SP2, Excel Viewer 2003 up to SP3, and Office 2004 for Mac allows user-assisted remote attackers to execute arbitrary code via a crafted Office document that triggers memory corruption from an "allocation error," aka "Microsoft Office Memory Corruption Vulnerability."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=120585858807305&amp;w=2">SSRT080028</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28146" patch="1">28146</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019578">1019578</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-071A.html" patch="1">TA08-071A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0848/references">ADV-2008-0848</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-016">MS08-016</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5190">oval:org.mitre.oval:def:5190</ref>
    </refs>
    <vuln_soft>
      <prod name="office" vendor="microsoft">
        <vers num="2000" edition="sp3"/>
        <vers num="2003" edition="sp2"/>
        <vers num="2004" edition=":mac"/>
        <vers num="xp" edition="sp3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0119" seq="2008-0119" published="2008-05-13" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Microsoft Publisher in Office 2000 and XP SP3, 2003 SP2 and SP3, and 2007 SP1 and earlier allows remote attackers to execute arbitrary code via a Publisher file with crafted object header data that triggers memory corruption, aka "Publisher Object Handler Validation Vulnerability."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=121129490723574&amp;w=2">SSRT080071</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492073/100/0/threaded">20080514 Microsoft Office Publisher PUB File Parsing Remote Memory Corruption Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29158">29158</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020015">1020015</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-134A.html">TA08-134A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1505/references">ADV-2008-1505</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-027">MS08-027</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5303">oval:org.mitre.oval:def:5303</ref>
    </refs>
    <vuln_soft>
      <prod name="office" vendor="microsoft">
        <vers num="2000" edition="sp3"/>
        <vers num="2003" edition="sp2"/>
        <vers num="2003" edition="sp3"/>
        <vers num="2007"/>
        <vers num="2007_sp1"/>
        <vers num="xp" edition="sp3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0120" seq="2008-0120" published="2008-08-12" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Integer overflow in Microsoft PowerPoint Viewer 2003 allows remote attackers to execute arbitrary code via a PowerPoint file with a malformed picture index that triggers memory corruption, related to handling of CString objects, aka "Memory Allocation Vulnerability."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=739">20080812 Microsoft PowerPoint Viewer 2003 Cstring Integer Overflow Vulnerability</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=121915960406986&amp;w=2">HPSBST02360</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30552">30552</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020676">1020676</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-225A.html">TA08-225A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2355">ADV-2008-2355</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-051">MS08-051</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5768">oval:org.mitre.oval:def:5768</ref>
    </refs>
    <vuln_soft>
      <prod name="office_powerpoint_viewer" vendor="microsoft">
        <vers num="2003"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0121" seq="2008-0121" published="2008-08-12" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">A "memory calculation error" in Microsoft PowerPoint Viewer 2003 allows remote attackers to execute arbitrary code via a PowerPoint file with an invalid picture index that triggers memory corruption, aka "Memory Calculation Vulnerability."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=738">20080812 Microsoft PowerPoint Viewer 2003 Out of Bounds Array Index Vulnerability</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=121915960406986&amp;w=2">HPSBST02360</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30554">30554</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020676">1020676</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-225A.html">TA08-225A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2355">ADV-2008-2355</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-051">MS08-051</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5724">oval:org.mitre.oval:def:5724</ref>
    </refs>
    <vuln_soft>
      <prod name="office_powerpoint_viewer" vendor="microsoft">
        <vers num="2003"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0122" seq="2008-0122" published="2008-01-15" modified="2019-08-01" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Off-by-one error in the inet_network function in libbind in ISC BIND 9.4.2 and earlier, as used in libc in FreeBSD 6.2 through 7.0-PRERELEASE, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted input that triggers memory corruption.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html" adv="1">SUSE-SR:2008:006</ref>
      <ref source="FREEBSD" url="http://security.freebsd.org/advisories/FreeBSD-SA-08:02.libc.asc" adv="1" patch="1">FreeBSD-SA-08:02</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-238493-1">238493</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2008-244.htm" adv="1">http://support.avaya.com/elmodocs2/security/ASA-2008-244.htm</ref>
      <ref source="CONFIRM" url="http://www.isc.org/index.pl?/sw/bind/bind-security.php" adv="1">http://www.isc.org/index.pl?/sw/bind/bind-security.php</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/203611" adv="1">VU#203611</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0300.html" adv="1">RHSA-2008:0300</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487000/100/0/threaded" adv="1">20080124 rPSA-2008-0029-1 bind bind-utils</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27283" adv="1" patch="1">27283</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019189" adv="1">1019189</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0193">ADV-2008-0193</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0703">ADV-2008-0703</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1743/references">ADV-2008-1743</ref>
      <ref source="CONFIRM" url="http://www14.software.ibm.com/webapp/set2/subscriptions/ijhifoeblist?mode=7&amp;heading=AIX61&amp;path=/200802/SECURITY/20080227/datafile123640&amp;label=AIX%20libc%20inet_network%20buffer%20overflow" adv="1">http://www14.software.ibm.com/webapp/set2/subscriptions/ijhifoeblist?mode=7&amp;heading=AIX61&amp;path=/200802/SECURITY/20080227/datafile123640&amp;label=AIX%20libc%20inet_network%20buffer%20overflow</ref>
      <ref source="CONFIRM" url="http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4167" adv="1">http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4167</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=429149" adv="1">https://bugzilla.redhat.com/show_bug.cgi?id=429149</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39670" adv="1">freebsd-inetnetwork-bo(39670)</ref>
      <ref source="CONFIRM" url="https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488" adv="1">https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2169" adv="1">https://issues.rpath.com/browse/RPL-2169</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10190" adv="1">oval:org.mitre.oval:def:10190</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00781.html" adv="1">FEDORA-2008-0903</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00782.html" adv="1">FEDORA-2008-0904</ref>
    </refs>
    <vuln_soft>
      <prod name="bind" vendor="isc">
        <vers num="9.4.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0123" seq="2008-0123" published="2008-01-11" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in install.php for Moodle 1.8.3, and possibly other versions before 1.8.4, allows remote attackers to inject arbitrary web script or HTML via the dbname parameter.  NOTE: this issue only exists until the installation is complete.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2008-01/0202.html">20080111 Cross site scripting (XSS) in Moodle 1.8.3</ref>
      <ref source="MISC" url="http://int21.de/cve/CVE-2008-0123-moodle.html">http://int21.de/cve/CVE-2008-0123-moodle.html</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html">SUSE-SR:2008:003</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486198/100/0/threaded">20080111 Cross site scripting (XSS) in Moodle 1.8.3</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27259">27259</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0164">ADV-2008-0164</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39630">moodle-install-xss(39630)</ref>
    </refs>
    <vuln_soft>
      <prod name="moodle" vendor="moodle">
        <vers num="1.8.3" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0124" seq="2008-0124" published="2008-02-28" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Serendipity (S9Y) before 1.3-beta1 allows remote authenticated users to inject arbitrary web script or HTML via (1) the "Real name" field in Personal Settings, which is presented to readers of articles; or (2) a file upload, as demonstrated by a .htm, .html, or .js file.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://blog.s9y.org/archives/191-Serendipity-1.3-beta1-released.html" patch="1">http://blog.s9y.org/archives/191-Serendipity-1.3-beta1-released.html</ref>
      <ref source="MISC" url="http://int21.de/cve/CVE-2008-0124-s9y.html">http://int21.de/cve/CVE-2008-0124-s9y.html</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1528">DSA-1528</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28003">28003</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019502">1019502</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0700/references">ADV-2008-0700</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40851">serendipity-realname-username-xss(40851)</ref>
    </refs>
    <vuln_soft>
      <prod name="serendipity" vendor="s9y">
        <vers num="0.3"/>
        <vers num="0.4"/>
        <vers num="0.5"/>
        <vers num="0.5_pl1"/>
        <vers num="0.6"/>
        <vers num="0.6_pl1"/>
        <vers num="0.6_pl2"/>
        <vers num="0.6_pl3"/>
        <vers num="0.6_rc1"/>
        <vers num="0.6_rc2"/>
        <vers num="0.7"/>
        <vers num="0.7.1"/>
        <vers num="0.7_beta1"/>
        <vers num="0.7_beta2"/>
        <vers num="0.7_beta3"/>
        <vers num="0.7_beta4"/>
        <vers num="0.7_rc1"/>
        <vers num="0.8"/>
        <vers num="0.8.1"/>
        <vers num="0.8.2"/>
        <vers num="0.8_beta5"/>
        <vers num="0.8_beta6"/>
        <vers num="0.8_beta_6_snapshot"/>
        <vers num="0.9.1"/>
        <vers num="1.0.3"/>
        <vers num="1.0.4"/>
        <vers num="1.0_beta2"/>
        <vers num="1.0_beta3"/>
        <vers num="1.1.1"/>
        <vers num="1.1.3"/>
        <vers num="1.1.4"/>
        <vers num="1.2"/>
        <vers num="1.2.1"/>
        <vers num="1.2__beta5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0125" seq="2008-0125" published="2008-03-24" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in phpstats.php in Michael Wagner phpstats 0.1 alpha allows remote attackers to inject arbitrary web script or HTML via the baseDir parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3765">3765</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489722/100/0/threaded">20080317 Cross Site Scripting (XSS) in phpstats 0.1_alpha, CVE-2008-0125</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28291">28291</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41261">phpstats-phpstats-xss(41261)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpstats" vendor="phpstats">
        <vers num="0.1_alpha"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0127" seq="2008-0127" published="2008-01-09" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="8.8" CVSS_base_score="8.8" CVSS_impact_subscore="9.2" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:C/A:C)">
    <desc>
      <descript source="cve">The administration interface in McAfee E-Business Server 8.5.2 and earlier allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a long initial authentication packet.</descript>
    </desc>
    <loss_types>
      <avail/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3530">3530</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019170">1019170</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/485992/100/0/threaded">20080109 [INFIGO 2008-01-06]: McAfee E-Business Server Remote Preauth Code Execution / DoS</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486035/100/0/threaded">20080109 [INFIGO-2008-01-06]: McAfee E-Business Server Remote Preauth Code Execution / DoS - Corrected</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27197" patch="1">27197</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0087">ADV-2008-0087</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39561">mcafee-ebusiness-authentication-packet-dos(39561)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39563">mcafee-ebusiness-packet-code-execution(39563)</ref>
      <ref source="CONFIRM" url="https://knowledge.mcafee.com/SupportSite/dynamickc.do?externalId=614472&amp;sliceId=SAL_Public&amp;command=show&amp;forward=nonthreadedKC&amp;kcId=614472">https://knowledge.mcafee.com/SupportSite/dynamickc.do?externalId=614472&amp;sliceId=SAL_Public&amp;command=show&amp;forward=nonthreadedKC&amp;kcId=614472</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4878">4878</ref>
    </refs>
    <vuln_soft>
      <prod name="e-business_server" vendor="mcafee">
        <vers num="8.5.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0128" seq="2008-0128" published="2008-01-22" modified="2019-03-25" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The SingleSignOn Valve (org.apache.catalina.authenticator.SingleSignOn) in Apache Tomcat before 5.5.21 does not set the secure flag for the JSESSIONIDSSO cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx">http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx</ref>
      <ref source="CONFIRM" url="http://issues.apache.org/bugzilla/show_bug.cgi?id=41217" patch="1">http://issues.apache.org/bugzilla/show_bug.cgi?id=41217</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html">SUSE-SR:2008:005</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2008-0630.html">RHSA-2008:0630</ref>
      <ref source="CONFIRM" url="http://security-tracker.debian.net/tracker/CVE-2008-0128">http://security-tracker.debian.net/tracker/CVE-2008-0128</ref>
      <ref source="CONFIRM" url="http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540">http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0261.html">RHSA-2008:0261</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/500396/100/0/threaded">20090124 CA20090123-01: Cohesion Tomcat Multiple Vulnerabilities</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/500412/100/0/threaded">20090127 CA20090123-01: Cohesion Tomcat Multiple Vulnerabilities (Updated - v1.1)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27365">27365</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0192">ADV-2008-0192</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/0233">ADV-2009-0233</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39804">apache-singlesignon-information-disclosure(39804)</ref>
      <ref source="MLIST" url="https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@%3Cdev.tomcat.apache.org%3E">[tomcat-dev] 20190319 svn commit: r1855831 [21/30] - in /tomcat/site/trunk: ./ docs/ xdocs/</ref>
      <ref source="MLIST" url="https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74@%3Cdev.tomcat.apache.org%3E">[tomcat-dev] 20190325 svn commit: r1856174 [19/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/</ref>
    </refs>
    <vuln_soft>
      <prod name="tomcat" vendor="apache">
        <vers num="5.5.20" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0129" seq="2008-0129" published="2008-01-08" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in starnet/addons/slideshow_full.php in Site@School 2.3.10 and earlier allows remote attackers to execute arbitrary SQL commands via the album_name parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27120">27120</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39417">siteatschool-slideshowfull-sql-injection(39417)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4832">4832</ref>
    </refs>
    <vuln_soft>
      <prod name="siteatschool" vendor="siteatschool">
        <vers num="2.3.10" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0130" seq="2008-0130" published="2008-01-08" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in login_form.asp in Instant Softwares Dating Site allows remote attackers to execute arbitrary SQL commands via the Username parameter, a different vulnerability than CVE-2007-6671.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39326">dating-site-loginform-sql-injection(39326)</ref>
    </refs>
    <vuln_soft>
      <prod name="dating_site" vendor="instantsoftwares">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0131" seq="2008-0131" published="2008-01-08" modified="2009-09-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in login_form.asp in Instant Softwares Dating Site allows remote attackers to inject arbitrary web script or HTML via the msg parameter, a different product than CVE-2006-6022.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27121">27121</ref>
    </refs>
    <vuln_soft>
      <prod name="dating_site" vendor="instantsoftwares">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0132" seq="2008-0132" published="2008-01-08" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Pragma FortressSSH 5.0 Build 4 Revision 293 and earlier handles long input to sshd.exe by creating an error-message window and waiting for the administrator to click in this window before terminating the sshd.exe process, which allows remote attackers to cause a denial of service (connection slot exhaustion) via a flood of SSH connections with long data objects, as demonstrated by (1) a long list of keys and (2) a long username.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/pragmassh-adv.txt">http://aluigi.altervista.org/adv/pragmassh-adv.txt</ref>
      <ref source="MISC" url="http://aluigi.org/poc/pragmassh.zip">http://aluigi.org/poc/pragmassh.zip</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=119947184730448&amp;w=2">20080104 Some DoS in some telnet servers</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27141">27141</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39354">fortressssh-sshd-dos(39354)</ref>
    </refs>
    <vuln_soft>
      <prod name="fortressssh" vendor="pragma_systems">
        <vers num="5.0_build_4_r_293" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0133" seq="2008-0133" published="2008-01-08" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in Tribisur 2.1 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) id parameter to cat_main.php and the (2) cat parameter to forum.php in a liste action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27149">27149</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39443">tribisur-catmain-forum-sql-injection(39443)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4840">4840</ref>
    </refs>
    <vuln_soft>
      <prod name="tribisur" vendor="thomas_perez">
        <vers num="2.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0134" seq="2008-0134" published="2008-01-08" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Forums/setup.asp in Snitz Forums 2000 3.4.06 and earlier allows remote attackers to inject arbitrary web script or HTML via the MAIL parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://hackerscenter.com/archive/view.asp?id=28145">http://hackerscenter.com/archive/view.asp?id=28145</ref>
      <ref source="MISC" url="http://www.packetstormsecurity.org/0801-exploits/snitz-multi.txt">http://www.packetstormsecurity.org/0801-exploits/snitz-multi.txt</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/485836/100/200/threaded">20080107 [HSC] Snitz Forums Multiple Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27162">27162</ref>
    </refs>
    <vuln_soft>
      <prod name="snitz_forums_2000" vendor="snitz_communications">
        <vers num="3.0"/>
        <vers num="3.1" edition="sr4"/>
        <vers num="3.2.03"/>
        <vers num="3.3"/>
        <vers num="3.3.01"/>
        <vers num="3.3.02"/>
        <vers num="3.3.03"/>
        <vers num="3.4.02"/>
        <vers num="3.4.03"/>
        <vers num="3.4.04"/>
        <vers num="3.4.05"/>
        <vers num="3.4.06" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0135" seq="2008-0135" published="2008-01-08" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Snitz Forums 2000 3.4.06 and earlier stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database via a direct request for forum/snitz_forums_2000.mdb.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://hackerscenter.com/archive/view.asp?id=28145">http://hackerscenter.com/archive/view.asp?id=28145</ref>
      <ref source="MISC" url="http://www.packetstormsecurity.org/0801-exploits/snitz-multi.txt">http://www.packetstormsecurity.org/0801-exploits/snitz-multi.txt</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/485836/100/200/threaded">20080107 [HSC] Snitz Forums Multiple Vulnerabilities</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/485894/100/200/threaded">20080107 RE: [HSC] Snitz Forums Multiple Vulnerabilities</ref>
    </refs>
    <vuln_soft>
      <prod name="snitz_forums_2000" vendor="snitz_communications">
        <vers num="3.0"/>
        <vers num="3.1" edition="sr4"/>
        <vers num="3.2.03"/>
        <vers num="3.3"/>
        <vers num="3.3.01"/>
        <vers num="3.3.02"/>
        <vers num="3.3.03"/>
        <vers num="3.4.02"/>
        <vers num="3.4.03"/>
        <vers num="3.4.04"/>
        <vers num="3.4.05"/>
        <vers num="3.4.06" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0136" seq="2008-0136" published="2008-01-08" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Snitz Forums 2000 3.4.05 allows remote attackers to obtain sensitive information via a direct request to forum/whereami.asp, which reveals the database path.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://hackerscenter.com/archive/view.asp?id=28145">http://hackerscenter.com/archive/view.asp?id=28145</ref>
      <ref source="MISC" url="http://www.packetstormsecurity.org/0801-exploits/snitz-multi.txt">http://www.packetstormsecurity.org/0801-exploits/snitz-multi.txt</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/485836/100/200/threaded">20080107 [HSC] Snitz Forums Multiple Vulnerabilities</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/485894/100/200/threaded">20080107 RE: [HSC] Snitz Forums Multiple Vulnerabilities</ref>
    </refs>
    <vuln_soft>
      <prod name="snitz_forums_2000" vendor="snitz_communications">
        <vers num="3.4.05"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0137" seq="2008-0137" published="2008-01-08" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in config.inc.php in SNETWORKS PHP CLASSIFIEDS 5.0 allows remote attackers to execute arbitrary PHP code via a URL in the path_escape parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0053">ADV-2008-0053</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39468">snetworks-configinc-file-include(39468)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4838">4838</ref>
    </refs>
    <vuln_soft>
      <prod name="php_classifieds" vendor="snetworks">
        <vers num="5.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0138" seq="2008-0138" published="2008-01-08" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in xoopsgallery/init_basic.php in the mod_gallery module for XOOPS, when register_globals is disabled, allows remote attackers to execute arbitrary PHP code via a URL in the GALLERY_BASEDIR parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27155">27155</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39461">xoops-modgallery-zendhashkey-file-include(39461)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4847">4847</ref>
    </refs>
    <vuln_soft>
      <prod name="xoopsgallery_module" vendor="xoops">
        <vers num="1.3.3_9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0139" seq="2008-0139" published="2008-01-08" modified="2017-10-18" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Eval injection vulnerability in loudblog/inc/parse_old.php in Loudblog 0.8.0 and earlier allows remote attackers to execute arbitrary PHP code via the template parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27157">27157</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39445">loudblog-template-code-execution(39445)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4849">4849</ref>
    </refs>
    <vuln_soft>
      <prod name="loudblog" vendor="loudblog">
        <vers num="0.8.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0140" seq="2008-0140" published="2008-01-08" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in error.php in Uebimiau Webmail 2.7.10 and 2.7.2 allows remote authenticated users to read arbitrary files via a .. (dot dot) in the selected_theme parameter, a different vector than CVE-2007-3172.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="VIM" url="http://www.attrition.org/pipermail/vim/2008-January/001867.html">20080107 Uebimiau Web-Mail 2.7.10/2.7.2 Remote File Disclosure Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27154">27154</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39460">uebimiau-webmail-error-directory-traversal(39460)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4846">4846</ref>
    </refs>
    <vuln_soft>
      <prod name="webmail" vendor="uebimiau">
        <vers num="2.7.2"/>
        <vers num="2.7.10"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0141" seq="2008-0141" published="2008-01-08" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">actions.php in WebPortal CMS 0.6-beta generates predictable passwords containing only the time of day, which makes it easier for remote attackers to obtain access to any account via a lostpass action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27145">27145</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39486">webportal-action-weak-security(39486)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4835">4835</ref>
    </refs>
    <vuln_soft>
      <prod name="webportal_cms" vendor="webportal">
        <vers num="0.6_beta"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0142" seq="2008-0142" published="2008-01-08" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in WebPortal CMS 0.6-beta allow remote attackers to execute arbitrary SQL commands via the user_name parameter to actions.php, and unspecified other vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4835">4835</ref>
    </refs>
    <vuln_soft>
      <prod name="webportal_cms" vendor="webportal">
        <vers num="0.6_beta"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0143" seq="2008-0143" published="2008-01-08" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in common/db.php in samPHPweb, possibly 4.2.2 and others, as provided with SAM Broadcaster, allows remote attackers to execute arbitrary PHP code via a URL in the commonpath parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27137">27137</ref>
      <ref source="CONFIRM" url="http://www.spacialaudio.com/news/index.html">http://www.spacialaudio.com/news/index.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39397">samPHPweb-db-file-include(39397)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4834">4834</ref>
    </refs>
    <vuln_soft>
      <prod name="sam_broadcaster" vendor="spacial_audio_solutions">
        <vers num=""/>
      </prod>
      <prod name="samphpweb" vendor="spacial_audio_solutions">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0144" seq="2008-0144" published="2008-01-08" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in index.php in NetRisk 1.9.7 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the page parameter.  NOTE: this can also be leveraged for local file inclusion using directory traversal sequences.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=119955114428283&amp;w=2">20080105 NetRisk 1.9.7 Remote File Inclusion Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27136">27136</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39419">netrisk-index-file-include(39419)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4833">4833</ref>
    </refs>
    <vuln_soft>
      <prod name="netrisk" vendor="phprisk">
        <vers num="1.9.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0145" seq="2008-0145" published="2008-01-08" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in glob in PHP before 4.4.8, when open_basedir is enabled, has unknown impact and attack vectors.  NOTE: this issue reportedly exists because of a regression related to CVE-2007-4663.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.php.net/bug.php?id=41655">http://bugs.php.net/bug.php?id=41655</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.335136">SSA:2008-045-03</ref>
      <ref source="CONFIRM" url="http://www.php.net/ChangeLog-4.php">http://www.php.net/ChangeLog-4.php</ref>
      <ref source="CONFIRM" url="http://www.php.net/releases/4_4_8.php">http://www.php.net/releases/4_4_8.php</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0059">ADV-2008-0059</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39401">php-glob-openbasedir-security-bypass(39401)</ref>
    </refs>
    <vuln_soft>
      <prod name="php" vendor="php">
        <vers num="4.4.7" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0146" seq="2008-0146" published="2008-01-08" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the error page in W3-mSQL allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO to the top-level URI.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3521">3521</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/485736/100/0/threaded">20080103 xss in w3-msql error page</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27116">27116</ref>
    </refs>
    <vuln_soft>
      <prod name="w3-msql" vendor="hughes_technologies">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0147" seq="2008-0147" published="2008-01-08" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in SmallNuke 2.0.4 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via (1) the user_email parameter and possibly (2) username parameter in a Members action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27180">27180</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39525">smallnuke-index-sql-injection(39525)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4863">4863</ref>
    </refs>
    <vuln_soft>
      <prod name="smallnuke" vendor="smallnuke">
        <vers num="2.0.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0148" seq="2008-0148" published="2008-01-08" modified="2017-10-18" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">TUTOS 1.3 does not restrict access to php/admin/cmd.php, which allows remote attackers to execute arbitrary shell commands via the cmd parameter in a direct request.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39531">tutos-cmd-command-execution(39531)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4861">4861</ref>
    </refs>
    <vuln_soft>
      <prod name="tutos" vendor="tutos">
        <vers num="1.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0149" seq="2008-0149" published="2008-01-08" modified="2017-10-18" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">TUTOS 1.3 allows remote attackers to read system information via a direct request to php/admin/phpinfo.php, which calls the phpinfo function.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4861">4861</ref>
    </refs>
    <vuln_soft>
      <prod name="tutos" vendor="tutos">
        <vers num="1.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0150" seq="2008-0150" published="2008-01-08" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the LDAP authentication feature in Aruba Mobility Controller 2.3.6.15, 2.5.2.11, 2.5.4.25, 2.5.5.7, 3.1.1.3, and 2.4.8.11-FIPS or earlier allows remote attackers to bypass authentication mechanisms and obtain management or VPN interface access.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3529">3529</ref>
      <ref source="CONFIRM" url="http://www.arubanetworks.com/support/alerts/aid-122207.asc">http://www.arubanetworks.com/support/alerts/aid-122207.asc</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/485831/100/0/threaded">20080104 Aruba Mobility Controller User Authentication Vulnerability - Aruba Advisory ID: AID-122207</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27144">27144</ref>
    </refs>
    <vuln_soft>
      <prod name="aruba_mobility_controllers" vendor="aruba_networks">
        <vers num="2.3.6.15"/>
        <vers num="2.4.8.11-fips" prev="1"/>
        <vers num="2.5.2.11"/>
        <vers num="2.5.4.25"/>
        <vers num="2.5.5.7"/>
        <vers num="3.1.1.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0151" seq="2008-0151" published="2008-01-08" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in Foxit WAC Server 2.1.0.910, 2.0 Build 3503, and earlier allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a Telnet request with long options.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/waccaz-adv.txt">http://aluigi.altervista.org/adv/waccaz-adv.txt</ref>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/wachof-adv.txt">http://aluigi.altervista.org/adv/wachof-adv.txt</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3525">3525</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/485812/100/0/threaded">20080104 Some DoS in some telnet servers</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488366/100/200/threaded">20080219 Two heap overflow in Foxit WAC Server 2.0 Build 3503</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27142">27142</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39427">wacserver-option-dos(39427)</ref>
    </refs>
    <vuln_soft>
      <prod name="wac_server" vendor="foxitsoftware">
        <vers num="2.0"/>
        <vers num="2.1.0.910"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0152" seq="2008-0152" published="2008-01-08" modified="2011-09-21" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">SLnet.exe in SeattleLab SLNet RF Telnet Server 4.1.1.3758 and earlier allows user-assisted remote attackers to cause a denial of service (crash) via unspecified telnet options, which triggers a NULL pointer dereference.  NOTE: the crash is not user-assisted when the server is running in debug mode.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/slnetmsg-adv.txt">http://aluigi.altervista.org/adv/slnetmsg-adv.txt</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=119947184730448&amp;w=2">20080104 Some DoS in some telnet servers</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27134">27134</ref>
    </refs>
    <vuln_soft>
      <prod name="slnet_rf_telnet_server" vendor="seattle_lab_software">
        <vers num="4.1.1.3758" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0153" seq="2008-0153" published="2008-01-08" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">telnetd.exe in Pragma TelnetServer 7.0.4.589 allows remote attackers to cause a denial of service (process crash and resource exhaustion) via a crafted TELOPT PRAGMA LOGON telnet option, which triggers a NULL pointer dereference.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/pragmatel-adv.txt">http://aluigi.altervista.org/adv/pragmatel-adv.txt</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=119947184730448&amp;w=2">20080104 Some DoS in some telnet servers</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27143">27143</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39353">pragmatelnetserver-telnetd-dos(39353)</ref>
    </refs>
    <vuln_soft>
      <prod name="pragma_telnetserver" vendor="pragma_systems">
        <vers num="7.0.4.589"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0154" seq="2008-0154" published="2008-01-08" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in EvilBoard 0.1a (Alpha) allows remote attackers to execute arbitrary SQL commands the c parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27190">27190</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39529">evilboard-index-sql-injection(39529)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4865">4865</ref>
    </refs>
    <vuln_soft>
      <prod name="evilboard" vendor="evilboard">
        <vers num="0.1a"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0155" seq="2008-0155" published="2008-01-08" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php in EvilBoard 0.1a (Alpha) allows remote attackers to inject arbitrary web script or HTML via the c parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27190">27190</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39526">evilboard-index-xss(39526)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4865">4865</ref>
    </refs>
    <vuln_soft>
      <prod name="evilboard" vendor="evilboard">
        <vers num="0.1a"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0156" seq="2008-0156" published="2008-01-08" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Absolute path traversal vulnerability in index.php in Million Dollar Script 2.0.14 allows remote attackers to read arbitrary files via encoded "/" (%2F) sequences in the link parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3524">3524</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/485882/100/0/threaded">20080107 Million Dollar Script 2.0.14 Remote File Disclosure Vulnerability.</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27174">27174</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39492">milliondollarscript-index-dir-traversal(39492)</ref>
    </refs>
    <vuln_soft>
      <prod name="million_dollar_script" vendor="million_dollar_script">
        <vers num="2.0.14"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0157" seq="2008-0157" published="2008-01-08" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in FlexBB 0.6.3 and earlier allows remote attackers to execute arbitrary SQL commands via the flexbb_temp_id parameter in a cookie.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27164">27164</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39475">flexbb-flexbbtempid-sql-injection(39475)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4858">4858</ref>
    </refs>
    <vuln_soft>
      <prod name="flexbb" vendor="flexbb">
        <vers num="0.6.3" prev="1"/>
        <vers num="1.0_10005_beta_release_1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0158" seq="2008-0158" published="2008-01-08" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in index.php in Shop-Script 2.0 and possibly other versions allows remote attackers to read arbitrary files via a .. (dot dot) in the aux_page parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://packetstormsecurity.org/0801-exploits/shopscript-disclose.txt">http://packetstormsecurity.org/0801-exploits/shopscript-disclose.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27165">27165</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39449">shopscript-index-directory-traversal(39449)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4855">4855</ref>
    </refs>
    <vuln_soft>
      <prod name="shop-script" vendor="shop-script">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0159" seq="2008-0159" published="2008-01-08" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in eggBlog 3.1.0 and earlier allows remote attackers to execute arbitrary SQL commands via the eggblogpassword parameter in a cookie.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27168">27168</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39473">eggblog-eggblogmail-sql-injection(39473)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4860">4860</ref>
    </refs>
    <vuln_soft>
      <prod name="eggblog" vendor="eggblog">
        <vers num="3.1.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0162" seq="2008-0162" published="2008-02-22" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">misc.c in splitvt 1.6.6 and earlier does not drop group privileges before executing xprop, which allows local users to gain privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200803-05.xml">GLSA-200803-05</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1500" patch="1">DSA-1500</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27936">27936</ref>
    </refs>
    <vuln_soft>
      <prod name="splitvt" vendor="sam_lantinga">
        <vers num="1.6.6" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0163" seq="2008-0163" published="2008-02-12" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.4" CVSS_base_score="4.4" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Linux kernel 2.6, when using vservers, allows local users to access resources of other vservers via a symlink attack in /proc.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1494" patch="1">DSA-1494</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27704">27704</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27798">27798</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40486">linux-kernel-proc-unauth-access(40486)</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0164" seq="2008-0164" published="2008-03-19" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site request forgery (CSRF) vulnerabilities in Plone CMS 3.0.5 and 3.0.6 allow remote attackers to (1) add arbitrary accounts via the join_form page and (2) change the privileges of arbitrary groups via the prefs_groups_overview page.</descript>
      <descript source="nvd">Must login to view link 1015140</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://plone.org/about/security/advisories/cve-2008-0164">http://plone.org/about/security/advisories/cve-2008-0164</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3754">3754</ref>
      <ref source="MISC" url="http://www.procheckup.com/Hacking_Plone_CMS.pdf">http://www.procheckup.com/Hacking_Plone_CMS.pdf</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489544/100/0/threaded">20080313 PR08-02: Plone CMS Security Research - the Art of Plowning</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41263">plone-joinform-csrf(41263)</ref>
    </refs>
    <vuln_soft>
      <prod name="plone_cms" vendor="plone">
        <vers num="3.0.5"/>
        <vers num="3.0.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0165" seq="2008-0165" published="2008-04-21" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site request forgery (CSRF) vulnerability in Ikiwiki before 2.42 allows remote attackers to modify user preferences, including passwords, via the (1) preferences and (2) edit forms.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=475445">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=475445</ref>
      <ref source="CONFIRM" url="http://ikiwiki.info/security/#index31h2">http://ikiwiki.info/security/#index31h2</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1553">DSA-1553</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1297/references">ADV-2008-1297</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41904">ikiwiki-change-password-csrf(41904)</ref>
    </refs>
    <vuln_soft>
      <prod name="ikiwiki" vendor="ikiwiki">
        <vers num="2.41" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0166" seq="2008-0166" published="2008-05-13" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:N/A:N)">
    <desc>
      <descript source="cve">OpenSSL 0.9.8c-1 up to versions before 0.9.8g-9 on Debian-based operating systems uses a random number generator that generates predictable numbers, which makes it easier for remote attackers to conduct brute force guessing attacks against cryptographic keys.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://metasploit.com/users/hdm/tools/debian-openssl/">http://metasploit.com/users/hdm/tools/debian-openssl/</ref>
      <ref source="MLIST" url="http://sourceforge.net/mailarchive/forum.php?thread_name=48367252.7070603%40shemesh.biz&amp;forum_name=rsyncrypto-devel">[rsyncrypto-devel] 20080523 Advisory - Rsyncrypto maybe affected from Debian OpenSSL reduced entropy problem</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1571" adv="1" patch="1">DSA-1571</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1576" patch="1">DSA-1576</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/925211">VU#925211</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492112/100/0/threaded">20080515 Debian generated SSH-Keys working exploit</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29179">29179</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020017">1020017</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-612-1" patch="1">USN-612-1</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-612-2" patch="1">USN-612-2</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-612-3">USN-612-3</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-612-4">USN-612-4</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-612-7">USN-612-7</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-137A.html">TA08-137A</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42375">openssl-rng-weak-security(42375)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5622">5622</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5632">5632</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5720">5720</ref>
    </refs>
    <vuln_soft>
      <prod name="openssl" vendor="openssl_project">
        <vers num="0.9.8c-1"/>
        <vers num="0.9.8c-2"/>
        <vers num="0.9.8c-3"/>
        <vers num="0.9.8c-4"/>
        <vers num="0.9.8c-5"/>
        <vers num="0.9.8c-6"/>
        <vers num="0.9.8c-7"/>
        <vers num="0.9.8c-8"/>
        <vers num="0.9.8c-9"/>
        <vers num="0.9.8d-1"/>
        <vers num="0.9.8d-2"/>
        <vers num="0.9.8d-3"/>
        <vers num="0.9.8d-4"/>
        <vers num="0.9.8d-5"/>
        <vers num="0.9.8d-6"/>
        <vers num="0.9.8d-7"/>
        <vers num="0.9.8d-8"/>
        <vers num="0.9.8d-9"/>
        <vers num="0.9.8e-1"/>
        <vers num="0.9.8e-2"/>
        <vers num="0.9.8e-3"/>
        <vers num="0.9.8e-4"/>
        <vers num="0.9.8e-5"/>
        <vers num="0.9.8e-6"/>
        <vers num="0.9.8e-7"/>
        <vers num="0.9.8e-8"/>
        <vers num="0.9.8e-9"/>
        <vers num="0.9.8f-1"/>
        <vers num="0.9.8f-2"/>
        <vers num="0.9.8f-3"/>
        <vers num="0.9.8f-4"/>
        <vers num="0.9.8f-5"/>
        <vers num="0.9.8f-6"/>
        <vers num="0.9.8f-7"/>
        <vers num="0.9.8f-8"/>
        <vers num="0.9.8f-9"/>
        <vers num="0.9.8g-1"/>
        <vers num="0.9.8g-2"/>
        <vers num="0.9.8g-3"/>
        <vers num="0.9.8g-4"/>
        <vers num="0.9.8g-5"/>
        <vers num="0.9.8g-6"/>
        <vers num="0.9.8g-7"/>
        <vers num="0.9.8g-8"/>
        <vers num="0.9.8g-9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0167" seq="2008-0167" published="2008-05-18" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The write_array_file function in utils/include.pl in GForge 4.5.14 updates configuration files by truncating them to zero length and then writing new data, which might allow attackers to bypass intended access restrictions or have unspecified other impact in opportunistic circumstances.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://security.debian.org/pool/updates/main/g/gforge/gforge_4.5.14-22etch8.diff.gz">http://security.debian.org/pool/updates/main/g/gforge/gforge_4.5.14-22etch8.diff.gz</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1577" patch="1">DSA-1577</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29215">29215</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1537/references">ADV-2008-1537</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42456">gforge-unspecified-symlink(42456)</ref>
    </refs>
    <vuln_soft>
      <prod name="gforge" vendor="gforge">
        <vers num="4.5.14"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0169" seq="2008-0169" published="2008-06-03" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Plugin/passwordauth.pm (aka the passwordauth plugin) in ikiwiki 1.34 through 2.47 allows remote attackers to bypass authentication, and login to any account for which an OpenID identity is configured and a password is not configured, by specifying an empty password during the login sequence.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=483770">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=483770</ref>
      <ref source="CONFIRM" url="http://ikiwiki.info/news/version_2.48/index.html">http://ikiwiki.info/news/version_2.48/index.html</ref>
      <ref source="CONFIRM" url="http://ikiwiki.info/security/#index33h2">http://ikiwiki.info/security/#index33h2</ref>
      <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/05/31/3">[oss-security] 20080531 Re: CVE id request: ikiwiki</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29479">29479</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1710">ADV-2008-1710</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42798">ikiwiki-openid-passwordauth-auth-bypass(42798)</ref>
    </refs>
    <vuln_soft>
      <prod name="ikiwiki" vendor="ikiwiki">
        <vers num="1.5"/>
        <vers num="1.34"/>
        <vers num="1.34.1"/>
        <vers num="1.34.2"/>
        <vers num="1.35"/>
        <vers num="1.36"/>
        <vers num="1.37"/>
        <vers num="1.38"/>
        <vers num="1.39"/>
        <vers num="1.40"/>
        <vers num="1.41"/>
        <vers num="1.42"/>
        <vers num="1.43"/>
        <vers num="1.44"/>
        <vers num="1.45"/>
        <vers num="1.46"/>
        <vers num="1.47"/>
        <vers num="1.48"/>
        <vers num="1.49"/>
        <vers num="1.51"/>
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="2.2"/>
        <vers num="2.3"/>
        <vers num="2.4"/>
        <vers num="2.5"/>
        <vers num="2.6"/>
        <vers num="2.7"/>
        <vers num="2.8"/>
        <vers num="2.9"/>
        <vers num="2.10"/>
        <vers num="2.11"/>
        <vers num="2.12"/>
        <vers num="2.13"/>
        <vers num="2.14"/>
        <vers num="2.15"/>
        <vers num="2.16"/>
        <vers num="2.17"/>
        <vers num="2.18"/>
        <vers num="2.19"/>
        <vers num="2.20"/>
        <vers num="2.30"/>
        <vers num="2.31"/>
        <vers num="2.31.1"/>
        <vers num="2.31.2"/>
        <vers num="2.31.3"/>
        <vers num="2.40"/>
        <vers num="2.41"/>
        <vers num="2.42"/>
        <vers num="2.43"/>
        <vers num="2.44"/>
        <vers num="2.47"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0171" seq="2008-0171" published="2008-01-17" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">regex/v4/perl_matcher_non_recursive.hpp in the Boost regex library (aka Boost.Regex) in Boost 1.33 and 1.34 allows context-dependent attackers to cause a denial of service (failed assertion and crash) via an invalid regular expression.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.gentoo.org/show_bug.cgi?id=205955">http://bugs.gentoo.org/show_bug.cgi?id=205955</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html">SUSE-SR:2008:006</ref>
      <ref source="SECUNIA" url="http://secunia.com/advisories/48099">48099</ref>
      <ref source="CONFIRM" url="http://svn.boost.org/trac/boost/changeset/42674">http://svn.boost.org/trac/boost/changeset/42674</ref>
      <ref source="CONFIRM" url="http://svn.boost.org/trac/boost/changeset/42745">http://svn.boost.org/trac/boost/changeset/42745</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0063">http://wiki.rpath.com/Advisories:rPSA-2008-0063</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200802-08.xml">GLSA-200802-08</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:032">MDVSA-2008:032</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488102/100/0/threaded">20080213 rPSA-2008-0063-1 boost</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27325">27325</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-570-1">USN-570-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0249">ADV-2008-0249</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2143">https://issues.rpath.com/browse/RPL-2143</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00760.html">FEDORA-2008-0880</ref>
    </refs>
    <vuln_soft>
      <prod name="boost" vendor="boost">
        <vers num="1.33"/>
        <vers num="1.34"/>
      </prod>
      <prod name="boost_regex_library" vendor="boost">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0172" seq="2008-0172" published="2008-01-17" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The get_repeat_type function in basic_regex_creator.hpp in the Boost regex library (aka Boost.Regex) in Boost 1.33 and 1.34 allows context-dependent attackers to cause a denial of service (NULL dereference and crash) via an invalid regular expression.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.gentoo.org/show_bug.cgi?id=205955">http://bugs.gentoo.org/show_bug.cgi?id=205955</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html">SUSE-SR:2008:006</ref>
      <ref source="SECUNIA" url="http://secunia.com/advisories/48099">48099</ref>
      <ref source="CONFIRM" url="http://svn.boost.org/trac/boost/changeset/42674">http://svn.boost.org/trac/boost/changeset/42674</ref>
      <ref source="CONFIRM" url="http://svn.boost.org/trac/boost/changeset/42745">http://svn.boost.org/trac/boost/changeset/42745</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0063">http://wiki.rpath.com/Advisories:rPSA-2008-0063</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200802-08.xml">GLSA-200802-08</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:032">MDVSA-2008:032</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488102/100/0/threaded">20080213 rPSA-2008-0063-1 boost</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27325">27325</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-570-1">USN-570-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0249">ADV-2008-0249</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2143">https://issues.rpath.com/browse/RPL-2143</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00760.html">FEDORA-2008-0880</ref>
    </refs>
    <vuln_soft>
      <prod name="boost" vendor="boost">
        <vers num="1.33"/>
        <vers num="1.34"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0173" seq="2008-0173" published="2008-01-15" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in Gforge 4.6.99 and earlier allows remote attackers to execute arbitrary SQL commands via unspecified parameters, related to RSS exports.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1459" patch="1">DSA-1459</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27266">27266</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0115">ADV-2008-0115</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39666">gforge-multiple-sql-injection(39666)</ref>
    </refs>
    <vuln_soft>
      <prod name="gforge" vendor="gforge">
        <vers num="4.6.99" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0174" seq="2008-0174" published="2008-01-28" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">GE Fanuc Proficy Real-Time Information Portal 2.6 and earlier uses HTTP Basic Authentication, which transmits usernames and passwords in base64-encoded cleartext and allows remote attackers to steal the passwords and gain privileges.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3590">3590</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019273">1019273</ref>
      <ref source="CONFIRM" url="http://support.gefanuc.com/support/index?page=kbchannel&amp;id=KB12459">http://support.gefanuc.com/support/index?page=kbchannel&amp;id=KB12459</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/180876">VU#180876</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487075/100/0/threaded">20080125 C4 Security Advisory - GE Fanuc Proficy Information Portal 2.6 Authentication Vulnerability</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487244/100/0/threaded">20080129 Re: C4 Security Advisory - GE Fanuc Proficy Information Portal 2.6 Authentication Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30754">30754</ref>
    </refs>
    <vuln_soft>
      <prod name="proficy_real-time_information_portal" vendor="ge_fanuc">
        <vers num="2.6" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0175" seq="2008-0175" published="2008-01-28" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unrestricted file upload vulnerability in GE Fanuc Proficy Real-Time Information Portal 2.6 and earlier allows remote attackers to execute arbitrary code by uploading a file with an executable extension to the main virtual directory.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3591">3591</ref>
      <ref source="CONFIRM" url="http://support.gefanuc.com/support/index?page=kbchannel&amp;id=KB12460">http://support.gefanuc.com/support/index?page=kbchannel&amp;id=KB12460</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/339345">VU#339345</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487079/100/0/threaded">20080125 C4 Security Advisory - GE Fanuc Proficy Information Portal 2.6 Arbitrary File Upload and Execution</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487242/100/0/threaded">20080129 Re: C4 Security Advisory - GE Fanuc Proficy Information Portal 2.6 Arbitrary File Upload and Execution</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27446">27446</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019274">1019274</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0307/references">ADV-2008-0307</ref>
    </refs>
    <vuln_soft>
      <prod name="proficy_real-time_information_portal" vendor="ge_fanuc">
        <vers num="2.6" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0176" seq="2008-0176" published="2008-01-28" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in w32rtr.exe in GE Fanuc CIMPLICITY HMI SCADA system 7.0 before 7.0 SIM 9, and earlier versions before 6.1 SP6 Hot fix - 010708_162517_6106, allow remote attackers to execute arbitrary code via unknown vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3592">3592</ref>
      <ref source="CONFIRM" url="http://support.gefanuc.com/support/index?page=kbchannel&amp;id=KB12458">http://support.gefanuc.com/support/index?page=kbchannel&amp;id=KB12458</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/308556">VU#308556</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487076/100/0/threaded">20080125 C4 Security Advisory - GE Fanuc Cimplicity 6.1 Heap Overflow</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487241/100/0/threaded">20080129 Re: C4 Security Advisory - GE Fanuc Cimplicity 6.1 Heap Overflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27447">27447</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019275">1019275</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0306">ADV-2008-0306</ref>
    </refs>
    <vuln_soft>
      <prod name="cimplicity" vendor="ge_fanuc">
        <vers num="6.1_sp6_hf_010708_162517_6106" prev="1"/>
        <vers num="7.0_sim8" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0177" seq="2008-0177" published="2008-02-07" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">The ipcomp6_input function in sys/netinet6/ipcomp_input.c in the KAME project before 20071201 does not properly check the return value of the m_pulldown function, which allows remote attackers to cause a denial of service (system crash) via an IPv6 packet with an IPComp header.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/netinet6/ipcomp_input.c?f=u&amp;only_with_tag=netbsd-3-1" adv="1">http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/netinet6/ipcomp_input.c?f=u&amp;only_with_tag=netbsd-3-1</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//Jul/msg00001.html">APPLE-SA-2008-07-11</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//May/msg00001.html">APPLE-SA-2008-05-28</ref>
      <ref source="FREEBSD" url="http://security.freebsd.org/advisories/FreeBSD-SA-08:04.ipsec.asc">FreeBSD-SA-08:04</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019314">1019314</ref>
      <ref source="CONFIRM" url="http://www.kame.net/dev/cvsweb2.cgi/kame/kame/sys/netinet6/ipcomp_input.c.diff?r1=1.36;r2=1.37">http://www.kame.net/dev/cvsweb2.cgi/kame/kame/sys/netinet6/ipcomp_input.c.diff?r1=1.36;r2=1.37</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/110947">VU#110947</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27642" patch="1">27642</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-150A.html">TA08-150A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0441">ADV-2008-0441</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0688">ADV-2008-0688</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1697">ADV-2008-1697</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2094/references">ADV-2008-2094</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5191">5191</ref>
    </refs>
    <vuln_soft>
      <prod name="ipcomp" vendor="kame">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0178" seq="2008-0178" published="2008-02-04" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the Enterprise Admin Session Monitoring component in Liferay Portal 4.3.6 allows remote authenticated users to inject arbitrary web script or HTML via the User-Agent HTTP header.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://support.liferay.com/browse/LEP-4736">http://support.liferay.com/browse/LEP-4736</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/326065">VU#326065</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27547" patch="1">27547</ref>
    </refs>
    <vuln_soft>
      <prod name="liferay_enterprise_portal" vendor="liferay">
        <vers num="4.3.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0179" seq="2008-0179" published="2008-02-04" modified="2008-09-05" severity="Low" CVSS_version="2.0" CVSS_score="2.6" CVSS_base_score="2.6" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in service/impl/UserLocalServiceImpl.java in Liferay Portal 4.3.6 allows remote attackers to inject arbitrary web script or HTML via the User-Agent HTTP header, which is used when composing Forgot Password e-mail messages in HTML format.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://support.liferay.com/browse/LEP-4737">http://support.liferay.com/browse/LEP-4737</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/888209">VU#888209</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27550" patch="1">27550</ref>
    </refs>
    <vuln_soft>
      <prod name="liferay_enterprise_portal" vendor="liferay">
        <vers num="4.3.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0180" seq="2008-0180" published="2008-02-04" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in themes/_unstyled/templates/init.vm in Liferay Portal 4.3.6 allows remote authenticated users to inject arbitrary web script or HTML via the Greeting field in a User Profile.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://support.liferay.com/browse/LEP-4738">http://support.liferay.com/browse/LEP-4738</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/732449">VU#732449</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27546">27546</ref>
    </refs>
    <vuln_soft>
      <prod name="liferay_enterprise_portal" vendor="liferay">
        <vers num="1.0"/>
        <vers num="2.0"/>
        <vers num="2.1.0"/>
        <vers num="2.1.1"/>
        <vers num="2.2.0"/>
        <vers num="3.6.1"/>
        <vers num="4.1"/>
        <vers num="4.1.1"/>
        <vers num="4.1.3"/>
        <vers num="4.3.1"/>
        <vers num="4.3.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0181" seq="2008-0181" published="2008-02-04" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the Admin portlet in Liferay Portal 4.3.6 allows remote authenticated users to inject arbitrary web script or HTML via the Shutdown message.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://support.liferay.com/browse/LEP-4739">http://support.liferay.com/browse/LEP-4739</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/217825">VU#217825</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27554" patch="1">27554</ref>
    </refs>
    <vuln_soft>
      <prod name="liferay_enterprise_portal" vendor="liferay">
        <vers num="4.3.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0182" seq="2008-0182" published="2008-02-04" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site request forgery (CSRF) vulnerability in the Admin portlet in Liferay Portal before 4.4.0 allows remote authenticated users to perform unspecified actions as unspecified other authenticated users via the Shutdown message.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://support.liferay.com/browse/LEP-4739">http://support.liferay.com/browse/LEP-4739</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/767825">VU#767825</ref>
    </refs>
    <vuln_soft>
      <prod name="liferay_enterprise_portal" vendor="liferay">
        <vers num="4.3.6" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0184" seq="2008-0184" published="2008-01-09" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Absolute path traversal vulnerability in index.php in Sys-Hotel on Line System allows remote attackers to read arbitrary files via an encoded "/" ("%2F") in the file parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3528">3528</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/485940/100/0/threaded">20080108 sysHotel On Line Remote File Disclosure Vulnerability.</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27184">27184</ref>
    </refs>
    <vuln_soft>
      <prod name="syshotel_on_line_system" vendor="prenotazioni_on_line">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0185" seq="2008-0185" published="2008-01-09" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in NetRisk 1.9.7 and possibly earlier versions allows remote attackers to execute arbitrary SQL commands via the pid parameter in a profile page (possibly profile.php).</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://sourceforge.net/project/shownotes.php?release_id=551208&amp;group_id=129681">http://sourceforge.net/project/shownotes.php?release_id=551208&amp;group_id=129681</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/485834/100/0/threaded">20080106 netrisk 1.9.7 Multiple Remote Vulnerabilities (sql injection/xss)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27161">27161</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4852">4852</ref>
    </refs>
    <vuln_soft>
      <prod name="netrisk" vendor="netrisk">
        <vers num="1.9.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0186" seq="2008-0186" published="2008-01-09" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php in NetRisk 1.9.7 and possibly earlier allows remote attackers to inject arbitrary web script or HTML via the page parameter, possibly related to CVE-2008-0144.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/485834/100/0/threaded">20080106 netrisk 1.9.7 Multiple Remote Vulnerabilities (sql injection/xss)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27161">27161</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4852">4852</ref>
    </refs>
    <vuln_soft>
      <prod name="netrisk" vendor="phprisk">
        <vers num="1.9.7" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0187" seq="2008-0187" published="2008-01-09" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in songinfo.php in SAM Broadcaster samPHPweb, possibly 4.2.2 and earlier, allows remote attackers to execute arbitrary SQL commands via the songid parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27147">27147</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39463">sambroadcaster-songinfo-sql-injection(39463)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4836">4836</ref>
    </refs>
    <vuln_soft>
      <prod name="samphpweb" vendor="spacial_audio_solutions">
        <vers num="4.2.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0188" seq="2008-0188" published="2008-01-16" modified="2008-09-10" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was withdrawn by its requester.  Further investigation showed that it was not a new security issue.  Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2008-0189" seq="2008-0189" published="2008-01-16" modified="2008-09-10" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was withdrawn by its requester.  Further investigation showed that it was not a new security issue.  Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2008-0190" seq="2008-0190" published="2008-01-09" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in templates/example_template.php in AwesomeTemplateEngine allow remote attackers to inject arbitrary web script or HTML via the (1) data[title], (2) data[message], (3) data[table][1][item], (4) data[table][1][url], or (5) data[poweredby] parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059439.html">20080103 securityvulns.com russian vulnerabilities digest</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3539">3539</ref>
      <ref source="MISC" url="http://securityvulns.ru/Sdocument784.html">http://securityvulns.ru/Sdocument784.html</ref>
      <ref source="MISC" url="http://websecurity.com.ua/1694/">http://websecurity.com.ua/1694/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/485786/100/0/threaded">20080103 securityvulns.com russian vulnerabilities digest</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27125">27125</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39396">awesometemplateengine-multiple-xss(39396)</ref>
    </refs>
    <vuln_soft>
      <prod name="awesometemplateengine" vendor="awesometemplateengine">
        <vers num="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0191" seq="2008-0191" published="2008-01-09" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">WordPress 2.2.x and 2.3.x allows remote attackers to obtain sensitive information via an invalid p parameter in an rss2 action to the default URI, which reveals the full path and the SQL database structure.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059439.html">20080103 securityvulns.com russian vulnerabilities digest</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3539">3539</ref>
      <ref source="MISC" url="http://securityvulns.ru/Sdocument663.html">http://securityvulns.ru/Sdocument663.html</ref>
      <ref source="MISC" url="http://websecurity.com.ua/1634/">http://websecurity.com.ua/1634/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/485786/100/0/threaded">20080103 securityvulns.com russian vulnerabilities digest</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39423">wordpress-p-path-disclosure(39423)</ref>
    </refs>
    <vuln_soft>
      <prod name="wordpress" vendor="wordpress">
        <vers num="2.2"/>
        <vers num="2.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0192" seq="2008-0192" published="2008-01-09" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in WordPress 2.0.9 and earlier allow remote attackers to inject arbitrary web script or HTML via the popuptitle parameter to (1) wp-admin/post.php or (2) wp-admin/page-new.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059439.html">20080103 securityvulns.com russian vulnerabilities digest</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3539">3539</ref>
      <ref source="MISC" url="http://securityvulns.ru/Sdocument714.html">http://securityvulns.ru/Sdocument714.html</ref>
      <ref source="MISC" url="http://websecurity.com.ua/1658/">http://websecurity.com.ua/1658/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/485786/100/0/threaded">20080103 securityvulns.com russian vulnerabilities digest</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27123">27123</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39426">wordpress-popuptitle-xss(39426)</ref>
    </refs>
    <vuln_soft>
      <prod name="wordpress" vendor="wordpress">
        <vers num="2.0.9" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0193" seq="2008-0193" published="2008-01-09" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in wp-db-backup.php in WordPress 2.0.11 and earlier, and possibly 2.1.x through 2.3.x, allows remote attackers to inject arbitrary web script or HTML via the backup parameter in a wp-db-backup.php action to wp-admin/edit.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059439.html">20080103 securityvulns.com russian vulnerabilities digest</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3539">3539</ref>
      <ref source="MISC" url="http://securityvulns.ru/Sdocument755.html">http://securityvulns.ru/Sdocument755.html</ref>
      <ref source="MISC" url="http://websecurity.com.ua/1676/">http://websecurity.com.ua/1676/</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1502">DSA-1502</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/485786/100/0/threaded">20080103 securityvulns.com russian vulnerabilities digest</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27123">27123</ref>
    </refs>
    <vuln_soft>
      <prod name="wordpress" vendor="wordpress">
        <vers num="2.0.11" prev="1"/>
        <vers num="2.1"/>
        <vers num="2.1.1"/>
        <vers num="2.1.2"/>
        <vers num="2.1.3"/>
        <vers num="2.1.3_rc1"/>
        <vers num="2.1.3_rc2"/>
        <vers num="2.2"/>
        <vers num="2.2.0"/>
        <vers num="2.2.1"/>
        <vers num="2.2.2"/>
        <vers num="2.2.3"/>
        <vers num="2.2_revision5002"/>
        <vers num="2.2_revision5003"/>
        <vers num="2.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0194" seq="2008-0194" published="2008-01-09" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in wp-db-backup.php in WordPress 2.0.3 and earlier allows remote attackers to read arbitrary files, delete arbitrary files, and cause a denial of service via a .. (dot dot) in the backup parameter in a wp-db-backup.php action to wp-admin/edit.php.  NOTE: this might be the same as CVE-2006-5705.1.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059439.html">20080103 securityvulns.com russian vulnerabilities digest</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3539">3539</ref>
      <ref source="MISC" url="http://securityvulns.ru/Sdocument755.html">http://securityvulns.ru/Sdocument755.html</ref>
      <ref source="MISC" url="http://websecurity.com.ua/1676/">http://websecurity.com.ua/1676/</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1502">DSA-1502</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/485786/100/0/threaded">20080103 securityvulns.com russian vulnerabilities digest</ref>
    </refs>
    <vuln_soft>
      <prod name="wordpress" vendor="wordpress">
        <vers num="2.0.3" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0195" seq="2008-0195" published="2008-01-09" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">WordPress 2.0.11 and earlier allows remote attackers to obtain sensitive information via an empty value of the page parameter to certain PHP scripts under wp-admin/, which reveals the path in various error messages.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059439.html">20080103 securityvulns.com russian vulnerabilities digest</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3539">3539</ref>
      <ref source="MISC" url="http://securityvulns.ru/Sdocument762.html">http://securityvulns.ru/Sdocument762.html</ref>
      <ref source="MISC" url="http://securityvulns.ru/Sdocument768.html">http://securityvulns.ru/Sdocument768.html</ref>
      <ref source="MISC" url="http://securityvulns.ru/Sdocument772.html">http://securityvulns.ru/Sdocument772.html</ref>
      <ref source="MISC" url="http://securityvulns.ru/Sdocument773.html">http://securityvulns.ru/Sdocument773.html</ref>
      <ref source="MISC" url="http://websecurity.com.ua/1679/">http://websecurity.com.ua/1679/</ref>
      <ref source="MISC" url="http://websecurity.com.ua/1683/">http://websecurity.com.ua/1683/</ref>
      <ref source="MISC" url="http://websecurity.com.ua/1686/">http://websecurity.com.ua/1686/</ref>
      <ref source="MISC" url="http://websecurity.com.ua/1687/">http://websecurity.com.ua/1687/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/485786/100/0/threaded">20080103 securityvulns.com russian vulnerabilities digest</ref>
    </refs>
    <vuln_soft>
      <prod name="wordpress" vendor="wordpress">
        <vers num="2.0.11" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0196" seq="2008-0196" published="2008-01-09" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Multiple directory traversal vulnerabilities in WordPress 2.0.11 and earlier allow remote attackers to read arbitrary files via a .. (dot dot) in (1) the page parameter to certain PHP scripts under wp-admin/ or (2) the import parameter to wp-admin/admin.php, as demonstrated by discovering the full path via a request for the \..\..\wp-config pathname; and allow remote attackers to modify arbitrary files via a .. (dot dot) in the file parameter to wp-admin/templates.php.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059439.html">20080103 securityvulns.com russian vulnerabilities digest</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3539">3539</ref>
      <ref source="MISC" url="http://securityvulns.ru/Sdocument762.html">http://securityvulns.ru/Sdocument762.html</ref>
      <ref source="MISC" url="http://securityvulns.ru/Sdocument768.html">http://securityvulns.ru/Sdocument768.html</ref>
      <ref source="MISC" url="http://securityvulns.ru/Sdocument772.html">http://securityvulns.ru/Sdocument772.html</ref>
      <ref source="MISC" url="http://securityvulns.ru/Sdocument773.html">http://securityvulns.ru/Sdocument773.html</ref>
      <ref source="MISC" url="http://websecurity.com.ua/1679/">http://websecurity.com.ua/1679/</ref>
      <ref source="MISC" url="http://websecurity.com.ua/1683/">http://websecurity.com.ua/1683/</ref>
      <ref source="MISC" url="http://websecurity.com.ua/1686/">http://websecurity.com.ua/1686/</ref>
      <ref source="MISC" url="http://websecurity.com.ua/1687/">http://websecurity.com.ua/1687/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/485786/100/0/threaded">20080103 securityvulns.com russian vulnerabilities digest</ref>
    </refs>
    <vuln_soft>
      <prod name="wordpress" vendor="wordpress">
        <vers num="2.0.11" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0197" seq="2008-0197" published="2008-01-09" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in wp-contact-form/options-contactform.php in the WP-ContactForm 1.5 alpha and earlier plugin for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) wpcf_email, (2) wpcf_subject, (3) wpcf_question, (4) wpcf_answer, (5) wpcf_success_msg, (6) wpcf_error_msg, or (7) wpcf_msg parameter to wp-admin/admin.php, or (8) the SRC attribute of an IFRAME element.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059439.html">20080103 securityvulns.com russian vulnerabilities digest</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3539">3539</ref>
      <ref source="MISC" url="http://securityvulns.ru/Sdocument546.html">http://securityvulns.ru/Sdocument546.html</ref>
      <ref source="MISC" url="http://securityvulns.ru/Sdocument667.html">http://securityvulns.ru/Sdocument667.html</ref>
      <ref source="MISC" url="http://websecurity.com.ua/1600/">http://websecurity.com.ua/1600/</ref>
      <ref source="MISC" url="http://websecurity.com.ua/1641/">http://websecurity.com.ua/1641/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/485786/100/0/threaded">20080103 securityvulns.com russian vulnerabilities digest</ref>
    </refs>
    <vuln_soft>
      <prod name="wp-contactform" vendor="wordpress">
        <vers num="1.5_alpha" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0198" seq="2008-0198" published="2008-01-09" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site request forgery (CSRF) vulnerabilities in wp-contact-form/options-contactform.php in the WP-ContactForm 1.5 alpha and earlier plugin for WordPress allow remote attackers to perform actions as administrators via the (1) wpcf_question, (2) wpcf_success_msg, or (3) wpcf_error_msg parameter to wp-admin/admin.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059439.html">20080103 securityvulns.com russian vulnerabilities digest</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3539">3539</ref>
      <ref source="MISC" url="http://securityvulns.ru/Sdocument546.html">http://securityvulns.ru/Sdocument546.html</ref>
      <ref source="MISC" url="http://securityvulns.ru/Sdocument667.html">http://securityvulns.ru/Sdocument667.html</ref>
      <ref source="MISC" url="http://websecurity.com.ua/1600/">http://websecurity.com.ua/1600/</ref>
      <ref source="MISC" url="http://websecurity.com.ua/1641/">http://websecurity.com.ua/1641/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/485786/100/0/threaded">20080103 securityvulns.com russian vulnerabilities digest</ref>
    </refs>
    <vuln_soft>
      <prod name="wordpress" vendor="wordpress">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0199" seq="2008-0199" published="2008-01-09" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">PRO-Search 0.17 and earlier allows remote attackers to cause a denial of service via certain values of the show_page and time parameters to the default URI.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059439.html">20080103 securityvulns.com russian vulnerabilities digest</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3539">3539</ref>
      <ref source="MISC" url="http://securityvulns.ru/Sdocument731.html">http://securityvulns.ru/Sdocument731.html</ref>
      <ref source="MISC" url="http://sourceforge.net/project/shownotes.php?release_id=563784&amp;group_id=149797">http://sourceforge.net/project/shownotes.php?release_id=563784&amp;group_id=149797</ref>
      <ref source="MISC" url="http://websecurity.com.ua/1259/">http://websecurity.com.ua/1259/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/485786/100/0/threaded">20080103 securityvulns.com russian vulnerabilities digest</ref>
    </refs>
    <vuln_soft>
      <prod name="pro_search" vendor="pro_search">
        <vers num="0.16" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0200" seq="2008-0200" published="2008-01-09" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in account/index.html in RotaBanner Local 3 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) user or (2) drop parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059439.html">20080103 securityvulns.com russian vulnerabilities digest</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3539">3539</ref>
      <ref source="MISC" url="http://securityvulns.ru/Sdocument625.html">http://securityvulns.ru/Sdocument625.html</ref>
      <ref source="MISC" url="http://websecurity.com.ua/1442/">http://websecurity.com.ua/1442/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/485786/100/0/threaded">20080103 securityvulns.com russian vulnerabilities digest</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27138">27138</ref>
    </refs>
    <vuln_soft>
      <prod name="rotabanner_local" vendor="medialand">
        <vers num="3" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0201" seq="2008-0201" published="2008-01-09" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php in ExpressionEngine 1.2.1 and earlier allows remote attackers to inject arbitrary web script or HTML via the URL parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059439.html">20080103 securityvulns.com russian vulnerabilities digest</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3539">3539</ref>
      <ref source="MISC" url="http://securityvulns.ru/Sdocument472.html">http://securityvulns.ru/Sdocument472.html</ref>
      <ref source="MISC" url="http://websecurity.com.ua/1454/">http://websecurity.com.ua/1454/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/485786/100/0/threaded">20080103 securityvulns.com russian vulnerabilities digest</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27128">27128</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39442">expressionengine-index-xss(39442)</ref>
    </refs>
    <vuln_soft>
      <prod name="expressionengine" vendor="expressionengine">
        <vers num="1.2.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0202" seq="2008-0202" published="2008-01-09" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">CRLF injection vulnerability in index.php in ExpressionEngine 1.2.1 and earlier allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the URL parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059439.html">20080103 securityvulns.com russian vulnerabilities digest</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3539">3539</ref>
      <ref source="MISC" url="http://securityvulns.ru/Sdocument472.html">http://securityvulns.ru/Sdocument472.html</ref>
      <ref source="MISC" url="http://websecurity.com.ua/1454/">http://websecurity.com.ua/1454/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/485786/100/0/threaded">20080103 securityvulns.com russian vulnerabilities digest</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27128">27128</ref>
    </refs>
    <vuln_soft>
      <prod name="expressionengine" vendor="expressionengine">
        <vers num="1.2.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0203" seq="2008-0203" published="2008-01-09" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in cryptographp/admin.php in the Cryptographp 1.2 and earlier plugin for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) cryptwidth, (2) cryptheight, (3) bgimg, (4) charR, (5) charG, (6) charB, (7) charclear, (8) tfont, (9) charel, (10) charelc, (11) charelv, (12) charnbmin, (13) charnbmax, (14) charspace, (15) charsizemin, (16) charsizemax, (17) charanglemax, (18) noisepxmin, (19) noisepxmax, (20) noiselinemin, (21) noiselinemax, (22) nbcirclemin, (23) nbcirclemax, or (24) brushsize parameter to wp-admin/options-general.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059439.html">20080103 securityvulns.com russian vulnerabilities digest</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3539">3539</ref>
      <ref source="MISC" url="http://websecurity.com.ua/1596/">http://websecurity.com.ua/1596/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/485786/100/0/threaded">20080103 securityvulns.com russian vulnerabilities digest</ref>
    </refs>
    <vuln_soft>
      <prod name="cryptographp" vendor="wordpress">
        <vers num="1.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0204" seq="2008-0204" published="2008-01-09" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in math-comment-spam-protection.php in the Math Comment Spam Protection 2.1 and earlier plugin for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) mcsp_opt_msg_no_answer or (2) mcsp_opt_msg_wrong_answer parameter to wp-admin/options-general.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059439.html">20080103 securityvulns.com russian vulnerabilities digest</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3539">3539</ref>
      <ref source="MISC" url="http://websecurity.com.ua/1576/">http://websecurity.com.ua/1576/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/485786/100/0/threaded">20080103 securityvulns.com russian vulnerabilities digest</ref>
    </refs>
    <vuln_soft>
      <prod name="math_comment_spam_protection_plugin" vendor="wordpress">
        <vers num="2.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0205" seq="2008-0205" published="2008-01-09" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site request forgery (CSRF) vulnerabilities in math-comment-spam-protection.php in the Math Comment Spam Protection 2.1 and earlier plugin for WordPress allow remote attackers to perform actions as administrators via the (1) mcsp_opt_msg_no_answer or (2) mcsp_opt_msg_wrong_answer parameter to wp-admin/options-general.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059439.html">20080103 securityvulns.com russian vulnerabilities digest</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3539">3539</ref>
      <ref source="MISC" url="http://websecurity.com.ua/1576/">http://websecurity.com.ua/1576/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/485786/100/0/threaded">20080103 securityvulns.com russian vulnerabilities digest</ref>
    </refs>
    <vuln_soft>
      <prod name="math_comment_spam_protection_plugin" vendor="wordpress">
        <vers num="2.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0206" seq="2008-0206" published="2008-01-09" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in captcha\captcha.php in the Captcha! 2.5d and earlier plugin for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) captcha_ttffolder, (2) captcha_numchars, (3) captcha_ttfrange, or (4) captcha_secret parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059439.html">20080103 securityvulns.com russian vulnerabilities digest</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3539">3539</ref>
      <ref source="MISC" url="http://websecurity.com.ua/1588/">http://websecurity.com.ua/1588/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/485786/100/0/threaded">20080103 securityvulns.com russian vulnerabilities digest</ref>
    </refs>
    <vuln_soft>
      <prod name="captcha" vendor="wordpress">
        <vers num="2.5d" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0207" seq="2008-0207" published="2008-01-09" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in PRO-Search 0.17 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) prot, (2) host, (3) path, (4) name, (5) ext, (6) size, (7) search_days, or (8) show_page parameter to the default URI.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059439.html">20080103 securityvulns.com russian vulnerabilities digest</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3539">3539</ref>
      <ref source="MISC" url="http://securityvulns.ru/Sdocument731.html">http://securityvulns.ru/Sdocument731.html</ref>
      <ref source="MISC" url="http://sourceforge.net/project/shownotes.php?release_id=563784&amp;group_id=149797">http://sourceforge.net/project/shownotes.php?release_id=563784&amp;group_id=149797</ref>
      <ref source="MISC" url="http://websecurity.com.ua/1259/">http://websecurity.com.ua/1259/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/485786/100/0/threaded">20080103 securityvulns.com russian vulnerabilities digest</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27126">27126</ref>
    </refs>
    <vuln_soft>
      <prod name="pro_search" vendor="pro_search">
        <vers num="0.17" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0208" seq="2008-0208" published="2008-01-09" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in login.asp in Snitz Forums 2000 3.4.05 and earlier allows remote attackers to inject arbitrary web script or HTML via the target parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://hackerscenter.com/archive/view.asp?id=28145">http://hackerscenter.com/archive/view.asp?id=28145</ref>
      <ref source="MISC" url="http://www.packetstormsecurity.org/0801-exploits/snitz-multi.txt">http://www.packetstormsecurity.org/0801-exploits/snitz-multi.txt</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/485836/100/200/threaded">20080107 [HSC] Snitz Forums Multiple Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27162">27162</ref>
    </refs>
    <vuln_soft>
      <prod name="snitz_forums_2000" vendor="snitz_communications">
        <vers num="3.0"/>
        <vers num="3.1" edition="sr4"/>
        <vers num="3.2.03"/>
        <vers num="3.3"/>
        <vers num="3.3.01"/>
        <vers num="3.3.02"/>
        <vers num="3.3.03"/>
        <vers num="3.4.02"/>
        <vers num="3.4.03"/>
        <vers num="3.4.04"/>
        <vers num="3.4.05" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0209" seq="2008-0209" published="2008-01-09" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.8" CVSS_base_score="5.8" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Open redirect vulnerability in Forums/login.asp in Snitz Forums 2000 3.4.06 and earlier allows remote attackers to redirect users to arbitrary web sites via a URL in the target parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://hackerscenter.com/archive/view.asp?id=28145">http://hackerscenter.com/archive/view.asp?id=28145</ref>
      <ref source="MISC" url="http://www.packetstormsecurity.org/0801-exploits/snitz-multi.txt">http://www.packetstormsecurity.org/0801-exploits/snitz-multi.txt</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/485836/100/200/threaded">20080107 [HSC] Snitz Forums Multiple Vulnerabilities</ref>
    </refs>
    <vuln_soft>
      <prod name="snitz_forums_2000" vendor="snitz_communications">
        <vers num="3.0"/>
        <vers num="3.1" edition="sr4"/>
        <vers num="3.2.03"/>
        <vers num="3.3"/>
        <vers num="3.3.01"/>
        <vers num="3.3.02"/>
        <vers num="3.3.03"/>
        <vers num="3.4.02"/>
        <vers num="3.4.03"/>
        <vers num="3.4.04"/>
        <vers num="3.4.05"/>
        <vers num="3.4.06" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0210" seq="2008-0210" published="2008-01-09" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Uebimiau Webmail 2.7.10 and 2.7.2 does not protect authentication state variables from being set through HTTP requests, which allows remote attackers to bypass authentication via a sess[auth]=1 parameter settting.  NOTE: this can be leveraged to conduct directory traversal attacks without authentication by using CVE-2008-0140.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27154">27154</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4846">4846</ref>
    </refs>
    <vuln_soft>
      <prod name="webmail" vendor="uebimiau">
        <vers num="2.7.2"/>
        <vers num="2.7.10"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0211" seq="2008-0211" published="2008-03-31" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.9" CVSS_base_score="4.9" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the BIOS F.04 through F.11 for the HP Compaq Business Notebook PC allows local users to cause a denial of service via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=120672155821700&amp;w=2">SSRT080004</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019729">1019729</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28494">28494</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1042/references">ADV-2008-1042</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41520">compaq-businessnotebook-pcbios-dos(41520)</ref>
    </refs>
    <vuln_soft>
      <prod name="2210_series_bios" vendor="compaq">
        <vers num="f.04" prev="1"/>
      </prod>
      <prod name="2510_series_bios" vendor="compaq">
        <vers num="f.08" prev="1"/>
      </prod>
      <prod name="2710_series_bios" vendor="compaq">
        <vers num="f.0d" prev="1"/>
      </prod>
      <prod name="6510_series_bios" vendor="compaq">
        <vers num="f.0f" prev="1"/>
      </prod>
      <prod name="6515_series_bios" vendor="compaq">
        <vers num="f.0a" prev="1"/>
      </prod>
      <prod name="6520_series_bios" vendor="compaq">
        <vers num="f.08" prev="1"/>
      </prod>
      <prod name="6710_series_bios" vendor="compaq">
        <vers num="f.0f" prev="1"/>
      </prod>
      <prod name="6715_series_bios" vendor="compaq">
        <vers num="f.0a" prev="1"/>
      </prod>
      <prod name="6720_series_bios" vendor="compaq">
        <vers num="f.08" prev="1"/>
      </prod>
      <prod name="6820_series_bios" vendor="compaq">
        <vers num="f.08" prev="1"/>
      </prod>
      <prod name="6910_series_bios" vendor="compaq">
        <vers num="f.11" prev="1"/>
      </prod>
      <prod name="8510_series_bios" vendor="compaq">
        <vers num="f.0e" prev="1"/>
      </prod>
      <prod name="8710_series_bios" vendor="compaq">
        <vers num="f.08" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0212" seq="2008-0212" published="2008-02-06" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">ovtopmd in HP OpenView Network Node Manager (OV NNM) 6.41, 7.01, and 7.51 allows remote attackers to cause a denial of service (crash) via a crafted TCP request that triggers an out-of-bounds memory access.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=652">20080204 Hewlett-Packard Network Node Manager Topology Manager Service DoS Vulnerability</ref>
      <ref source="HP" url="http://www.securityfocus.com/archive/1/487586/100/0/threaded">HPSBMA02307</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27629" patch="1">27629</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019306">1019306</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0424" adv="1">ADV-2008-0424</ref>
    </refs>
    <vuln_soft>
      <prod name="openview_network_node_manager" vendor="hp">
        <vers num="6.41"/>
        <vers num="7.01"/>
        <vers num="7.51"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0213" seq="2008-0213" published="2008-02-07" modified="2019-10-09" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in a certain ActiveX control for HP Virtual Rooms (HPVR) 6 and earlier allows remote attackers to execute arbitrary code via unknown vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=120231595903371&amp;w=2">SSRT080007</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019311">1019311</ref>
    </refs>
    <vuln_soft>
      <prod name="virtual_rooms" vendor="hp">
        <vers num="6" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0214" seq="2008-0214" published="2008-02-07" modified="2011-03-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple unspecified vulnerabilities in HP Select Identity 4.00, 4.01, 4.11, 4.12, 4.13, and 4.20 allow remote authenticated users to gain access via unknown vectors.</descript>
    </desc>
    <sols>
      <sol source="nvd">In order to download the patch, user must login.</sol>
    </sols>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=120239931201443&amp;w=2">HPSBMA02309</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27667">27667</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019322">1019322</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0472">ADV-2008-0472</ref>
    </refs>
    <vuln_soft>
      <prod name="select_identity" vendor="hp">
        <vers num="4.00"/>
        <vers num="4.01"/>
        <vers num="4.10"/>
        <vers num="4.11"/>
        <vers num="4.12"/>
        <vers num="4.13"/>
        <vers num="4.20"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0215" seq="2008-0215" published="2008-02-11" modified="2011-03-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple unspecified vulnerabilities in HP Storage Essentials Storage Resource Management (SRM) before 6.0.0 allow remote attackers to obtain unspecified access to a managed device via unknown attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01316132">SSRT071474</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27643">27643</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019312">1019312</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0440">ADV-2008-0440</ref>
    </refs>
    <vuln_soft>
      <prod name="storage_essentials_srm_enterprise" vendor="hp">
        <vers num="5.1.3" prev="1"/>
      </prod>
      <prod name="storage_essentials_srm_standard" vendor="hp">
        <vers num="5.1.3" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0216" seq="2008-0216" published="2008-01-15" modified="2017-08-07" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The ptsname function in FreeBSD 6.0 through 7.0-PRERELEASE does not properly verify that a certain portion of a device name is associated with a pty of a user who is calling the pt_chown function, which might allow local users to read data from the pty from another user.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="FREEBSD" url="http://security.FreeBSD.org/advisories/FreeBSD-SA-08:01.pty.asc" patch="1">FreeBSD-SA-08:01</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27284">27284</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019191">1019191</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39667">freebsd-ptsname-information-disclosure(39667)</ref>
    </refs>
    <vuln_soft>
      <prod name="freebsd" vendor="freebsd">
        <vers num="6.0" edition="release"/>
        <vers num="6.0" edition="stable"/>
        <vers num="6.1" edition="release"/>
        <vers num="6.1" edition="release_p10"/>
        <vers num="6.1" edition="stable"/>
        <vers num="6.2" edition="stable"/>
        <vers num="6.3"/>
        <vers num="7.0" edition="current"/>
        <vers num="7.0" edition="pre-release"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0217" seq="2008-0217" published="2008-01-15" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.9" CVSS_base_score="6.9" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The script program in FreeBSD 5.0 through 7.0-PRERELEASE invokes openpty, which creates a pseudo-terminal with world-readable and world-writable permissions when it is not run as root, which allows local users to read data from the terminal of the user running script.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="FREEBSD" url="http://security.FreeBSD.org/advisories/FreeBSD-SA-08:01.pty.asc" patch="1">FreeBSD-SA-08:01</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27284">27284</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019191">1019191</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39665">freebsd-openpty-information-disclosure(39665)</ref>
    </refs>
    <vuln_soft>
      <prod name="freebsd" vendor="freebsd">
        <vers num="5.0"/>
        <vers num="5.5"/>
        <vers num="6.0"/>
        <vers num="6.1"/>
        <vers num="6.2"/>
        <vers num="7.0" edition="pre-release"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0218" seq="2008-0218" published="2008-01-10" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in admin/index.html in Merak IceWarp Mail Server allows remote attackers to inject arbitrary web script or HTML via the message parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27189">27189</ref>
      <ref source="MISC" url="http://www.securityfocus.com/data/vulnerabilities/exploits/27189.html">http://www.securityfocus.com/data/vulnerabilities/exploits/27189.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0135">ADV-2008-0135</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39564">icewarpmailserver-index-xss(39564)</ref>
    </refs>
    <vuln_soft>
      <prod name="icewarp_mail_server" vendor="merak">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0219" seq="2008-0219" published="2008-01-10" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in soporte_horizontal_w.php in PHP Webquest 2.6 allows remote attackers to execute arbitrary SQL commands via the id_actividad parameter, a different vector than CVE-2007-4920.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27192">27192</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39560">webquest-soportehorizontalw-sql-injection(39560)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4867">4867</ref>
    </refs>
    <vuln_soft>
      <prod name="php_webquest" vendor="php_webquest">
        <vers num="2.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0220" seq="2008-0220" published="2008-01-10" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple stack-based buffer overflows in the WebLaunch.WeblaunchCtl.1 (aka CWebLaunchCtl) ActiveX control in weblaunch.ocx 1.0.0.1 in Gateway Weblaunch allow remote attackers to execute arbitrary code via a long string in the (1) second or (2) fourth argument to the DoWebLaunch method.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://marc.info/?l=full-disclosure&amp;m=119984138526735&amp;w=2">20080109 Gateway WebLaunch ActiveX Control Insecure Method</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/735441">VU#735441</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27193">27193</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0077">ADV-2008-0077</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4869">4869</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4982">4982</ref>
    </refs>
    <vuln_soft>
      <prod name="cweblaunchctl_activex_control" vendor="gateway">
        <vers num="1.0.0.1"/>
      </prod>
      <prod name="weblaunch" vendor="gateway">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0221" seq="2008-0221" published="2008-01-10" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in the WebLaunch.WeblaunchCtl.1 (aka CWebLaunchCtl) ActiveX control in weblaunch.ocx 1.0.0.1 in Gateway Weblaunch allows remote attackers to execute arbitrary programs via a ..\ (dot dot backslash) in the second argument to the DoWebLaunch method.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://marc.info/?l=full-disclosure&amp;m=119984138526735&amp;w=2">20080109 Gateway WebLaunch ActiveX Control Insecure Method</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0077">ADV-2008-0077</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4869">4869</ref>
    </refs>
    <vuln_soft>
      <prod name="weblaunch" vendor="gateway">
        <vers num="1.0.0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0222" seq="2008-0222" published="2008-01-10" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unrestricted file upload vulnerability in ajaxfilemanager.php in the Wp-FileManager 1.2 plugin for WordPress allows remote attackers to upload and execute arbitrary PHP code via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27151">27151</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39462">wordpress-wpfilemanager-file-upload(39462)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4844">4844</ref>
    </refs>
    <vuln_soft>
      <prod name="filemanager" vendor="wordpress">
        <vers num="1.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0223" seq="2008-0223" published="2008-01-10" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in JustSystems JSFC.DLL, as used in multiple JustSystems products such as Ichitaro, allows remote attackers to execute arbitrary code via a crafted .JTD file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="JVN" url="http://jvn.jp/jp/JVN%2308237857/index.html">JVN#08237857</ref>
      <ref source="MISC" url="http://www.fourteenforty.jp/research/advisory.cgi?FFRRA-20080107">http://www.fourteenforty.jp/research/advisory.cgi?FFRRA-20080107</ref>
      <ref source="CONFIRM" url="http://www.justsystems.com/jp/info/pd8001.html">http://www.justsystems.com/jp/info/pd8001.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27153">27153</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019168">1019168</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0045">ADV-2008-0045</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39501">justsystems-jsfc-bo(39501)</ref>
    </refs>
    <vuln_soft>
      <prod name="ichitaro" vendor="justsystem">
        <vers num="11.0"/>
        <vers num="12.0"/>
        <vers num="13.0"/>
        <vers num="2004"/>
        <vers num="2005"/>
        <vers num="2006"/>
        <vers num="2007"/>
        <vers num="linux"/>
      </prod>
      <prod name="ichitaro_lite2" vendor="justsystem">
        <vers num=""/>
      </prod>
      <prod name="ichitaro_viewer" vendor="justsystem">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0224" seq="2008-0224" published="2008-01-10" modified="2017-10-18" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the Newbb_plus 0.92 and earlier module in RunCMS 1.6.1 allows remote attackers to execute arbitrary SQL commands via the Client-Ip parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27152">27152</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39478">runcms-newbb-client-sql-injection(39478)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4845">4845</ref>
    </refs>
    <vuln_soft>
      <prod name="runcms" vendor="runcms">
        <vers num="1.5.3"/>
        <vers num="1.6"/>
        <vers num="1.6.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0225" seq="2008-0225" published="2008-01-10" modified="2011-10-17" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in the rmff_dump_cont function in input/libreal/rmff.c in xine-lib 1.1.9 and earlier allows remote attackers to execute arbitrary code via the SDP Abstract attribute in an RTSP session, related to the rmff_dump_header function and related to disregarding the max field.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/xinermffhof-adv.txt">http://aluigi.altervista.org/adv/xinermffhof-adv.txt</ref>
      <ref source="CONFIRM" url="http://bugs.gentoo.org/show_bug.cgi?id=205197">http://bugs.gentoo.org/show_bug.cgi?id=205197</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200801-12.xml">GLSA-200801-12</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=567872">http://sourceforge.net/project/shownotes.php?release_id=567872</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1472">DSA-1472</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:020">MDVSA-2008:020</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:045">MDVSA-2008:045</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/suse_security_summary_report.html">SUSE-SR:2008:002</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27198">27198</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-635-1">USN-635-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0163" adv="1">ADV-2008-0163</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=428620">https://bugzilla.redhat.com/show_bug.cgi?id=428620</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00592.html">FEDORA-2008-0718</ref>
    </refs>
    <vuln_soft>
      <prod name="xine-lib" vendor="xine">
        <vers num="1.1.9" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0226" seq="2008-0226" published="2008-01-10" modified="2018-10-19" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple buffer overflows in yaSSL 1.7.5 and earlier, as used in MySQL and possibly other products, allow remote attackers to execute arbitrary code via (1) the ProcessOldClientHello function in handshake.cpp or (2) "input_buffer&amp; operator>>" in yassl_imp.cpp.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.mysql.com/33814">http://bugs.mysql.com/33814</ref>
      <ref source="CONFIRM" url="http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html">http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html" adv="1">APPLE-SA-2008-10-09</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3531" adv="1">3531</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3216" adv="1">http://support.apple.com/kb/HT3216</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1478" adv="1">DSA-1478</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:150">MDVSA-2008:150</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/485810/100/0/threaded" adv="1">20080104 Multiple vulnerabilities in yaSSL 1.7.5</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/485811/100/0/threaded" adv="1">20080104 Pre-auth buffer-overflow in mySQL through yaSSL</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27140" adv="1">27140</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/31681" adv="1">31681</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-588-1" adv="1">USN-588-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0560/references">ADV-2008-0560</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2780">ADV-2008-2780</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39429">yassl-processoldclienthello-bo(39429)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39431">yassl-inputbufferoperator-bo(39431)</ref>
    </refs>
    <vuln_soft>
      <prod name="mysql" vendor="mysql">
        <vers num="5.0.0"/>
        <vers num="5.0.1"/>
        <vers num="5.0.2"/>
        <vers num="5.0.3"/>
        <vers num="5.0.4"/>
        <vers num="5.0.5"/>
        <vers num="5.0.6"/>
        <vers num="5.0.7"/>
        <vers num="5.0.8"/>
        <vers num="5.0.9"/>
        <vers num="5.0.10"/>
        <vers num="5.0.11"/>
        <vers num="5.0.12"/>
        <vers num="5.0.13"/>
        <vers num="5.0.14"/>
        <vers num="5.0.15"/>
        <vers num="5.0.16"/>
        <vers num="5.0.17"/>
        <vers num="5.0.18"/>
        <vers num="5.0.19"/>
        <vers num="5.0.20"/>
        <vers num="5.0.20a"/>
        <vers num="5.0.21"/>
        <vers num="5.0.22"/>
        <vers num="5.0.23"/>
        <vers num="5.0.24"/>
        <vers num="5.0.24a"/>
        <vers num="5.0.25"/>
        <vers num="5.0.26"/>
        <vers num="5.0.27"/>
        <vers num="5.0.28"/>
        <vers num="5.0.30" edition="sp1"/>
        <vers num="5.0.32"/>
        <vers num="5.0.33"/>
        <vers num="5.0.34"/>
        <vers num="5.0.36" edition="sp1"/>
        <vers num="5.0.37"/>
        <vers num="5.0.38"/>
        <vers num="5.0.40"/>
        <vers num="5.0.41"/>
        <vers num="5.0.42"/>
        <vers num="5.0.44" edition="sp1"/>
        <vers num="5.0.45"/>
        <vers num="5.0.46"/>
        <vers num="5.0.48"/>
        <vers num="5.0.50" edition="sp1"/>
        <vers num="5.0.51"/>
        <vers num="5.0.51a"/>
        <vers num="5.0.51b"/>
        <vers num="5.0.52"/>
        <vers num="5.0.54"/>
        <vers num="5.0.54a"/>
        <vers num="5.0.56" edition="sp1"/>
        <vers num="5.0.58"/>
        <vers num="5.0.60" edition="sp1"/>
        <vers num="5.0.62"/>
        <vers num="5.0.64"/>
        <vers num="5.0.66" edition="sp1"/>
        <vers num="5.0.66a"/>
        <vers num="5.1"/>
        <vers num="5.1.1"/>
        <vers num="5.1.2"/>
        <vers num="5.1.3"/>
        <vers num="5.1.4"/>
        <vers num="5.1.5"/>
        <vers num="5.1.6"/>
        <vers num="5.1.7"/>
        <vers num="5.1.8"/>
        <vers num="5.1.9"/>
        <vers num="5.1.10"/>
        <vers num="5.1.11"/>
        <vers num="5.1.12"/>
        <vers num="5.1.13"/>
        <vers num="5.1.14"/>
        <vers num="5.1.15"/>
        <vers num="5.1.16"/>
        <vers num="5.1.17"/>
        <vers num="5.1.18"/>
        <vers num="5.1.19"/>
        <vers num="5.1.20"/>
        <vers num="5.1.21"/>
        <vers num="5.1.22"/>
      </prod>
      <prod name="yassl" vendor="yassl">
        <vers num="1.7.5" prev="1"/>
      </prod>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.5.4"/>
      </prod>
      <prod name="ubuntu_linux" vendor="canonical">
        <vers num="6.06" edition=":~~lts~~~"/>
        <vers num="6.10"/>
        <vers num="7.04"/>
        <vers num="7.10"/>
      </prod>
      <prod name="debian_linux" vendor="debian">
        <vers num="5.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0227" seq="2008-0227" published="2008-01-10" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">yaSSL 1.7.5 and earlier, as used in MySQL and possibly other products, allows remote attackers to cause a denial of service (crash) via a Hello packet containing a large size value, which triggers a buffer over-read in the HASHwithTransform::Update function in hash.cpp.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.mysql.com/33814">http://bugs.mysql.com/33814</ref>
      <ref source="CONFIRM" url="http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html">http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html">APPLE-SA-2008-10-09</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3531">3531</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3216">http://support.apple.com/kb/HT3216</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1478">DSA-1478</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:150">MDVSA-2008:150</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/485810/100/0/threaded">20080104 Multiple vulnerabilities in yaSSL 1.7.5</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27140">27140</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/31681">31681</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-588-1">USN-588-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0560/references">ADV-2008-0560</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2780">ADV-2008-2780</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39433">yassl-hashwithtransformupdate-dos(39433)</ref>
    </refs>
    <vuln_soft>
      <prod name="yassl" vendor="yassl">
        <vers num="1.7.5" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0228" seq="2008-0228" published="2008-01-10" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Cross-site request forgery (CSRF) vulnerability in apply.cgi in the Linksys WRT54GL Wireless-G Broadband Router with firmware 4.30.9 allows remote attackers to perform actions as administrators.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3534">3534</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/485853/100/0/threaded">20080107 Linksys WRT54 GL - Session riding (CSRF)</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486362/100/0/threaded">20080115 Re: Linksys WRT54 GL - Session riding (CSRF)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39502">linksys-apply-csrf(39502)</ref>
    </refs>
    <vuln_soft>
      <prod name="wrt54gl" vendor="linksys">
        <vers num="4.30.9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0229" seq="2008-0229" published="2008-01-10" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The telnet service in LevelOne WBR-3460 4-Port ADSL 2/2+ Wireless Modem Router with firmware 1.00.11 and 1.00.12 does not require authentication, which allows remote attackers on the local or wireless network to obtain administrative access.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3533">3533</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/485935/100/0/threaded">20080108 Level-One WBR-3460A Grants Root Access</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27183">27183</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019162">1019162</ref>
    </refs>
    <vuln_soft>
      <prod name="wbr-3460a" vendor="level_one">
        <vers num="1.0.11"/>
        <vers num="1.0.12"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0230" seq="2008-0230" published="2008-01-10" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in php121db.php in osDate 2.0.8 and possibly earlier versions allows remote attackers to execute arbitrary PHP code via a URL in the php121dir parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://packetstormsecurity.org/0801-exploits/osdata-lfi.txt">http://packetstormsecurity.org/0801-exploits/osdata-lfi.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27208">27208</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39567">osdate-php121db-file-include(39567)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4870">4870</ref>
    </refs>
    <vuln_soft>
      <prod name="osdate" vendor="osdate">
        <vers num="2.0.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0231" seq="2008-0231" published="2008-01-10" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple directory traversal vulnerabilities in index.php in Tuned Studios (1) Subwoofer, (2) Freeze Theme, (3) Orange Cutout, (4) Lonely Maple, (5) Endless, (6) Classic Theme, and (7) Music Theme webpage templates allow remote attackers to include and execute arbitrary files via ".." sequences in the page parameter.  NOTE: this can be leveraged for remote file inclusion when running in some PHP 5 environments.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3532">3532</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/485991/100/0/threaded">20080109 LFI in Tuned Studios Templates</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27196">27196</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39555">tunedstudiostemplates-index-file-include(39555)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4876">4876</ref>
    </refs>
    <vuln_soft>
      <prod name="classic_theme" vendor="tuned_studios">
        <vers num=""/>
      </prod>
      <prod name="endless" vendor="tuned_studios">
        <vers num=""/>
      </prod>
      <prod name="freeze_theme" vendor="tuned_studios">
        <vers num=""/>
      </prod>
      <prod name="lonely_maple" vendor="tuned_studios">
        <vers num=""/>
      </prod>
      <prod name="music_theme" vendor="tuned_studios">
        <vers num=""/>
      </prod>
      <prod name="orange_cutout" vendor="tuned_studios">
        <vers num=""/>
      </prod>
      <prod name="subwoofer" vendor="tuned_studios">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0232" seq="2008-0232" published="2008-01-10" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in Zero CMS 1.0 Alpha allow remote attackers to execute arbitrary SQL commands via (1) the id parameter to index.php, or the (2) f or t parameters to forums/index.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://packetstormsecurity.org/0801-exploits/zerocms-sql.txt">http://packetstormsecurity.org/0801-exploits/zerocms-sql.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27186">27186</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39530">zerocms-index-sql-injection(39530)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4864">4864</ref>
    </refs>
    <vuln_soft>
      <prod name="zero_cms" vendor="zero_cms">
        <vers num="1.0_alpha"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0233" seq="2008-0233" published="2008-01-10" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unrestricted file upload vulnerability in Zero CMS 1.0 Alpha and earlier allows remote attackers to bypass intended access restrictions and upload and execute arbitrary files by uploading an avatar file with an accepted Content-Type such as image/jpeg.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://packetstormsecurity.org/0801-exploits/zerocms-sql.txt">http://packetstormsecurity.org/0801-exploits/zerocms-sql.txt</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4864">4864</ref>
    </refs>
    <vuln_soft>
      <prod name="zero_cms" vendor="zero_cms">
        <vers num="1.0_alpha"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0234" seq="2008-0234" published="2008-01-10" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in Apple Quicktime Player 7.3.1.70 and other versions before 7.4.1, when RTSP tunneling is enabled, allows remote attackers to execute arbitrary code via a long Reason-Phrase response to an rtsp:// request, as demonstrated using a 404 error message.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//Jul/msg00000.html" adv="1" patch="1">APPLE-SA-2008-07-10</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Feb/msg00001.html">APPLE-SA-2008-02-06</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3537">3537</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/112179">VU#112179</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486091/100/0/threaded">20080110 Buffer-overflow in Quicktime Player 7.3.1.70</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486114/100/0/threaded">20080110 Re: Buffer-overflow in Quicktime Player 7.3.1.70</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486161/100/0/threaded">20080111 Re: Re: Buffer-overflow in Quicktime Player 7.3.1.70</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486174/100/0/threaded">20080111 Re: Buffer-overflow in Quicktime Player 7.3.1.70</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486238/100/0/threaded">20080114 Re: [Full-disclosure] Buffer-overflow in Quicktime Player 7.3.1.70</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486241/100/0/threaded">20080112 Re: Re: Buffer-overflow in Quicktime Player 7.3.1.70</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486268/100/0/threaded">20080112 Re: Buffer-overflow in Quicktime Player 7.3.1.70</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27225">27225</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019178">1019178</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0107" adv="1">ADV-2008-0107</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2064/references" adv="1">ADV-2008-2064</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39601">quicktime-rtsp-responses-bo(39601)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4885">4885</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4906">4906</ref>
    </refs>
    <vuln_soft>
      <prod name="quicktime" vendor="apple">
        <vers num="7.3.1.70"/>
        <vers num="7.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0235" seq="2008-0235" published="2008-01-10" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The Microsoft VFP_OLE_Server ActiveX control allows remote attackers to execute arbitrary code by invoking the foxcommand method.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://shinnai.altervista.org/exploits/txt/TXT_rNowA1916DKFNUF48NyS.html">http://shinnai.altervista.org/exploits/txt/TXT_rNowA1916DKFNUF48NyS.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27199">27199</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39559">microsoft-vfpoleserver-command-execution(39559)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4875">4875</ref>
    </refs>
    <vuln_soft>
      <prod name="vfp_ole_server_activex_control" vendor="microsoft">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0236" seq="2008-0236" published="2008-01-10" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="5.8" CVSS_base_score="5.8" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">An ActiveX control for Microsoft Visual FoxPro (vfp6r.dll 6.0.8862.0) allows remote attackers to execute arbitrary commands by invoking the DoCmd method.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://shinnai.altervista.org/exploits/txt/TXT_DiWu9j82RCq4zpaQAoxn.html">http://shinnai.altervista.org/exploits/txt/TXT_DiWu9j82RCq4zpaQAoxn.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27205">27205</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39558">microsoft-foxserver-command-execution(39558)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4873">4873</ref>
    </refs>
    <vuln_soft>
      <prod name="visual_foxpro" vendor="microsoft">
        <vers num="6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0237" seq="2008-0237" published="2008-01-10" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The Microsoft Rich Textbox ActiveX Control (RICHTX32.OCX) 6.1.97.82 allows remote attackers to execute arbitrary commands by invoking the insecure SaveFile method.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://shinnai.altervista.org/exploits/txt/TXT_DZVN8CwCha0I2fI3NeEs.html">http://shinnai.altervista.org/exploits/txt/TXT_DZVN8CwCha0I2fI3NeEs.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27201">27201</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39557">microsoft-richtextbox-file-overwrite(39557)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4874">4874</ref>
    </refs>
    <vuln_soft>
      <prod name="rich_textbox_control" vendor="microsoft">
        <vers num="6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0238" seq="2008-0238" published="2008-01-11" modified="2008-09-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple heap-based buffer overflows in the rmff_dump_cont function in input/libreal/rmff.c in xine-lib 1.1.9 allow remote attackers to execute arbitrary code via the SDP (1) Title, (2) Author, or (3) Copyright attribute, related to the rmff_dump_header function, different vectors than CVE-2008-0225.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <sols>
      <sol source="nvd">Please see the following link for more information regarding the exploit:

http://aluigi.altervista.org/adv/xinermffhof-adv.txt</sol>
    </sols>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.gentoo.org/show_bug.cgi?id=205197">http://bugs.gentoo.org/show_bug.cgi?id=205197</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200801-12.xml">GLSA-200801-12</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:020">MDVSA-2008:020</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:045">MDVSA-2008:045</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-635-1">USN-635-1</ref>
    </refs>
    <vuln_soft>
      <prod name="xine-lib" vendor="xine">
        <vers num="1.1.9" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0239" seq="2008-0239" published="2008-01-11" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in Sun Java System Identity Manager 6.0 SP1 through SP3, 7.0, and 7.1 allow remote attackers to inject arbitrary HTML or web script via the (1) cntry or lang parameters to /idm/login.jsp, (2) resultsForm parameter to /idm/account/findForSelect.jsp, or (3) activeControl parameter to /idm/user/main.jsp.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3535">3535</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-103180-1">103180</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-66-200558-1">200558</ref>
      <ref source="MISC" url="http://www.procheckup.com/Vulnerability_PR07-06.php" patch="1">http://www.procheckup.com/Vulnerability_PR07-06.php</ref>
      <ref source="MISC" url="http://www.procheckup.com/Vulnerability_PR07-07.php" patch="1">http://www.procheckup.com/Vulnerability_PR07-07.php</ref>
      <ref source="MISC" url="http://www.procheckup.com/Vulnerability_PR07-08.php" patch="1">http://www.procheckup.com/Vulnerability_PR07-08.php</ref>
      <ref source="MISC" url="http://www.procheckup.com/Vulnerability_PR07-09.php">http://www.procheckup.com/Vulnerability_PR07-09.php</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486076/100/0/threaded">20080110 PR07-06, PR07-07, PR07-08, PR07-09, PR07-10, PR07-12: Several XSS, Cross-domain Redirection and Frame Injection on Sun Java System Identity Manager</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27214">27214</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019175">1019175</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0089">ADV-2008-0089</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39580">sun-identity-login-xss(39580)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39581">sun-identity-lang-xss(39581)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39582">sun-identity-resultsform-xss(39582)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39583">sun-identity-main-xss(39583)</ref>
    </refs>
    <vuln_soft>
      <prod name="java_system_identity_manager" vendor="sun">
        <vers num="6.0" edition="sp1"/>
        <vers num="6.0" edition="sp2"/>
        <vers num="6.0" edition="sp3"/>
        <vers num="7.0"/>
        <vers num="7.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0240" seq="2008-0240" published="2008-01-11" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">/idm/help/index.jsp in Sun Java System Identity Manager 6.0 SP1 through SP3, 7.0, and 7.1 allows remote attackers to inject frames from arbitrary web sites and conduct phishing attacks via the helpUrl parameter, aka "frame injection."</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3535">3535</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-103180-1">103180</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-66-200558-1">200558</ref>
      <ref source="MISC" url="http://www.procheckup.com/Vulnerability_PR07-10.php" patch="1">http://www.procheckup.com/Vulnerability_PR07-10.php</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486076/100/0/threaded">20080110 PR07-06, PR07-07, PR07-08, PR07-09, PR07-10, PR07-12: Several XSS, Cross-domain Redirection and Frame Injection on Sun Java System Identity Manager</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27214">27214</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0089">ADV-2008-0089</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39586">sun-identity-index-frame-injection(39586)</ref>
    </refs>
    <vuln_soft>
      <prod name="java_system_identity_manager" vendor="sun">
        <vers num="6.0" edition="sp1"/>
        <vers num="6.0" edition="sp2"/>
        <vers num="6.0" edition="sp3"/>
        <vers num="7.0"/>
        <vers num="7.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0241" seq="2008-0241" published="2008-01-11" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.8" CVSS_base_score="5.8" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:P)">
    <desc>
      <descript source="cve">Open redirect vulnerability in /idm/user/login.jsp in Sun Java System Identity Manager 6.0 SP1 through SP3, 7.0, and 7.1 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the nextPage parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3535">3535</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-103180-1" adv="1" patch="1">103180</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-66-200558-1" adv="1" patch="1">200558</ref>
      <ref source="MISC" url="http://www.procheckup.com/Vulnerability_PR07-12.php" patch="1">http://www.procheckup.com/Vulnerability_PR07-12.php</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486076/100/0/threaded">20080110 PR07-06, PR07-07, PR07-08, PR07-09, PR07-10, PR07-12: Several XSS, Cross-domain Redirection and Frame Injection on Sun Java System Identity Manager</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27214">27214</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0089" adv="1">ADV-2008-0089</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39590">sun-identity-login-security-bypass(39590)</ref>
    </refs>
    <vuln_soft>
      <prod name="java_system_identity_manager" vendor="sun">
        <vers num="6.0" edition="sp1"/>
        <vers num="6.0" edition="sp2"/>
        <vers num="6.0" edition="sp3"/>
        <vers num="7.0"/>
        <vers num="7.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0242" seq="2008-0242" published="2008-01-11" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in libdevinfo in Sun Solaris 10 allows local users to access files and gain privileges via unknown vectors, related to login device permissions.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-103165-1">103165</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-66-200641-1">200641</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27253">27253</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019187">1019187</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0131">ADV-2008-0131</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39629">solaris-libdevinfo-privilege-escalation(39629)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5211">oval:org.mitre.oval:def:5211</ref>
    </refs>
    <vuln_soft>
      <prod name="solaris" vendor="sun">
        <vers num="10.0" edition=":sparc"/>
        <vers num="10.0" edition=":x86"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0243" seq="2008-0243" published="2008-01-11" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Lotus Domino 7.0.2 before Fix Pack 3 allows attackers to cause a denial of service via unknown vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27215">27215</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0086">ADV-2008-0086</ref>
      <ref source="CONFIRM" url="http://www-1.ibm.com/support/docview.wss?uid=swg27011539">http://www-1.ibm.com/support/docview.wss?uid=swg27011539</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39588">lotus-domino-unspecified-dos(39588)</ref>
    </refs>
    <vuln_soft>
      <prod name="lotus_domino" vendor="ibm">
        <vers num="7.0"/>
        <vers num="7.0.1"/>
        <vers num="7.0.2" edition=":fp1"/>
        <vers num="7.0.2" edition=":fp2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0244" seq="2008-0244" published="2008-01-11" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">SAP MaxDB 7.6.03 build 007 and earlier allows remote attackers to execute arbitrary commands via "&amp;&amp;" and other shell metacharacters in exec_sdbinfo and other unspecified commands, which are executed when MaxDB invokes cons.exe.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/sapone-adv.txt">http://aluigi.altervista.org/adv/sapone-adv.txt</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3536">3536</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486039/100/0/threaded">20080109 Pre-auth remote commands execution in SAP MaxDB 7.6.03.07</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27206">27206</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019171">1019171</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0104">ADV-2008-0104</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39573">maxdb-system-command-execution(39573)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4877">4877</ref>
    </refs>
    <vuln_soft>
      <prod name="maxdb" vendor="sap">
        <vers num="7.6.3_build_007" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0245" seq="2008-0245" published="2008-01-11" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">admin.php in UploadImage 1.0 does not check for the original password before making a change to a new password, which allows remote attackers to gain administrator privileges via the pass parameter in a nopass (Set Password) action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27203">27203</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39571">uploadimage-admin-command-execution(39571)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4871">4871</ref>
    </refs>
    <vuln_soft>
      <prod name="uploadimage" vendor="uploadscript">
        <vers num="1.0"/>
      </prod>
      <prod name="uploadscript" vendor="uploadscript">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0246" seq="2008-0246" published="2008-01-11" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">admin.php in UploadScript 1.0 does not check for the original password before making a change to a new password, which allows remote attackers to gain administrator privileges via the pass parameter in a nopass (Set Password) action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27203">27203</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39570">uploadscript-admin-command-execution(39570)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4871">4871</ref>
    </refs>
    <vuln_soft>
      <prod name="uploadimage" vendor="uploadscript">
        <vers num="1.0"/>
      </prod>
      <prod name="uploadscript" vendor="uploadscript">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0247" seq="2008-0247" published="2008-01-11" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in the Express Backup Server service (dsmsvc.exe) in IBM Tivoli Storage Manager (TSM) Express 5.3 before 5.3.7.3 allows remote attackers to execute arbitrary code via a packet with a large length value.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486270/100/0/threaded">20080114 ZDI-08-001: IBM Tivoli Storage Manager Express Backup Server Heap Overflow Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27235" patch="1">27235</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019182">1019182</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0106" adv="1">ADV-2008-0106</ref>
      <ref source="MISC" url="http://www.zerodayinitiative.com/advisories/ZDI-08-001.html">http://www.zerodayinitiative.com/advisories/ZDI-08-001.html</ref>
      <ref source="CONFIRM" url="http://www-1.ibm.com/support/docview.wss?uid=swg21291536" patch="1">http://www-1.ibm.com/support/docview.wss?uid=swg21291536</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39604">ibm-tsmexpressserver-bo(39604)</ref>
    </refs>
    <vuln_soft>
      <prod name="tivoli_storage_manager_express" vendor="ibm">
        <vers num="5.3" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0248" seq="2008-0248" published="2008-01-11" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in an ActiveX control in ccpm_0237.dll for StreamAudio ChainCast ProxyManager allows remote attackers to execute arbitrary code via a long URL argument to the InternalTuneIn method.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059572.html">20080111 StreamAudio ChainCast ProxyManager ccpm_0237.dll Buffer Overflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27247">27247</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0133">ADV-2008-0133</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39622">streamaudio-chaincastproxymanager-bo(39622)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4894">4894</ref>
    </refs>
    <vuln_soft>
      <prod name="chaincast_proxymanager_activex_control" vendor="streamaudio">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0249" seq="2008-0249" published="2008-01-11" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">PHP Webquest 2.6 allows remote attackers to retrieve database credentials via a direct request to admin/backup_phpwebquest.php, which leaks the credentials in an error message if a call to /usr/bin/mysqldump fails.  NOTE: this might only be an issue in limited environments.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27202">27202</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39572">phpwebquest-backup-information-disclosure(39572)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4872">4872</ref>
    </refs>
    <vuln_soft>
      <prod name="phpwebquest" vendor="phpwebquest">
        <vers num="2.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0250" seq="2008-0250" published="2008-01-11" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in Microsoft Visual InterDev 6.0 (SP6) allows user-assisted attackers to execute arbitrary code via a Studio Solution (.SLN) file with a long Project line.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://shinnai.altervista.org/exploits/txt/TXT_PoEOrFM8py30PXrDF7IY.html">http://shinnai.altervista.org/exploits/txt/TXT_PoEOrFM8py30PXrDF7IY.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27250">27250</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41826">visualinterdev-sln-project-bo(41826)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4892">4892</ref>
    </refs>
    <vuln_soft>
      <prod name="visual_interdev" vendor="microsoft">
        <vers num="6.0" edition="sp6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0251" seq="2008-0251" published="2008-01-11" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unrestricted file upload vulnerability in PhotoPost vBGallery before 2.4.2 allows remote attackers to upload and execute arbitrary files via unknown vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.photopost.com/forum/showthread.php?t=134909">http://www.photopost.com/forum/showthread.php?t=134909</ref>
      <ref source="CONFIRM" url="http://www.photopost.com/forum/showthread.php?t=134910">http://www.photopost.com/forum/showthread.php?t=134910</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39621">vbgallery-unspecified-code-execution(39621)</ref>
    </refs>
    <vuln_soft>
      <prod name="photopost_vbgallery" vendor="photopost">
        <vers num="2.4.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0252" seq="2008-0252" published="2008-01-11" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in the _get_file_path function in (1) lib/sessions.py in CherryPy 3.0.x up to 3.0.2, (2) filter/sessionfilter.py in CherryPy 2.1, and (3) filter/sessionfilter.py in CherryPy 2.x allows remote attackers to create or delete arbitrary files, and possibly read and write portions of arbitrary files, via a crafted session id in a cookie.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200801-11.xml">GLSA-200801-11</ref>
      <ref source="CONFIRM" url="http://www.cherrypy.org/changeset/1774" patch="1">http://www.cherrypy.org/changeset/1774</ref>
      <ref source="CONFIRM" url="http://www.cherrypy.org/changeset/1775" patch="1">http://www.cherrypy.org/changeset/1775</ref>
      <ref source="CONFIRM" url="http://www.cherrypy.org/changeset/1776">http://www.cherrypy.org/changeset/1776</ref>
      <ref source="CONFIRM" url="http://www.cherrypy.org/ticket/744">http://www.cherrypy.org/ticket/744</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1481">DSA-1481</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487001/100/0/threaded">20080124 rPSA-2008-0030-1 CherryPy</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27181">27181</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0039">ADV-2008-0039</ref>
      <ref source="CONFIRM" url="https://bugs.gentoo.org/show_bug.cgi?id=204829">https://bugs.gentoo.org/show_bug.cgi?id=204829</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2127">https://issues.rpath.com/browse/RPL-2127</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00240.html">FEDORA-2008-0299</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00297.html">FEDORA-2008-0333</ref>
    </refs>
    <vuln_soft>
      <prod name="cherrypy" vendor="cherrypy">
        <vers num="2.1.0" prev="1"/>
        <vers num="3.0.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0253" seq="2008-0253" published="2008-01-15" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in full_text.php in Binn SBuilder allows remote attackers to execute arbitrary SQL commands via the nid parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486265/100/0/threaded">20080114 Binn SBuilder (nid) Remote Blind Sql Injection Vulnerabily</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27264">27264</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39634">binnsbuilder-fulltext-sql-injection(39634)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4904">4904</ref>
    </refs>
    <vuln_soft>
      <prod name="sbuilder" vendor="binn">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0254" seq="2008-0254" published="2008-01-15" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in activate.php in TutorialCMS (aka Photoshop Tutorials) 1.02, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the userName parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27263">27263</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39642">tutorialcms-activate-sql-injection(39642)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4901">4901</ref>
    </refs>
    <vuln_soft>
      <prod name="tutorialcms" vendor="wavelink_media">
        <vers num="1.02"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0255" seq="2008-0255" published="2008-01-15" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in archive.php in iGaming 1.5, and 1.3.1 and earlier, allows remote attackers to execute arbitrary SQL commands via the section parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27230">27230</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39598">igamingcms-archive-sql-injection(39598)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4886">4886</ref>
    </refs>
    <vuln_soft>
      <prod name="igaming_cms" vendor="igamingcms">
        <vers num="1.3.1" prev="1"/>
        <vers num="1.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0256" seq="2008-0256" published="2008-01-15" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in Matteo Binda ASP Photo Gallery 1.0 allow remote attackers to execute arbitrary SQL commands via the (1) id parameter to (a) Imgbig.asp, (b) thumb.asp, and (c) thumbricerca.asp and the (2) ricerca parameter to (d) thumbricerca.asp.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27262">27262</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39646">aspphotogallery-multiple-sql-injection(39646)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4900">4900</ref>
    </refs>
    <vuln_soft>
      <prod name="asp_photo_gallery" vendor="matteo_binda">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0257" seq="2008-0257" published="2008-01-15" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in search.pl in Dansie Search Engine 2.7 allows remote attackers to inject arbitrary web script or HTML via the keywords parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27269">27269</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39636">dansiesearchengine-search-xss(39636)</ref>
    </refs>
    <vuln_soft>
      <prod name="search_engine" vendor="dansie">
        <vers num="2.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0258" seq="2008-0258" published="2008-01-15" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php in PHP Running Management (phpRunMan) before 1.0.3 allows remote attackers to inject arbitrary web script or HTML via the message parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=568237&amp;group_id=103505" patch="1">http://sourceforge.net/project/shownotes.php?release_id=568237&amp;group_id=103505</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/tracker/index.php?func=detail&amp;aid=1204199&amp;group_id=103505&amp;atid=634992">http://sourceforge.net/tracker/index.php?func=detail&amp;aid=1204199&amp;group_id=103505&amp;atid=634992</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27268" patch="1">27268</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39639">phprunningmanagement-index-xss(39639)</ref>
    </refs>
    <vuln_soft>
      <prod name="phprunman" vendor="php_running_management">
        <vers num="1.0.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0259" seq="2008-0259" published="2008-01-15" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple directory traversal vulnerabilities in _mg/php/mg_thumbs.php in minimal Gallery 0.8 allow remote attackers to read arbitrary files via a .. (dot dot) in the (1) thumbcat and (2) thumb parameters.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27265">27265</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39649">minimalgallery-mgthumbs-file-include(39649)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4902">4902</ref>
    </refs>
    <vuln_soft>
      <prod name="minimal_gallery" vendor="minimal_design">
        <vers num="0.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0260" seq="2008-0260" published="2008-01-15" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">minimal Gallery 0.8 allows remote attackers to obtain configuration information via a direct request to php_info.php, which calls the phpinfo function.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4902">4902</ref>
    </refs>
    <vuln_soft>
      <prod name="minimal_gallery" vendor="minimal_design">
        <vers num="0.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0261" seq="2008-0261" published="2008-01-15" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the search component and module in Mambo 4.5.x and 4.6.x allows remote attackers to cause a denial of service (query flood) via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://forum.mambo-foundation.org/showthread.php?t=9651" patch="1">http://forum.mambo-foundation.org/showthread.php?t=9651</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27239" patch="1">27239</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39613">mambo-search-dos(39613)</ref>
    </refs>
    <vuln_soft>
      <prod name="mambo_open_source" vendor="mambo">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0262" seq="2008-0262" published="2008-01-15" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in includes/articleblock.php in Agares PhpAutoVideo 2.21 allows remote attackers to execute arbitrary SQL commands via the articlecat parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27258">27258</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39641">agares-articleblock-sql-injection(39641)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4898">4898</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4905">4905</ref>
    </refs>
    <vuln_soft>
      <prod name="phpautovideo" vendor="agares_media">
        <vers num="2.21"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0263" seq="2008-0263" published="2008-01-15" modified="2011-03-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The SIP module in Ingate Firewall before 4.6.1 and SIParator before 4.6.1 does not reuse SIP media ports in unspecified call hold and send-only stream scenarios, which allows remote attackers to cause a denial of service (port exhaustion) via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.ingate.com/relnote-461.php" adv="1">http://www.ingate.com/relnote-461.php</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27222">27222</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019176">1019176</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019177">1019177</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0108">ADV-2008-0108</ref>
    </refs>
    <vuln_soft>
      <prod name="firewall" vendor="ingate">
        <vers num="4.6" prev="1"/>
      </prod>
      <prod name="ingate_siparator" vendor="ingate">
        <vers num="4.6" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0264" seq="2008-0264" published="2008-01-15" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Meta Tags (aka Nodewords) 5.x-1.6 module for Drupal, when images are permitted in node bodies, allows remote authenticated users to execute arbitrary code via unspecified vectors involving creation of a node.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://drupal.org/node/209759" patch="1">http://drupal.org/node/209759</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0129">ADV-2008-0129</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39638">drupal-metatags-code-execution(39638)</ref>
    </refs>
    <vuln_soft>
      <prod name="meta_tags_module" vendor="drupal">
        <vers num="5.x-1.6" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0265" seq="2008-0265" published="2008-01-15" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in the Search function in the web management interface in F5 BIG-IP 9.4.3 allow remote attackers to inject arbitrary web script or HTML via the SearchString parameter to (1) list_system.jsp, (2) list_pktfilter.jsp, (3) list_ltm.jsp, (4) resources_audit.jsp, and (5) list_asm.jsp in tmui/Control/jspmap/tmui/system/log/; and (6) list.jsp in certain directories.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3545">3545</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486217/100/0/threaded">20080114 F5 BIG-IP Web Management List Search XSS</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27272">27272</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019190">1019190</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0181">ADV-2008-0181</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39632">f5bigip-searchstring-xss(39632)</ref>
    </refs>
    <vuln_soft>
      <prod name="tmos" vendor="f5">
        <vers num="9.4.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0266" seq="2008-0266" published="2008-01-15" modified="2018-10-15" severity="Low" CVSS_version="2.0" CVSS_score="2.6" CVSS_base_score="2.6" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site request forgery (CSRF) vulnerability in admin.php in eTicket 1.5.5.2 allows remote attackers to change the administrative password and possibly perform other administrative tasks.  NOTE: either the old password must be known, or the attacker must leverage a separate SQL injection vulnerability.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3542">3542</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/485835/100/0/threaded">20080106 eTicket 1.5.5.2 Multiple Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27173">27173</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39490">eticket-admin-csrf(39490)</ref>
    </refs>
    <vuln_soft>
      <prod name="eticket" vendor="eticket">
        <vers num="1.5.5.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0267" seq="2008-0267" published="2008-01-15" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in eTicket 1.5.5.2 allow remote authenticated users to execute arbitrary SQL commands via the (1) status, (2) sort, and (3) way parameters to search.php; and allow remote authenticated administrators to execute arbitrary SQL commands via the (4) msg and (5) password parameters to admin.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3542">3542</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/485835/100/0/threaded">20080106 eTicket 1.5.5.2 Multiple Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27173">27173</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39487">eticket-admin-sql-injection(39487)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39489">eticket-search-sql-injection(39489)</ref>
    </refs>
    <vuln_soft>
      <prod name="eticket" vendor="eticket">
        <vers num="1.5.5.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0268" seq="2008-0268" published="2008-01-15" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in view.php in eTicket 1.5.5.2 allows remote attackers to inject arbitrary web script or HTML via the s parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3542">3542</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/485835/100/0/threaded">20080106 eTicket 1.5.5.2 Multiple Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27173">27173</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39488">eticket-view-xss(39488)</ref>
    </refs>
    <vuln_soft>
      <prod name="eticket" vendor="eticket">
        <vers num="1.5.5.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0269" seq="2008-0269" published="2008-01-15" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="4.9" CVSS_base_score="4.9" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the dotoprocs function in Sun Solaris 10 allows local users to cause a denial of service (panic) via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-103188-1" patch="1">103188</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-66-201513-1">201513</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27260">27260</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019186">1019186</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0130">ADV-2008-0130</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39631">solaris-dotoprocs-dos(39631)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5400">oval:org.mitre.oval:def:5400</ref>
    </refs>
    <vuln_soft>
      <prod name="sunos" vendor="sun">
        <vers num="5.10"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0270" seq="2008-0270" published="2008-01-15" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.0" CVSS_base_score="6.0" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="6.8" CVSS_vector="(AV:N/AC:M/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in TaskFreak! 0.6.1 and earlier allows remote authenticated users to execute arbitrary SQL commands via the sContext parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27257">27257</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39645">taskfreak-index-sql-injection(39645)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4899">4899</ref>
    </refs>
    <vuln_soft>
      <prod name="taskfreak" vendor="taskfreak">
        <vers num="0.6.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0271" seq="2008-0271" published="2008-01-15" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The editor deletion form in BUEditor 4.7.x before 4.7.x-1.0 and 5.x before 5.x-1.1, a module for Drupal, does not follow Drupal's Forms API submission model, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks and delete custom editor interfaces.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://drupal.org/node/208534" patch="1">http://drupal.org/node/208534</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0128">ADV-2008-0128</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39614">drupal-bueditor-csrf(39614)</ref>
    </refs>
    <vuln_soft>
      <prod name="bueditor" vendor="drupal">
        <vers num="4.7.x-1.0" prev="1"/>
        <vers num="5.x-1.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0272" seq="2008-0272" published="2008-01-15" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site request forgery (CSRF) vulnerability in the aggregator module in Drupal 4.7.x before 4.7.11 and 5.x before 5.6 allows remote attackers to delete items from a feed as privileged users.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://drupal.org/node/208562">http://drupal.org/node/208562</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27238" patch="1">27238</ref>
      <ref source="CONFIRM" url="http://www.vbdrupal.org/forum/showthread.php?p=6878">http://www.vbdrupal.org/forum/showthread.php?p=6878</ref>
      <ref source="CONFIRM" url="http://www.vbdrupal.org/forum/showthread.php?t=1349">http://www.vbdrupal.org/forum/showthread.php?t=1349</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0127">ADV-2008-0127</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0134">ADV-2008-0134</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39617">drupal-aggregator-csrf(39617)</ref>
    </refs>
    <vuln_soft>
      <prod name="drupal" vendor="drupal">
        <vers num="4.0.0"/>
        <vers num="4.1.0"/>
        <vers num="4.2.0_rc"/>
        <vers num="4.4"/>
        <vers num="4.4.1"/>
        <vers num="4.4.2"/>
        <vers num="4.4.3"/>
        <vers num="4.5"/>
        <vers num="4.5.1"/>
        <vers num="4.5.2"/>
        <vers num="4.5.3"/>
        <vers num="4.5.4"/>
        <vers num="4.5.5"/>
        <vers num="4.5.6"/>
        <vers num="4.5.7"/>
        <vers num="4.5.8"/>
        <vers num="4.6"/>
        <vers num="4.6.1"/>
        <vers num="4.6.2"/>
        <vers num="4.6.3"/>
        <vers num="4.6.4"/>
        <vers num="4.6.5"/>
        <vers num="4.6.6"/>
        <vers num="4.6.7"/>
        <vers num="4.6.8"/>
        <vers num="4.6.9"/>
        <vers num="4.6.10"/>
        <vers num="4.6.11"/>
        <vers num="4.7"/>
        <vers num="4.7.1"/>
        <vers num="4.7.2"/>
        <vers num="4.7.3"/>
        <vers num="4.7.4"/>
        <vers num="4.7.5"/>
        <vers num="4.7.6"/>
        <vers num="4.7.7"/>
        <vers num="4.7.8"/>
        <vers num="4.7.9"/>
        <vers num="4.7.10"/>
        <vers num="4.7_rev_1.2"/>
        <vers num="4.7_rev_1.15"/>
        <vers num="5.0"/>
        <vers num="5.1"/>
        <vers num="5.1_rev1.1"/>
        <vers num="5.2"/>
        <vers num="5.3"/>
        <vers num="5.4"/>
        <vers num="5.5."/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0273" seq="2008-0273" published="2008-01-15" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Interpretation conflict in Drupal 4.7.x before 4.7.11 and 5.x before 5.6, when Internet Explorer 6 is used, allows remote attackers to conduct cross-site scripting (XSS) attacks via invalid UTF-8 byte sequences, which are not processed as UTF-8 by Drupal's HTML filtering, but are processed as UTF-8 by Internet Explorer, effectively removing characters from the document and defeating the HTML protection mechanism.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://drupal.org/node/208564">http://drupal.org/node/208564</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27238" patch="1">27238</ref>
      <ref source="CONFIRM" url="http://www.vbdrupal.org/forum/showthread.php?p=6878">http://www.vbdrupal.org/forum/showthread.php?p=6878</ref>
      <ref source="CONFIRM" url="http://www.vbdrupal.org/forum/showthread.php?t=1349">http://www.vbdrupal.org/forum/showthread.php?t=1349</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0127">ADV-2008-0127</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0134">ADV-2008-0134</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39619">drupal-utf8-xss(39619)</ref>
    </refs>
    <vuln_soft>
      <prod name="drupal" vendor="drupal">
        <vers num="4.0.0"/>
        <vers num="4.1.0"/>
        <vers num="4.2.0_rc"/>
        <vers num="4.4"/>
        <vers num="4.4.1"/>
        <vers num="4.4.2"/>
        <vers num="4.4.3"/>
        <vers num="4.5"/>
        <vers num="4.5.1"/>
        <vers num="4.5.2"/>
        <vers num="4.5.3"/>
        <vers num="4.5.4"/>
        <vers num="4.5.5"/>
        <vers num="4.5.6"/>
        <vers num="4.5.7"/>
        <vers num="4.5.8"/>
        <vers num="4.6"/>
        <vers num="4.6.1"/>
        <vers num="4.6.2"/>
        <vers num="4.6.3"/>
        <vers num="4.6.4"/>
        <vers num="4.6.5"/>
        <vers num="4.6.6"/>
        <vers num="4.6.7"/>
        <vers num="4.6.8"/>
        <vers num="4.6.9"/>
        <vers num="4.6.10"/>
        <vers num="4.6.11"/>
        <vers num="4.7"/>
        <vers num="4.7.1"/>
        <vers num="4.7.2"/>
        <vers num="4.7.3"/>
        <vers num="4.7.4"/>
        <vers num="4.7.5"/>
        <vers num="4.7.6"/>
        <vers num="4.7.7"/>
        <vers num="4.7.8"/>
        <vers num="4.7.9"/>
        <vers num="4.7.10"/>
        <vers num="4.7_rev_1.2"/>
        <vers num="4.7_rev_1.15"/>
        <vers num="5.0"/>
        <vers num="5.1"/>
        <vers num="5.1_rev1.1"/>
        <vers num="5.2"/>
        <vers num="5.3"/>
        <vers num="5.4"/>
        <vers num="5.5."/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0274" seq="2008-0274" published="2008-01-15" modified="2017-08-07" severity="Low" CVSS_version="2.0" CVSS_score="2.6" CVSS_base_score="2.6" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Drupal 4.7.x and 5.x, when certain .htaccess protections are disabled, allows remote attackers to inject arbitrary web script or HTML via crafted links involving theme .tpl.php files.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://drupal.org/node/208565">http://drupal.org/node/208565</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27238" patch="1">27238</ref>
      <ref source="CONFIRM" url="http://www.vbdrupal.org/forum/showthread.php?p=6878">http://www.vbdrupal.org/forum/showthread.php?p=6878</ref>
      <ref source="CONFIRM" url="http://www.vbdrupal.org/forum/showthread.php?t=1349">http://www.vbdrupal.org/forum/showthread.php?t=1349</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0127">ADV-2008-0127</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0134">ADV-2008-0134</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39605">drupal-theme-xss(39605)</ref>
    </refs>
    <vuln_soft>
      <prod name="drupal" vendor="drupal">
        <vers num="4.7"/>
        <vers num="5.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0275" seq="2008-0275" published="2008-01-15" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The Atom 4.7 before 4.7.x-1.0 and 5.x before 5.x-1.0 module for Drupal does not properly manage permissions for node (1) titles, (2) teasers, and (3) bodies, which might allow remote attackers to gain access to syndicated content.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://drupal.org/node/208527">http://drupal.org/node/208527</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39607">drupal-atom-security-bypass(39607)</ref>
    </refs>
    <vuln_soft>
      <prod name="atom_module" vendor="drupal">
        <vers num="4.7" prev="1"/>
        <vers num="5.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0276" seq="2008-0276" published="2008-01-15" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the Devel module before 5.x-0.1 for Drupal allows remote attackers to inject arbitrary web script or HTML via a site variable, related to lack of escaping of the variable table.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://drupal.org/node/208524">http://drupal.org/node/208524</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39606">drupal-devel-variable-xss(39606)</ref>
    </refs>
    <vuln_soft>
      <prod name="drupal" vendor="drupal">
        <vers num="4.0.0"/>
        <vers num="4.1.0"/>
        <vers num="4.2.0_rc"/>
        <vers num="4.4"/>
        <vers num="4.4.1"/>
        <vers num="4.4.2"/>
        <vers num="4.4.3"/>
        <vers num="4.5"/>
        <vers num="4.5.1"/>
        <vers num="4.5.2"/>
        <vers num="4.5.3"/>
        <vers num="4.5.4"/>
        <vers num="4.5.5"/>
        <vers num="4.5.6"/>
        <vers num="4.5.7"/>
        <vers num="4.5.8"/>
        <vers num="4.6"/>
        <vers num="4.6.1"/>
        <vers num="4.6.2"/>
        <vers num="4.6.3"/>
        <vers num="4.6.4"/>
        <vers num="4.6.5"/>
        <vers num="4.6.6"/>
        <vers num="4.6.7"/>
        <vers num="4.6.8"/>
        <vers num="4.6.9"/>
        <vers num="4.6.10"/>
        <vers num="4.6.11"/>
        <vers num="4.7"/>
        <vers num="4.7.1"/>
        <vers num="4.7.2"/>
        <vers num="4.7.3"/>
        <vers num="4.7.4"/>
        <vers num="4.7.5"/>
        <vers num="4.7.6"/>
        <vers num="4.7.7"/>
        <vers num="4.7.8"/>
        <vers num="4.7.9"/>
        <vers num="4.7.10"/>
        <vers num="4.7_rev_1.2"/>
        <vers num="4.7_rev_1.15"/>
        <vers num="5.0"/>
        <vers num="5.1"/>
        <vers num="5.1_rev1.1"/>
        <vers num="5.2"/>
        <vers num="5.3"/>
        <vers num="5.4"/>
        <vers num="5.5."/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0277" seq="2008-0277" published="2008-01-15" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="8.5" CVSS_base_score="8.5" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="6.8" CVSS_vector="(AV:N/AC:M/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Fileshare module for Drupal allows remote authenticated users with node-creation privileges to execute arbitrary code via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://drupal.org/node/208537">http://drupal.org/node/208537</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39609">drupal-fileshare-code-execution(39609)</ref>
    </refs>
    <vuln_soft>
      <prod name="fileshare_module" vendor="drupal">
        <vers num="4.7.x"/>
        <vers num="5.x"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0278" seq="2008-0278" published="2008-01-15" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.0" CVSS_base_score="6.0" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="6.8" CVSS_vector="(AV:N/AC:M/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in X7 Chat 2.0.5 and possibly earlier allows remote attackers to execute arbitrary SQL commands via the day parameter in a sm_window action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27277">27277</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39656">x7chatday-sql-injection(39656)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4907">4907</ref>
    </refs>
    <vuln_soft>
      <prod name="x7_chat" vendor="x7_group">
        <vers num="2.0.5" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0279" seq="2008-0279" published="2008-01-15" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in liretopic.php in Xforum 1.4 and possibly others allows remote attackers to execute arbitrary SQL commands via the topic parameter.  NOTE: the categorie parameter might also be affected.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27278">27278</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39654">xforum-liretopic-sql-injection(39654)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4908">4908</ref>
    </refs>
    <vuln_soft>
      <prod name="xforum" vendor="xforum">
        <vers num="1.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0280" seq="2008-0280" published="2008-01-15" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in MTCMS 2.0 and possibly earlier versions allows remote attackers to execute arbitrary SQL commands via the (1) a or (2) cid parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3544">3544</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486090/100/0/threaded">20080110 MTCMS &lt;=2.0 SQL Injection Vulnerbility</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27224">27224</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39597">mtcms-a-sql-injection(39597)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4882">4882</ref>
    </refs>
    <vuln_soft>
      <prod name="mtcms" vendor="mtcms">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0281" seq="2008-0281" published="2008-01-15" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in liste.php in ID-Commerce 2.0 and earlier allows remote attackers to execute arbitrary SQL commands via the idFamille parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059533.html">20080110 ID-Commerce Security Advisory - SLR-2007-001</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059537.html">20080110 (( PoC)) ID-Commerce Security Advisory - SLR-2007-001 (( PoC))</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059538.html">20080110 ID-Commerce Security Advisory - SLR-2007-001</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27220">27220</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39594">idcommerce-liste-sql-injection(39594)</ref>
    </refs>
    <vuln_soft>
      <prod name="id-commerce" vendor="id-commerce">
        <vers num="2.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0282" seq="2008-0282" published="2008-01-15" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in welcome/inscription.php in DomPHP 0.81 and earlier allows remote attackers to execute arbitrary SQL commands via the mail parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27212">27212</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39593">domphp-inscription-sql-injection(39593)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4880">4880</ref>
    </refs>
    <vuln_soft>
      <prod name="domphp" vendor="domphp">
        <vers num="0.81" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0283" seq="2008-0283" published="2008-01-15" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in /aides/index.php in DomPHP 0.81 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the page parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27226">27226</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4883">4883</ref>
    </refs>
    <vuln_soft>
      <prod name="domphp" vendor="domphp">
        <vers num="0.81" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0284" seq="2008-0284" published="2008-01-15" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Simple Machines Forum (SMF) 1.1.4 and earlier allows remote attackers to inject arbitrary web script or HTML via (1) Itemid or (2) topic arguments.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3540">3540</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486074/100/0/threaded">20080110 Simple Machines Forum Cross-Site Scripting Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27218">27218</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39585">simplemachinesforum-itemid-xss(39585)</ref>
    </refs>
    <vuln_soft>
      <prod name="simple_machines_smf" vendor="simple_machines">
        <vers num="1.1.4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0285" seq="2008-0285" published="2008-01-15" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">ngIRCd 0.10.x before 0.10.4 and 0.11.0 before 0.11.0-pre2 allows remote attackers to cause a denial of service (crash) via crafted IRC PART message, which triggers an invalid dereference.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://arthur.barton.de/cgi-bin/viewcvs.cgi/ngircd/ngircd/src/ngircd/irc-channel.c?r1=1.40&amp;r2=1.41&amp;diff_format=h">http://arthur.barton.de/cgi-bin/viewcvs.cgi/ngircd/ngircd/src/ngircd/irc-channel.c?r1=1.40&amp;r2=1.41&amp;diff_format=h</ref>
      <ref source="CONFIRM" url="http://bugs.gentoo.org/show_bug.cgi?id=204834">http://bugs.gentoo.org/show_bug.cgi?id=204834</ref>
      <ref source="CONFIRM" url="http://ngircd.barton.de/doc/ChangeLog">http://ngircd.barton.de/doc/ChangeLog</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200801-13.xml">GLSA-200801-13</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27318">27318</ref>
    </refs>
    <vuln_soft>
      <prod name="ngircd" vendor="ngircd">
        <vers num="0.10.3" prev="1"/>
        <vers num="0.11.0-pre1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0286" seq="2008-0286" published="2008-01-15" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in admin/login.php in Article Dashboard allows remote attackers to execute arbitrary SQL commands via the (1) user or (2) password fields.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3546">3546</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486323/100/0/threaded">20080115 Article DashBoard all version SQL Injection Vulnerability</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486646/100/0/threaded">20080116 Re: Article DashBoard all version SQL Injection Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27286">27286</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39657">articledashboard-login-sql-injection(39657)</ref>
    </refs>
    <vuln_soft>
      <prod name="article_dashboard" vendor="article_dashboard">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0287" seq="2008-0287" published="2008-01-15" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in VisionBurst vcart 3.3.2 allows remote attackers to execute arbitrary PHP code via a URL in the abs_path parameter to (1) index.php and (2) checkout.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27231">27231</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39616">vcart-checkout-index-file-include(39616)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4889">4889</ref>
    </refs>
    <vuln_soft>
      <prod name="vcart" vendor="visionburst">
        <vers num="3.3.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0288" seq="2008-0288" published="2008-01-15" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in ImageAlbum 2.0.0b2 allow remote attackers to execute arbitrary SQL commands via the id, which is not properly handled in (1) classes/IADomain.php, (2) classes/IACollection.php, and (3) classes/IAUser.php, as demonstrated via the id parameter in a collection.imageview action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3548">3548</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486162/100/0/threaded">20080111 ImageAlbum Remote SQL Injection Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27240">27240</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4895">4895</ref>
    </refs>
    <vuln_soft>
      <prod name="imagealbum" vendor="imagealbum">
        <vers num="2.0.0b2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0289" seq="2008-0289" published="2008-01-15" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in view_func.php in Member Area System (MAS) 1.7 and possibly others allows remote attackers to execute arbitrary PHP code via a URL in the i parameter.  NOTE: a second vector might exist via the l parameter.  NOTE: as of 20080118, the vendor has disputed the set of affected versions, stating that the issue "is already fixed, for almost a year."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3547">3547</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486172/100/0/threaded">20080111 Member Area System (MAS) Remote File Include Vulnerability (view_func.php)</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486618/100/0/threaded">20080118 Re: Member Area System (MAS) Remote File Include Vulnerability (view_func.php)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27244">27244</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39611">mas-viewfunc-file-include(39611)</ref>
    </refs>
    <vuln_soft>
      <prod name="member_area_system" vendor="mansion_productions">
        <vers num="1.7" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0290" seq="2008-0290" published="2008-01-15" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in Digital Hive 2.0 RC2 and earlier allow (1) remote attackers to execute arbitrary SQL commands via the selectskin parameter to an unspecified program, or (2) remote authenticated administrators to execute arbitrary SQL commands via the user_id parameter in the gestion_membre.php page to base.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27232">27232</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39602">digitalhive-base-sql-injection(39602)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4887">4887</ref>
    </refs>
    <vuln_soft>
      <prod name="digitalhive" vendor="digitalhive">
        <vers num="2.0_rc2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0291" seq="2008-0291" published="2008-01-16" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in showproduct.asp in RichStrong CMS allows remote attackers to execute arbitrary SQL commands via the cat parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486402/100/0/threaded">20080116 RichStrong CMS (showproduct.asp?cat=) Remote SQL Injection Exploit</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27281">27281</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27310">27310</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39668">richstrongcms-showproduct-sql-injection(39668)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4910">4910</ref>
    </refs>
    <vuln_soft>
      <prod name="richstrong_cms" vendor="hangzhou_rui-qiang">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0292" seq="2008-0292" published="2008-01-16" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in photo_album.pl in Dansie Photo Album 1.0 allows remote attackers to inject arbitrary web script or HTML via the search parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39664">dansiephotoalbum-photoalbum-xss(39664)</ref>
    </refs>
    <vuln_soft>
      <prod name="photo_album" vendor="dansie">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0293" seq="2008-0293" published="2008-01-16" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in cron.php in FreeSeat before 1.1.5d, when format.php has certain modifications, allows remote attackers to bypass authentication and gain privileges via unspecified vectors related to the show_foot function.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?group_id=160239&amp;release_id=568374">http://sourceforge.net/project/shownotes.php?group_id=160239&amp;release_id=568374</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39648">freeseat-cron-security-bypass(39648)</ref>
    </refs>
    <vuln_soft>
      <prod name="freeseat" vendor="freeseat">
        <vers num="1.1.5c" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0294" seq="2008-0294" published="2008-01-16" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the seat-locking implementation in FreeSeat before 1.1.5d allows attackers to book a seat more than once via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=568374&amp;group_id=160239">http://sourceforge.net/project/shownotes.php?release_id=568374&amp;group_id=160239</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27270">27270</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39647">freeseat-seatlocking-security-bypass(39647)</ref>
    </refs>
    <vuln_soft>
      <prod name="freeseat" vendor="freeseat">
        <vers num="1.1.5c" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0295" seq="2008-0295" published="2008-01-16" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="8.5" CVSS_base_score="8.5" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="6.8" CVSS_vector="(AV:N/AC:M/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in modules/access/rtsp/real_sdpplin.c in the Xine library, as used in VideoLAN VLC Media Player 0.8.6d and earlier, allows user-assisted remote attackers to cause a denial of service (crash) or execute arbitrary code via long Session Description Protocol (SDP) data.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/vlcxhof-adv.txt">http://aluigi.altervista.org/adv/vlcxhof-adv.txt</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1543">DSA-1543</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200803-13.xml">GLSA-200803-13</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27221">27221</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0105">ADV-2008-0105</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14776">oval:org.mitre.oval:def:14776</ref>
    </refs>
    <vuln_soft>
      <prod name="vlc_media_player" vendor="videolan">
        <vers num="0.8.6d" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0296" seq="2008-0296" published="2008-01-16" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in the libaccess_realrtsp plugin in VideoLAN VLC Media Player 0.8.6d and earlier on Windows might allow remote RTSP servers to cause a denial of service (application crash) or execute arbitrary code via a long string.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/vlcxhof-adv.txt">http://aluigi.altervista.org/adv/vlcxhof-adv.txt</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1543">DSA-1543</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200803-13.xml">GLSA-200803-13</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0105">ADV-2008-0105</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14597">oval:org.mitre.oval:def:14597</ref>
    </refs>
    <vuln_soft>
      <prod name="vlc_media_player" vendor="videolan">
        <vers num="0.8.6d" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0297" seq="2008-0297" published="2008-01-16" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">PhotoKorn allows remote attackers to obtain database credentials via a direct request to update/update3.php, which includes the credentials in its output.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39652">photokorn-update3-information-disclosure(39652)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4897">4897</ref>
    </refs>
    <vuln_soft>
      <prod name="photokorn" vendor="keil_software">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0298" seq="2008-0298" published="2008-01-16" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">KHTML WebKit as used in Apple Safari 2.x allows remote attackers to cause a denial of service (browser crash) via a crafted web page, possibly involving a STYLE attribute of a DIV element.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3549">3549</ref>
      <ref source="MISC" url="http://www.s21sec.com/avisos/s21sec-039-en.txt">http://www.s21sec.com/avisos/s21sec-039-en.txt</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486202/100/0/threaded">20080112 Safari 2 Denial of Service</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27261">27261</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39635">safari-khtml-webkit-dos(39635)</ref>
    </refs>
    <vuln_soft>
      <prod name="safari" vendor="apple">
        <vers num="2.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
        <vers num="2.0.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0299" seq="2008-0299" published="2008-01-16" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">common.py in Paramiko 1.7.1 and earlier, when using threads or forked processes, does not properly use RandomPool, which allows one session to obtain sensitive information from another session by predicting the state of the pool.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=460706">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=460706</ref>
      <ref source="MISC" url="http://people.debian.org/~nion/nmu-diff/paramiko-1.6.4-1_1.6.4-1.1.patch">http://people.debian.org/~nion/nmu-diff/paramiko-1.6.4-1_1.6.4-1.1.patch</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200803-07.xml">GLSA-200803-07</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27307">27307</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=428727">https://bugzilla.redhat.com/show_bug.cgi?id=428727</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39749">paramiko-randompool-info-disclosure(39749)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00529.html">FEDORA-2008-0644</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00594.html">FEDORA-2008-0722</ref>
    </refs>
    <vuln_soft>
      <prod name="paramiko" vendor="python_software_foundation">
        <vers num="1.7.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0300" seq="2008-0300" published="2008-03-11" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">mapFiler.php in Mapbender 2.4 to 2.4.4 allows remote attackers to execute arbitrary PHP code via PHP code sequences in the factor parameter, which are not properly handled when accessing a filename that contains those sequences.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.redteam-pentesting.de/advisories/rt-sa-2008-001.php">http://www.redteam-pentesting.de/advisories/rt-sa-2008-001.php</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28195" patch="1">28195</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41131">mapbender-mapfiler-code-execution(41131)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5232">5232</ref>
    </refs>
    <vuln_soft>
      <prod name="mapbender" vendor="mapbender">
        <vers num="2.4"/>
        <vers num="2.4.1"/>
        <vers num="2.4.2"/>
        <vers num="2.4.3"/>
        <vers num="2.4.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0301" seq="2008-0301" published="2008-03-11" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in Mapbender 2.4.4 allow remote attackers to execute arbitrary SQL commands via the gaz parameter to mod_gazetteer_edit.php and other unspecified vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://marc.info/?l=full-disclosure&amp;m=120523564611595&amp;w=2">20080311 Advisory: SQL-Injections in Mapbender</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3728">3728</ref>
      <ref source="MISC" url="http://www.redteam-pentesting.de/advisories/rt-sa-2008-002.php">http://www.redteam-pentesting.de/advisories/rt-sa-2008-002.php</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489383/100/0/threaded">20080311 Advisory: SQL-Injections in Mapbender</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28193">28193</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41139">mapbender-gaz-sql-injection(41139)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5233">5233</ref>
    </refs>
    <vuln_soft>
      <prod name="mapbender" vendor="mapbender">
        <vers num="2.4"/>
        <vers num="2.4.1"/>
        <vers num="2.4.2"/>
        <vers num="2.4.3"/>
        <vers num="2.4.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0302" seq="2008-0302" published="2008-01-16" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Untrusted search path vulnerability in apt-listchanges.py in apt-listchanges before 2.82 allows local users to execute arbitrary code via a malicious apt-listchanges program in the current working directory.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://git.madism.org/?p=apt-listchanges.git;a=commitdiff;h=1bcfbf3dc55413bb83a1782dc9a54515a963fb32">http://git.madism.org/?p=apt-listchanges.git;a=commitdiff;h=1bcfbf3dc55413bb83a1782dc9a54515a963fb32</ref>
      <ref source="CONFIRM" url="http://packages.debian.org/changelogs/pool/main/a/apt-listchanges/apt-listchanges_2.82/changelog">http://packages.debian.org/changelogs/pool/main/a/apt-listchanges/apt-listchanges_2.82/changelog</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1465">DSA-1465</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27331">27331</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-572-1">USN-572-1</ref>
    </refs>
    <vuln_soft>
      <prod name="apt-listchanges" vendor="debian">
        <vers num="2.81" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0303" seq="2008-0303" published="2008-02-28" modified="2009-03-13" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:P)">
    <desc>
      <descript source="cve">The FTP print feature in multiple Canon printers, including imageRUNNER and imagePRESS, allow remote attackers to use the server as an inadvertent proxy via a modified PORT command, aka FTP bounce.</descript>
    </desc>
    <loss_types>
      <avail/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://itso.iu.edu/20080229_Canon_MFD_FTP_bounce_attack">http://itso.iu.edu/20080229_Canon_MFD_FTP_bounce_attack</ref>
      <ref source="JVN" url="http://jvn.jp/en/jp/JVN10056705/index.html">JVN#10056705</ref>
      <ref source="JVNDB" url="http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000013.html">JVNDB-2008-000013</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019528">1019528</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/568073">VU#568073</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28042">28042</ref>
      <ref source="CONFIRM" url="http://www.usa.canon.com/html/security/pdf/CVA-001.pdf">http://www.usa.canon.com/html/security/pdf/CVA-001.pdf</ref>
    </refs>
    <vuln_soft>
      <prod name="i-sensys" vendor="canon">
        <vers num="lbp3360"/>
        <vers num="lbp3460"/>
        <vers num="lbp5360"/>
      </prod>
      <prod name="imagepress" vendor="canon">
        <vers num="c1"/>
      </prod>
      <prod name="imagerunner" vendor="canon">
        <vers num="85plus"/>
        <vers num="105plus"/>
        <vers num="2230"/>
        <vers num="2270"/>
        <vers num="2570c"/>
        <vers num="2570ci"/>
        <vers num="2870"/>
        <vers num="3025"/>
        <vers num="3025n"/>
        <vers num="3035"/>
        <vers num="3035n"/>
        <vers num="3045"/>
        <vers num="3045n"/>
        <vers num="3170c"/>
        <vers num="3170ci"/>
        <vers num="3180c"/>
        <vers num="3180ci"/>
        <vers num="3530"/>
        <vers num="3570"/>
        <vers num="4570"/>
        <vers num="5055"/>
        <vers num="5055n"/>
        <vers num="5065"/>
        <vers num="5065n"/>
        <vers num="5075"/>
        <vers num="5075n"/>
        <vers num="5570"/>
        <vers num="5800c"/>
        <vers num="5800cn"/>
        <vers num="6570"/>
        <vers num="6800c"/>
        <vers num="6800cn"/>
        <vers num="7086"/>
        <vers num="7095"/>
        <vers num="7095p"/>
        <vers num="7105"/>
        <vers num="8070"/>
        <vers num="c2380i"/>
        <vers num="c2620"/>
        <vers num="c2620n"/>
        <vers num="c2880"/>
        <vers num="c2880i"/>
        <vers num="c3220n"/>
        <vers num="c3380"/>
        <vers num="c3380i"/>
        <vers num="c4080i"/>
        <vers num="c4580i"/>
        <vers num="c5185i"/>
        <vers num="c5870"/>
        <vers num="c5870i"/>
        <vers num="c5880"/>
        <vers num="c5880i"/>
        <vers num="c6870i"/>
        <vers num="c6880"/>
        <vers num="c6880i"/>
        <vers num="clc4040"/>
        <vers num="clc5151"/>
      </prod>
      <prod name="imagerunner_2620" vendor="canon">
        <vers num=""/>
      </prod>
      <prod name="imagerunner_5000i" vendor="canon">
        <vers num=""/>
      </prod>
      <prod name="imagerunner_5020" vendor="canon">
        <vers num=""/>
      </prod>
      <prod name="imagerunner_6870" vendor="canon">
        <vers num=""/>
      </prod>
      <prod name="imagerunner_8500" vendor="canon">
        <vers num=""/>
      </prod>
      <prod name="imagerunner_9070" vendor="canon">
        <vers num=""/>
      </prod>
      <prod name="imagerunner_c3200" vendor="canon">
        <vers num=""/>
      </prod>
      <prod name="imagerunner_c3220" vendor="canon">
        <vers num=""/>
      </prod>
      <prod name="imagerunner_c6800" vendor="canon">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0304" seq="2008-0304" published="2008-02-29" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in Mozilla Thunderbird before 2.0.0.12 and SeaMonkey before 1.1.8 might allow remote attackers to execute arbitrary code via a crafted external-body MIME type in an e-mail message, related to an incorrect memory allocation during message preview.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=668">20080226 Mozilla Thunderbird MIME External-Body Heap Overflow Vulnerability</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019504">1019504</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.445399">SSA:2008-061-01</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-239546-1">239546</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1621">DSA-1621</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2009/dsa-1697">DSA-1697</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml">GLSA-200805-18</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/661651">VU#661651</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:062">MDVSA-2008:062</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/security/announce/2008/mfsa2008-12.html">http://www.mozilla.org/security/announce/2008/mfsa2008-12.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28012" patch="1">28012</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-582-1">USN-582-1</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-582-2">USN-582-2</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2091/references">ADV-2008-2091</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11075">oval:org.mitre.oval:def:11075</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00905.html">FEDORA-2008-2060</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00946.html">FEDORA-2008-2118</ref>
    </refs>
    <vuln_soft>
      <prod name="seamonkey" vendor="mozilla">
        <vers num="1.1.7" prev="1"/>
      </prod>
      <prod name="thunderbird" vendor="mozilla">
        <vers num="2.0.0.9" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0306" seq="2008-0306" published="2008-03-11" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.9" CVSS_base_score="6.9" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">sdbstarter in SAP MaxDB 7.6.0.37, and possibly other versions, allows local users to execute arbitrary commands by using unspecified environment variables to modify configuration settings.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=670">20080310 SAP MaxDB sdbstarter Privilege Escalation Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28185">28185</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019570">1019570</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0844/references">ADV-2008-0844</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41104">maxdb-sdbstarter-privilege-escalation(41104)</ref>
    </refs>
    <vuln_soft>
      <prod name="maxdb" vendor="sap">
        <vers num="7.6.0.37"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0307" seq="2008-0307" published="2008-03-11" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Integer signedness error in vserver in SAP MaxDB 7.6.0.37, and possibly other versions, allows remote attackers to execute arbitrary code via unknown vectors that trigger heap corruption.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=669">20080310 SAP MaxDB Signedness Error Heap Corruption Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28183">28183</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019571">1019571</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0844/references">ADV-2008-0844</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41107">maxdb-vserver-code-execution(41107)</ref>
    </refs>
    <vuln_soft>
      <prod name="maxdb" vendor="sap">
        <vers num="7.6.0.37"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0308" seq="2008-0308" published="2008-02-28" modified="2011-03-07" severity="High" CVSS_version="2.0" CVSS_score="7.1" CVSS_base_score="7.1" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Symantec Decomposer, as used in certain Symantec antivirus products including Symantec Scan Engine 5.1.2 and other versions before 5.1.6.31, allows remote attackers to cause a denial of service (memory consumption) via a malformed RAR file to the Internet Content Adaptation Protocol (ICAP) port (1344/tcp).</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=666">20080226 Symantec Scan Engine 5.1.2 RAR File Denial of Service Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27911">27911</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019503">1019503</ref>
      <ref source="CONFIRM" url="http://www.symantec.com/avcenter/security/Content/2008.02.27.html">http://www.symantec.com/avcenter/security/Content/2008.02.27.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0680">ADV-2008-0680</ref>
    </refs>
    <vuln_soft>
      <prod name="scan_engine" vendor="symantec">
        <vers num="5.1.4.24" prev="1"/>
      </prod>
      <prod name="symantec_antivirus_clearswift" vendor="symantec">
        <vers num="4.3.16.39" prev="1"/>
      </prod>
      <prod name="symantec_antivirus_filtering_domino_mpe" vendor="symantec">
        <vers num="3.0.12" prev="1" edition=":aix"/>
        <vers num="3.0.12" prev="1" edition=":linux"/>
        <vers num="3.0.12" prev="1" edition=":solaris"/>
      </prod>
      <prod name="symantec_antivirus_messaging" vendor="symantec">
        <vers num="4.3.16.39" prev="1"/>
      </prod>
      <prod name="symantec_antivirus_microsoft_sharepoint" vendor="symantec">
        <vers num="4.3.16.39" prev="1"/>
      </prod>
      <prod name="symantec_antivirus_ms_isa" vendor="symantec">
        <vers num="4.3.16.39" prev="1"/>
      </prod>
      <prod name="symantec_antivirus_network_attached_storage" vendor="symantec">
        <vers num="4.3.16.39" prev="1"/>
      </prod>
      <prod name="symantec_antivirus_scan_engine" vendor="symantec">
        <vers num="4.3.16.39" prev="1"/>
      </prod>
      <prod name="symantec_antivirus_scan_engine_caching" vendor="symantec">
        <vers num="4.3.16.39" prev="1"/>
      </prod>
      <prod name="symantec_mail_security_exchange" vendor="symantec">
        <vers num="4.6.5.12" prev="1"/>
        <vers num="5.0.4.363" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0309" seq="2008-0309" published="2008-02-28" modified="2011-03-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in Symantec Decomposer, as used in certain Symantec antivirus products including Symantec Scan Engine 5.1.2 and other versions before 5.1.6.31, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a malformed RAR file to the Internet Content Adaptation Protocol (ICAP) port (1344/tcp).</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=667">20080226 Symantec Scan Engine 5.1.2 RAR File Buffer Overflow Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27913">27913</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019503">1019503</ref>
      <ref source="CONFIRM" url="http://www.symantec.com/avcenter/security/Content/2008.02.27.html">http://www.symantec.com/avcenter/security/Content/2008.02.27.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0680">ADV-2008-0680</ref>
    </refs>
    <vuln_soft>
      <prod name="scan_engine" vendor="symantec">
        <vers num="5.1.4.24" prev="1"/>
      </prod>
      <prod name="symantec_antivirus_filtering_domino_mpe" vendor="symantec">
        <vers num="3.0.12" prev="1" edition=":aix"/>
        <vers num="3.0.12" prev="1" edition=":linux"/>
        <vers num="3.0.12" prev="1" edition=":solaris"/>
      </prod>
      <prod name="symantec_antivirus_network_attached_storage" vendor="symantec">
        <vers num="4.3.16.39" prev="1"/>
      </prod>
      <prod name="symantec_antivirus_scan_engine" vendor="symantec">
        <vers num="4.3.16.39" prev="1"/>
      </prod>
      <prod name="symantec_antivirus_scan_engine_caching" vendor="symantec">
        <vers num="4.3.16.39" prev="1"/>
      </prod>
      <prod name="symantec_antivirus_scan_engine_clearswift" vendor="symantec">
        <vers num="4.3.16.39" prev="1"/>
      </prod>
      <prod name="symantec_antivirus_scan_engine_for_microsoft_sharepoint" vendor="symantec">
        <vers num="4.3.16.39" prev="1"/>
      </prod>
      <prod name="symantec_antivirus_scan_engine_for_ms_isa" vendor="symantec">
        <vers num="4.3.16.39" prev="1"/>
      </prod>
      <prod name="symantec_antivirus_scan_engine_messaging" vendor="symantec">
        <vers num="4.3.16.39" prev="1"/>
      </prod>
      <prod name="symantec_mail_security_for_microsoft_exchange" vendor="symantec">
        <vers num="4.6.5.12" prev="1"/>
        <vers num="5.0.4.363" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0310" seq="2008-0310" published="2008-04-07" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.9" CVSS_base_score="6.9" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in pkgadd in SCO UnixWare 7.1.4 before p534589 allows local users to create or append to arbitrary files via ".." sequences in an unspecified environment variable, probably PKGINST.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SCO" url="http://ftp.sco.com/pub/unixware7/714/security/p534589/p534589.txt">SCOSA-2008.1</ref>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=676">20080403 SCO UnixWare pkgadd Directory Traversal Vulnerability</ref>
      <ref source="CONFIRM" url="http://www.sco.com/support/update/download/release.php?rid=324" adv="1" patch="1">http://www.sco.com/support/update/download/release.php?rid=324</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019787">1019787</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41759">sco-unixware-pkgadd-directory-traversal(41759)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5355">5355</ref>
    </refs>
    <vuln_soft>
      <prod name="unixware" vendor="sco">
        <vers num="7.1.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0311" seq="2008-0311" published="2008-04-06" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the PGMWebHandler::parse_request function in the StarTeam Multicast Service component (STMulticastService) 6.4 in Borland CaliberRM 2006 allows remote attackers to execute arbitrary code via a large HTTP request.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=675">20080402 Borland CaliberRM StarTeam Multicast Service Buffer Overflow Vulnerability</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019786">1019786</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28602">28602</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1100">ADV-2008-1100</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41647">starteam-pgmwebhandlerparserequest-bo(41647)</ref>
    </refs>
    <vuln_soft>
      <prod name="caliberrm" vendor="borland">
        <vers num="2006"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0312" seq="2008-0312" published="2008-04-08" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the AutoFix Support Tool ActiveX control 2.7.0.1 in SYMADATA.DLL in multiple Symantec Norton products, including Norton 360 1.0, AntiVirus 2006 through 2008, Internet Security 2006 through 2008, and System Works 2006 through 2008, allows remote attackers to execute arbitrary code via a long argument to the GetEventLogInfo method.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=677">20080402 Symantec Norton Internet Security 2008 ActiveX Control Buffer Overflow Vulnerability</ref>
      <ref source="CONFIRM" url="http://securityresponse.symantec.com/avcenter/security/Content/2008.04.02a.html" patch="1">http://securityresponse.symantec.com/avcenter/security/Content/2008.04.02a.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28507" patch="1">28507</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019751" patch="1">1019751</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019752" patch="1">1019752</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019753" patch="1">1019753</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1077/references">ADV-2008-1077</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41629">symantec-autofixtool-bo(41629)</ref>
    </refs>
    <vuln_soft>
      <prod name="norton_360" vendor="symantec">
        <vers num="1.0"/>
      </prod>
      <prod name="norton_antivirus" vendor="symantec">
        <vers num="2006"/>
        <vers num="2007"/>
        <vers num="2008"/>
      </prod>
      <prod name="norton_internet_security" vendor="symantec">
        <vers num="2006"/>
        <vers num="2007"/>
        <vers num="2008"/>
      </prod>
      <prod name="norton_system_works" vendor="symantec">
        <vers num="2006"/>
        <vers num="2007"/>
        <vers num="2008"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0313" seq="2008-0313" published="2008-04-08" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The ActiveDataInfo.LaunchProcess method in the SymAData.ActiveDataInfo.1 ActiveX control 2.7.0.1 in SYMADATA.DLL in multiple Symantec Norton products including Norton 360 1.0, AntiVirus 2006 through 2008, Internet Security 2006 through 2008, and System Works 2006 through 2008, does not properly determine the location of the AutoFix Tool, which allows remote attackers to execute arbitrary code via a remote (1) WebDAV or (2) SMB share.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=678">20080402 Symantec Internet Security 2008 ActiveDataInfo.LaunchProcess Design Error Vulnerability</ref>
      <ref source="CONFIRM" url="http://securityresponse.symantec.com/avcenter/security/Content/2008.04.02a.html">http://securityresponse.symantec.com/avcenter/security/Content/2008.04.02a.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28509" patch="1">28509</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019751">1019751</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019752">1019752</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019753">1019753</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1077/references">ADV-2008-1077</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41631">symantec-autofixtool-code-execution(41631)</ref>
    </refs>
    <vuln_soft>
      <prod name="norton_360" vendor="symantec">
        <vers num="1.0"/>
      </prod>
      <prod name="norton_antivirus" vendor="symantec">
        <vers num="2006"/>
        <vers num="2007"/>
        <vers num="2008"/>
      </prod>
      <prod name="norton_internet_security" vendor="symantec">
        <vers num="2006"/>
        <vers num="2007"/>
        <vers num="2008"/>
      </prod>
      <prod name="system_works" vendor="symantec">
        <vers num="2006"/>
        <vers num="2007"/>
        <vers num="2008"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0314" seq="2008-0314" published="2008-04-16" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in spin.c in libclamav in ClamAV 0.92.1 allows remote attackers to execute arbitrary code via a crafted PeSpin packed PE binary with a modified length value.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://kolab.org/security/kolab-vendor-notice-20.txt">http://kolab.org/security/kolab-vendor-notice-20.txt</ref>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=686">20080414 ClamAV libclamav PeSpin Heap Overflow Vulnerability</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html">APPLE-SA-2008-09-15</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00009.html">SUSE-SA:2008:024</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200805-19.xml">GLSA-200805-19</ref>
      <ref source="CONFIRM" url="http://svn.clamav.net/svn/clamav-devel/trunk/ChangeLog">http://svn.clamav.net/svn/clamav-devel/trunk/ChangeLog</ref>
      <ref source="CONFIRM" url="http://up2date.astaro.com/2008/08/up2date_asg_v7300_ga_released.html">http://up2date.astaro.com/2008/08/up2date_asg_v7300_ga_released.html</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1549">DSA-1549</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/858595">VU#858595</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:088">MDVSA-2008:088</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28784">28784</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019851">1019851</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-260A.html">TA08-260A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1227/references">ADV-2008-1227</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2584">ADV-2008-2584</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41823">clamav-spin-bo(41823)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00576.html">FEDORA-2008-3358</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00625.html">FEDORA-2008-3420</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00249.html">FEDORA-2008-3900</ref>
      <ref source="CONFIRM" url="https://wwws.clamav.net/bugzilla/show_bug.cgi?id=876">https://wwws.clamav.net/bugzilla/show_bug.cgi?id=876</ref>
    </refs>
    <vuln_soft>
      <prod name="clamav" vendor="clam_anti-virus">
        <vers num="0.92.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0318" seq="2008-0318" published="2008-02-12" modified="2011-03-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Integer overflow in the cli_scanpe function in libclamav in ClamAV before 0.92.1, as used in clamd, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted Petite packed PE file, which triggers a heap-based buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.gentoo.org/show_bug.cgi?id=209915">http://bugs.gentoo.org/show_bug.cgi?id=209915</ref>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307562">http://docs.info.apple.com/article.html?artnum=307562</ref>
      <ref source="CONFIRM" url="http://kolab.org/security/kolab-vendor-notice-19.txt">http://kolab.org/security/kolab-vendor-notice-19.txt</ref>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=658">20080212 ClamAV libclamav PE File Integer Overflow Vulnerability</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html">APPLE-SA-2008-03-18</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00008.html">SUSE-SR:2008:004</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200802-09.xml">GLSA-200802-09</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019394">1019394</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=575703" patch="1">http://sourceforge.net/project/shownotes.php?release_id=575703</ref>
      <ref source="CONFIRM" url="http://support.novell.com/techcenter/psdb/512985d2cd3090bfb93dcb7b551179cf.html">http://support.novell.com/techcenter/psdb/512985d2cd3090bfb93dcb7b551179cf.html</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1497">DSA-1497</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:088">MDVSA-2008:088</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27751">27751</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0503" adv="1">ADV-2008-0503</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0606" adv="1">ADV-2008-0606</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0924/references" adv="1">ADV-2008-0924</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00462.html">FEDORA-2008-1608</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00481.html">FEDORA-2008-1625</ref>
    </refs>
    <vuln_soft>
      <prod name="clamav" vendor="clam_anti-virus">
        <vers num="0.92" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0320" seq="2008-0320" published="2008-04-17" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in the OLE importer in OpenOffice.org before 2.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an OLE file with a crafted DocumentSummaryInformation stream.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=694">20080417 Multiple Vendor OpenOffice OLE DocumentSummaryInformation Heap Overflow Vulnerability</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200805-16.xml">GLSA-200805-16</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-231642-1">231642</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1547">DSA-1547</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:090">MDVSA-2008:090</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:095">MDVSA-2008:095</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2008_23_openoffice.html">SUSE-SA:2008:023</ref>
      <ref source="CONFIRM" url="http://www.openoffice.org/security/bulletin.html">http://www.openoffice.org/security/bulletin.html</ref>
      <ref source="CONFIRM" url="http://www.openoffice.org/security/cves/CVE-2007-4770.html">http://www.openoffice.org/security/cves/CVE-2007-4770.html</ref>
      <ref source="CONFIRM" url="http://www.openoffice.org/security/cves/CVE-2007-5745.html">http://www.openoffice.org/security/cves/CVE-2007-5745.html</ref>
      <ref source="CONFIRM" url="http://www.openoffice.org/security/cves/CVE-2008-0320.html">http://www.openoffice.org/security/cves/CVE-2008-0320.html</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0175.html">RHSA-2008:0175</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0176.html" adv="1">RHSA-2008:0176</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28819">28819</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019890">1019890</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-609-1">USN-609-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1253/references" adv="1">ADV-2008-1253</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1375/references" adv="1">ADV-2008-1375</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41860">openoffice-ole-bo(41860)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10318">oval:org.mitre.oval:def:10318</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00448.html">FEDORA-2008-3251</ref>
    </refs>
    <vuln_soft>
      <prod name="openoffice.org" vendor="openoffice">
        <vers num="2.0.3"/>
        <vers num="2.1"/>
        <vers num="2.2"/>
        <vers num="2.2.1"/>
        <vers num="2.3"/>
        <vers num="2.3.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0322" seq="2008-0322" published="2008-05-13" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The I2O Utility Filter driver (i2omgmt.sys) 5.1.2600.2180 for Microsoft Windows XP sets Everyone/Write permissions for the "\\.\I2OExc" device interface, which allows local users to gain privileges.  NOTE: this issue can be leveraged to overwrite arbitrary memory and execute code via an IOCTL call with a crafted DeviceObject pointer.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=699" patch="1">20080512 Microsoft Windows I2O Filter Utility Driver (i2omgmt.sys) Local Privilege Escalation Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29171" patch="1">29171</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020006">1020006</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1476/references">ADV-2008-1476</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42358">win-i2omgmt-code-execution(42358)</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_xp" vendor="microsoft">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0324" seq="2008-0324" published="2008-01-16" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.9" CVSS_base_score="4.9" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Cisco Systems VPN Client IPSec Driver (CVPNDRVA.sys) 5.0.02.0090 allows local users to cause a denial of service (crash) by calling the 0x80002038 IOCTL with a small size value, which triggers memory corruption.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27289">27289</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019240">1019240</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0170">ADV-2008-0170</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39694">cisco-vpnclient-cvpndrva-dos(39694)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4911">4911</ref>
    </refs>
    <vuln_soft>
      <prod name="vpn_client" vendor="cisco">
        <vers num="5.0.2.0090" edition=":windows"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0325" seq="2008-0325" published="2008-01-17" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in show.php in FaScript FaPersian Petition allows remote attackers to execute arbitrary SQL commands via the id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27302">27302</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39716">fascriptfapersian-show-sql-injection(39716)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4916">4916</ref>
    </refs>
    <vuln_soft>
      <prod name="fapersian_petition" vendor="fascript">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0326" seq="2008-0326" published="2008-01-17" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in class/show.php in FaScript FaPersianHack 1.0 allows remote attackers to execute arbitrary SQL commands via the id parameter to show.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27302">27302</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39717">fascriptfapersianhack-show-sql-injection(39717)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4917">4917</ref>
    </refs>
    <vuln_soft>
      <prod name="fapersianhack" vendor="fascript">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0327" seq="2008-0327" published="2008-01-17" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in show.php in FaScript FaMp3 1.0 allows remote attackers to execute arbitrary SQL commands via the id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27302">27302</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39714">fascriptfamp3-show-sql-injection(39714)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4914">4914</ref>
    </refs>
    <vuln_soft>
      <prod name="famp3" vendor="fascript">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0328" seq="2008-0328" published="2008-01-17" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in page.php in FaScript FaName 1.0 allows remote attackers to execute arbitrary SQL commands via the id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27303">27303</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39715">fascriptfaname-page-sql-injection(39715)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4915">4915</ref>
    </refs>
    <vuln_soft>
      <prod name="faname" vendor="fascript">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0329" seq="2008-0329" published="2008-01-17" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">LulieBlog 1.0.1 and 1.0.2 does not restrict access to (1) article_suppr.php, (2) comment_accepter.php, and (3) comment_refuser.php in Admin/, which allows remote attackers to accept comments, delete comments, and delete articles via the id parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27290">27290</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39669">lulieblog-admin-security-bypass(39669)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4912">4912</ref>
    </refs>
    <vuln_soft>
      <prod name="lulieblog" vendor="julien_plesniak">
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0330" seq="2008-0330" published="2008-01-17" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Open System Consultants (OSC) Radiator before 4.0 allows remote attackers to cause a denial of service (daemon crash) via malformed RADIUS requests, as demonstrated by packets sent by nmap.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.open.com.au/radiator/history.html">http://www.open.com.au/radiator/history.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27306">27306</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0598" adv="1">ADV-2008-0598</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39730">radiator-radius-dos(39730)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40664">osc-radiator-unspecified-dos(40664)</ref>
    </refs>
    <vuln_soft>
      <prod name="radius_server" vendor="radiator">
        <vers num="3.17.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0331" seq="2008-0331" published="2008-01-17" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Funkwerk System Software before 7.4.1 PATCH 9 for certain Funkwerk Router / VPN devices allows remote attackers to cause a denial of service (panic and reboot) via unspecified DNS requests.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.funkwerk-ec.com/portal/downloadcenter/dateien/x2300/r7401p09/readme_741p9_en.pdf">http://www.funkwerk-ec.com/portal/downloadcenter/dateien/x2300/r7401p09/readme_741p9_en.pdf</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27314">27314</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39731">x2300-dns-dos(39731)</ref>
    </refs>
    <vuln_soft>
      <prod name="system_software" vendor="funkwerk">
        <vers num="7.4.1_patch_8" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0332" seq="2008-0332" published="2008-01-17" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in arias/help/effect.php in aria 0.99-6 allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the page parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486406/100/0/threaded">20080116 [DSECRG-08-002] Local File Include in arias 0.99-6</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27311">27311</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39712">aria-effect-file-include(39712)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4920">4920</ref>
    </refs>
    <vuln_soft>
      <prod name="aria" vendor="aria">
        <vers num="0.99-6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0333" seq="2008-0333" published="2008-01-17" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in download_view_attachment.aspx in AfterLogic MailBee WebMail Pro 4.1 for ASP.NET allows remote attackers to read arbitrary files via a .. (dot dot) in the temp_filename parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27312">27312</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39724">mailbeewebmail-download-directory-traversal(39724)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4921">4921</ref>
    </refs>
    <vuln_soft>
      <prod name="mailbee_webmail_pro" vendor="afterlogic">
        <vers num="4.1"/>
      </prod>
      <prod name="asp.net" vendor="microsoft">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0334" seq="2008-0334" published="2008-01-17" modified="2008-09-05" severity="Low" CVSS_version="2.0" CVSS_score="2.6" CVSS_base_score="2.6" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in pm/language/spanish/preferences.php in PMachine Pro 2.4.1 allows remote attackers to inject arbitrary web script or HTML via the L_PREF_NAME[855] parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://packetstormsecurity.org/0801-exploits/pMachinePro-241-xss.txt">http://packetstormsecurity.org/0801-exploits/pMachinePro-241-xss.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27282">27282</ref>
    </refs>
    <vuln_soft>
      <prod name="pmachine_pro" vendor="pmachine">
        <vers num="2.4.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0335" seq="2008-0335" published="2008-01-17" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in BugTracker.NET before 2.7.2 allows remote attackers to inject arbitrary web script or HTML via an arbitrary custom text field.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=568160" patch="1">http://sourceforge.net/project/shownotes.php?release_id=568160</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/tracker/index.php?func=detail&amp;aid=1867089&amp;group_id=66812&amp;atid=515837">http://sourceforge.net/tracker/index.php?func=detail&amp;aid=1867089&amp;group_id=66812&amp;atid=515837</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27275">27275</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39650">bugtrackernet-bug-xss(39650)</ref>
    </refs>
    <vuln_soft>
      <prod name="bugtracker.net" vendor="bugtracker.net">
        <vers num="2.7.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0336" seq="2008-0336" published="2008-01-17" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site request forgery (CSRF) vulnerabilities in BugTracker.NET before 2.7.2 allow remote attackers to delete arbitrary bugs and perform other administrative tasks via unspecified vectors, possibly related to delete_*.aspx pages, and massedit.aspx, subscribe.aspx, flag.aspx, and relationships.aspx.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?group_id=66812&amp;release_id=568160" patch="1">http://sourceforge.net/project/shownotes.php?group_id=66812&amp;release_id=568160</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/tracker/index.php?func=detail&amp;aid=1867089&amp;group_id=66812&amp;atid=515837">http://sourceforge.net/tracker/index.php?func=detail&amp;aid=1867089&amp;group_id=66812&amp;atid=515837</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39651">bugtrackernet-http-csrf(39651)</ref>
    </refs>
    <vuln_soft>
      <prod name="bugtracker.net" vendor="bugtracker.net">
        <vers num="2.7.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0337" seq="2008-0337" published="2008-01-17" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in the _mwProcessReadSocket function in http.c in MiniWeb HTTP Server 0.8.19 allows remote attackers to execute arbitrary code via a long URI.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.bugtraq.ir/adv/miniweb_english.pdf">http://www.bugtraq.ir/adv/miniweb_english.pdf</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27319">27319</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0176">ADV-2008-0176</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39718">miniweb-mwprocessreadsocket-bo(39718)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4923">4923</ref>
    </refs>
    <vuln_soft>
      <prod name="miniweb_http_server" vendor="miniweb_http_server">
        <vers num="0.8.19"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0338" seq="2008-0338" published="2008-01-17" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in the mwGetLocalFileName function in http.c in MiniWeb HTTP Server 0.8.19 allows remote attackers to read arbitrary files and list arbitrary directories via a (1) .%2e (partially encoded dot dot) or (2) %2e%2e (encoded dot dot) in the URI.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.bugtraq.ir/adv/miniweb_english.pdf">http://www.bugtraq.ir/adv/miniweb_english.pdf</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27319">27319</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0176">ADV-2008-0176</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39713">miniweb-mwgetlocal-directory-traversal(39713)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4923">4923</ref>
    </refs>
    <vuln_soft>
      <prod name="miniweb_http_server" vendor="miniweb_http_server">
        <vers num="0.8.19"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0339" seq="2008-0339" published="2008-01-17" modified="2012-10-22" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the XML DB component in Oracle Database 9.2.0.8, 9.2.0.8DV, 10.1.0.5, and 10.2.0.3 has unknown impact and remote attack vectors, aka DB01.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=120058413923005&amp;w=2">SSRT061201</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019218">1019218</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujan2008-086860.html">http://www.oracle.com/technetwork/topics/security/cpujan2008-086860.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27229">27229</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-017A.html" patch="1">TA08-017A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0150">ADV-2008-0150</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0180">ADV-2008-0180</ref>
    </refs>
    <vuln_soft>
      <prod name="database_server" vendor="oracle">
        <vers num="9.2.0.8dv"/>
        <vers num="10.1.0.5"/>
        <vers num="10.2.0.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0340" seq="2008-0340" published="2008-01-17" modified="2012-10-22" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple unspecified vulnerabilities in Oracle Database 9.0.1.5 FIPS+, 9.2.0.8, 9.2.0.8DV, 10.1.0.5, and 10.2.0.3 have unknown impact and remote attack vectors, related to the (1) Advanced Queuing component (DB02) and (2) Oracle Spatial component (DB04).</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=120058413923005&amp;w=2">SSRT061201</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019218">1019218</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujan2008-086860.html">http://www.oracle.com/technetwork/topics/security/cpujan2008-086860.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27229">27229</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-017A.html">TA08-017A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0150">ADV-2008-0150</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0180">ADV-2008-0180</ref>
    </refs>
    <vuln_soft>
      <prod name="application_server" vendor="oracle">
        <vers num="1.0.2.2"/>
        <vers num="9.0.4.3"/>
        <vers num="10.1.2.0.2"/>
        <vers num="10.1.2.1.0"/>
        <vers num="10.1.2.2.0"/>
        <vers num="10.1.3.0.0"/>
        <vers num="10.1.3.1.0"/>
        <vers num="10.1.3.3.0"/>
      </prod>
      <prod name="collaboration_suite" vendor="oracle">
        <vers num="10.1.2"/>
      </prod>
      <prod name="database_server" vendor="oracle">
        <vers num="9.0.1.5" edition=":fips"/>
        <vers num="9.2.0.8"/>
        <vers num="9.2.0.8dv"/>
        <vers num="10.1.0.5"/>
        <vers num="10.2.0.2"/>
        <vers num="10.2.0.3"/>
        <vers num="11.1.0.6"/>
      </prod>
      <prod name="e-business_suite" vendor="oracle">
        <vers num="11.5.9"/>
        <vers num="11.5.10"/>
        <vers num="11.5.10.2"/>
        <vers num="12.0.0"/>
        <vers num="12.0.1"/>
        <vers num="12.0.2"/>
        <vers num="12.0.3"/>
      </prod>
      <prod name="peoplesoft_enterprise_peopletools" vendor="oracle">
        <vers num="8.47"/>
        <vers num="8.48"/>
        <vers num="8.49"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0341" seq="2008-0341" published="2008-01-17" modified="2012-10-22" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Advanced Queuing component in Oracle Database 9.0.1.5 FIPS+ and 10.1.0.5 has unknown impact and remote attack vectors, aka DB03.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=120058413923005&amp;w=2">SSRT061201</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019218">1019218</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujan2008-086860.html">http://www.oracle.com/technetwork/topics/security/cpujan2008-086860.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27229">27229</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-017A.html" patch="1">TA08-017A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0150">ADV-2008-0150</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0180">ADV-2008-0180</ref>
    </refs>
    <vuln_soft>
      <prod name="database_server" vendor="oracle">
        <vers num="9.0.1.5" edition=":fips"/>
        <vers num="10.1.0.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0342" seq="2008-0342" published="2008-01-17" modified="2012-10-22" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Upgrade/Downgrade component in Oracle Database 9.2.0.8, 10.1.0.5, and 10.2.0.3 has unknown impact and remote attack vectors, aka DB05.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=120058413923005&amp;w=2">SSRT061201</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019218">1019218</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujan2008-086860.html">http://www.oracle.com/technetwork/topics/security/cpujan2008-086860.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27229">27229</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-017A.html" patch="1">TA08-017A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0150">ADV-2008-0150</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0180">ADV-2008-0180</ref>
    </refs>
    <vuln_soft>
      <prod name="database_server" vendor="oracle">
        <vers num="9.2.0.8"/>
        <vers num="10.1.0.5"/>
        <vers num="10.2.0.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0343" seq="2008-0343" published="2008-01-17" modified="2012-10-22" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Oracle Spatial component in Oracle Database 9.0.1.5 FIPS+, 9.2.0.8, 9.2.0.8DV, and 10.1.0.5 has unknown impact and remote attack vectors, aka DB06.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=120058413923005&amp;w=2">SSRT061201</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019218">1019218</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujan2008-086860.html">http://www.oracle.com/technetwork/topics/security/cpujan2008-086860.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27229">27229</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-017A.html">TA08-017A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0150">ADV-2008-0150</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0180">ADV-2008-0180</ref>
    </refs>
    <vuln_soft>
      <prod name="application_server" vendor="oracle">
        <vers num="1.0.2.2"/>
        <vers num="9.0.4.3"/>
        <vers num="10.1.2.0.2"/>
        <vers num="10.1.2.1.0"/>
        <vers num="10.1.2.2.0"/>
        <vers num="10.1.3.0.0"/>
        <vers num="10.1.3.1.0"/>
        <vers num="10.1.3.3.0"/>
      </prod>
      <prod name="collaboration_suite" vendor="oracle">
        <vers num="10.1.2"/>
      </prod>
      <prod name="database_server" vendor="oracle">
        <vers num="9.0.1.5" edition=":fips"/>
        <vers num="9.2.0.8"/>
        <vers num="9.2.0.8dv"/>
        <vers num="10.1.0.5"/>
        <vers num="10.2.0.2"/>
        <vers num="10.2.0.3"/>
        <vers num="11.1.0.6"/>
      </prod>
      <prod name="e-business_suite" vendor="oracle">
        <vers num="11.5.9"/>
        <vers num="11.5.10"/>
        <vers num="11.5.10.2"/>
        <vers num="12.0.0"/>
        <vers num="12.0.1"/>
        <vers num="12.0.2"/>
        <vers num="12.0.3"/>
      </prod>
      <prod name="peoplesoft_enterprise_peopletools" vendor="oracle">
        <vers num="8.47"/>
        <vers num="8.48"/>
        <vers num="8.49"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0344" seq="2008-0344" published="2008-01-17" modified="2012-10-22" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Oracle Spatial component in Oracle Database 10.1.0.5 and 10.2.0.3 has unknown impact and remote attack vectors, aka DB07.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=120058413923005&amp;w=2">SSRT061201</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019218">1019218</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujan2008-086860.html">http://www.oracle.com/technetwork/topics/security/cpujan2008-086860.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27229">27229</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-017A.html">TA08-017A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0150">ADV-2008-0150</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0180">ADV-2008-0180</ref>
    </refs>
    <vuln_soft>
      <prod name="application_server" vendor="oracle">
        <vers num="1.0.2.2"/>
        <vers num="9.0.4.3"/>
        <vers num="10.1.2.0.2"/>
        <vers num="10.1.2.1.0"/>
        <vers num="10.1.2.2.0"/>
        <vers num="10.1.3.0.0"/>
        <vers num="10.1.3.1.0"/>
        <vers num="10.1.3.3.0"/>
      </prod>
      <prod name="collaboration_suite" vendor="oracle">
        <vers num="10.1.2"/>
      </prod>
      <prod name="database_server" vendor="oracle">
        <vers num="9.0.1.5" edition=":fips"/>
        <vers num="9.2.0.8"/>
        <vers num="9.2.0.8dv"/>
        <vers num="10.1.0.5"/>
        <vers num="10.2.0.2"/>
        <vers num="10.2.0.3"/>
        <vers num="11.1.0.6"/>
      </prod>
      <prod name="e-business_suite" vendor="oracle">
        <vers num="11.5.9"/>
        <vers num="11.5.10"/>
        <vers num="11.5.10.2"/>
        <vers num="12.0.0"/>
        <vers num="12.0.1"/>
        <vers num="12.0.2"/>
        <vers num="12.0.3"/>
      </prod>
      <prod name="peoplesoft_enterprise_peopletools" vendor="oracle">
        <vers num="8.47"/>
        <vers num="8.48"/>
        <vers num="8.49"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0345" seq="2008-0345" published="2008-01-17" modified="2012-10-22" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Core RDBMS component in Oracle Database 11.1.0.6 has unknown impact and remote attack vectors, aka DB08.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=120058413923005&amp;w=2">SSRT061201</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019218">1019218</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujan2008-086860.html">http://www.oracle.com/technetwork/topics/security/cpujan2008-086860.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27229">27229</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-017A.html">TA08-017A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0150">ADV-2008-0150</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0180">ADV-2008-0180</ref>
    </refs>
    <vuln_soft>
      <prod name="application_server" vendor="oracle">
        <vers num="1.0.2.2"/>
        <vers num="9.0.4.3"/>
        <vers num="10.1.2.0.2"/>
        <vers num="10.1.2.1.0"/>
        <vers num="10.1.2.2.0"/>
        <vers num="10.1.3.0.0"/>
        <vers num="10.1.3.1.0"/>
        <vers num="10.1.3.3.0"/>
      </prod>
      <prod name="collaboration_suite" vendor="oracle">
        <vers num="10.1.2"/>
      </prod>
      <prod name="database_server" vendor="oracle">
        <vers num="9.0.1.5" edition=":fips"/>
        <vers num="9.2.0.8"/>
        <vers num="9.2.0.8dv"/>
        <vers num="10.1.0.5"/>
        <vers num="10.2.0.2"/>
        <vers num="10.2.0.3"/>
        <vers num="11.1.0.6"/>
      </prod>
      <prod name="e-business_suite" vendor="oracle">
        <vers num="11.5.9"/>
        <vers num="11.5.10"/>
        <vers num="11.5.10.2"/>
        <vers num="12.0.0"/>
        <vers num="12.0.1"/>
        <vers num="12.0.2"/>
        <vers num="12.0.3"/>
      </prod>
      <prod name="peoplesoft_enterprise_peopletools" vendor="oracle">
        <vers num="8.47"/>
        <vers num="8.48"/>
        <vers num="8.49"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0346" seq="2008-0346" published="2008-01-17" modified="2012-10-22" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Oracle Jinitiator component in Oracle Application Server 1.3.1.27 and E-Business Suite 11.5.10.2 has unknown impact and remote attack vectors, aka AS01.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=120058413923005&amp;w=2">SSRT061201</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019218">1019218</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujan2008-086860.html">http://www.oracle.com/technetwork/topics/security/cpujan2008-086860.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27229">27229</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-017A.html">TA08-017A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0150">ADV-2008-0150</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0180">ADV-2008-0180</ref>
    </refs>
    <vuln_soft>
      <prod name="application_server" vendor="oracle">
        <vers num="1.0.2.2"/>
        <vers num="9.0.4.3"/>
        <vers num="10.1.2.0.2"/>
        <vers num="10.1.2.1.0"/>
        <vers num="10.1.2.2.0"/>
        <vers num="10.1.3.0.0"/>
        <vers num="10.1.3.1.0"/>
        <vers num="10.1.3.3.0"/>
      </prod>
      <prod name="collaboration_suite" vendor="oracle">
        <vers num="10.1.2"/>
      </prod>
      <prod name="database_server" vendor="oracle">
        <vers num="9.0.1.5" edition=":fips"/>
        <vers num="9.2.0.8"/>
        <vers num="9.2.0.8dv"/>
        <vers num="10.1.0.5"/>
        <vers num="10.2.0.2"/>
        <vers num="10.2.0.3"/>
        <vers num="11.1.0.6"/>
      </prod>
      <prod name="e-business_suite" vendor="oracle">
        <vers num="11.5.9"/>
        <vers num="11.5.10"/>
        <vers num="11.5.10.2"/>
        <vers num="12.0.0"/>
        <vers num="12.0.1"/>
        <vers num="12.0.2"/>
        <vers num="12.0.3"/>
      </prod>
      <prod name="peoplesoft_enterprise_peopletools" vendor="oracle">
        <vers num="8.47"/>
        <vers num="8.48"/>
        <vers num="8.49"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0347" seq="2008-0347" published="2008-01-17" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Oracle Ultra Search component in Oracle Collaboration Suite 10.1.2; Database 9.2.0.8, 10.1.0.5, and 10.2.0.3; and Application Server 9.0.4.3 and 10.1.2.0.2; has unknown impact and local attack vectors, aka OCS01.  NOTE: Oracle has not disputed a reliable claim that this issue is related to WKSYS schema privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=120058413923005&amp;w=2">SSRT061201</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019218">1019218</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujan2008-086860.html">http://www.oracle.com/technetwork/topics/security/cpujan2008-086860.html</ref>
      <ref source="MISC" url="http://www.petefinnigan.com/Advisory_CPU_Jan_2008.htm">http://www.petefinnigan.com/Advisory_CPU_Jan_2008.htm</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487322/100/100/threaded">20080130 PeteFinnigan.com Limited advisory for Oracle January 2008 CPU</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27229">27229</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-017A.html">TA08-017A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0150" adv="1">ADV-2008-0150</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0180" adv="1">ADV-2008-0180</ref>
    </refs>
    <vuln_soft>
      <prod name="application_server" vendor="oracle">
        <vers num="1.0.2.2"/>
        <vers num="9.0.4.3"/>
        <vers num="10.1.2.0.2"/>
        <vers num="10.1.2.1.0"/>
        <vers num="10.1.2.2.0"/>
        <vers num="10.1.3.0.0"/>
        <vers num="10.1.3.1.0"/>
        <vers num="10.1.3.3.0"/>
      </prod>
      <prod name="application_server_9i" vendor="oracle">
        <vers num="9.0.4.3"/>
        <vers num="10.1.2.0.2"/>
      </prod>
      <prod name="collaboration_suite" vendor="oracle">
        <vers num="10.1.2"/>
      </prod>
      <prod name="database_server" vendor="oracle">
        <vers num="9.0.1.5" edition=":fips"/>
        <vers num="9.2.0.8"/>
        <vers num="9.2.0.8dv"/>
        <vers num="10.1.0.5"/>
        <vers num="10.2.0.2"/>
        <vers num="10.2.0.3"/>
        <vers num="11.1.0.6"/>
      </prod>
      <prod name="e-business_suite" vendor="oracle">
        <vers num="11.5.9"/>
        <vers num="11.5.10"/>
        <vers num="11.5.10.2"/>
        <vers num="12.0.0"/>
        <vers num="12.0.1"/>
        <vers num="12.0.2"/>
        <vers num="12.0.3"/>
      </prod>
      <prod name="peoplesoft_enterprise_peopletools" vendor="oracle">
        <vers num="8.47"/>
        <vers num="8.48"/>
        <vers num="8.49"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0348" seq="2008-0348" published="2008-01-17" modified="2012-10-22" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple unspecified vulnerabilities in the PeopleTools component in Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne 8.22.18, 8.48.15, and 8.49.07 have unknown impact and remote attack vectors, aka (1) PSE01, (2) PSE03, and (3) PSE04.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=120058413923005&amp;w=2">SSRT061201</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019218">1019218</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujan2008-086860.html">http://www.oracle.com/technetwork/topics/security/cpujan2008-086860.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27229">27229</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-017A.html">TA08-017A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0150">ADV-2008-0150</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0180">ADV-2008-0180</ref>
    </refs>
    <vuln_soft>
      <prod name="application_server" vendor="oracle">
        <vers num="1.0.2.2"/>
        <vers num="9.0.4.3"/>
        <vers num="10.1.2.0.2"/>
        <vers num="10.1.2.1.0"/>
        <vers num="10.1.2.2.0"/>
        <vers num="10.1.3.0.0"/>
        <vers num="10.1.3.1.0"/>
        <vers num="10.1.3.3.0"/>
      </prod>
      <prod name="collaboration_suite" vendor="oracle">
        <vers num="10.1.2"/>
      </prod>
      <prod name="database_server" vendor="oracle">
        <vers num="9.0.1.5" edition=":fips"/>
        <vers num="9.2.0.8"/>
        <vers num="9.2.0.8dv"/>
        <vers num="10.1.0.5"/>
        <vers num="10.2.0.2"/>
        <vers num="10.2.0.3"/>
        <vers num="11.1.0.6"/>
      </prod>
      <prod name="e-business_suite" vendor="oracle">
        <vers num="11.5.9"/>
        <vers num="11.5.10"/>
        <vers num="11.5.10.2"/>
        <vers num="12.0.0"/>
        <vers num="12.0.1"/>
        <vers num="12.0.2"/>
        <vers num="12.0.3"/>
      </prod>
      <prod name="peoplesoft_enterprise_peopletools" vendor="oracle">
        <vers num="8.47"/>
        <vers num="8.48"/>
        <vers num="8.49"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0349" seq="2008-0349" published="2008-01-17" modified="2012-10-22" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the PeopleTools component in Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne 8.48.15 and 8.49.07 has unknown impact and remote attack vectors, aka PSE02.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=120058413923005&amp;w=2">SSRT061201</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019218">1019218</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujan2008-086860.html">http://www.oracle.com/technetwork/topics/security/cpujan2008-086860.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27229">27229</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-017A.html">TA08-017A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0150">ADV-2008-0150</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0180">ADV-2008-0180</ref>
    </refs>
    <vuln_soft>
      <prod name="application_server" vendor="oracle">
        <vers num="1.0.2.2"/>
        <vers num="9.0.4.3"/>
        <vers num="10.1.2.0.2"/>
        <vers num="10.1.2.1.0"/>
        <vers num="10.1.2.2.0"/>
        <vers num="10.1.3.0.0"/>
        <vers num="10.1.3.1.0"/>
        <vers num="10.1.3.3.0"/>
      </prod>
      <prod name="collaboration_suite" vendor="oracle">
        <vers num="10.1.2"/>
      </prod>
      <prod name="database_server" vendor="oracle">
        <vers num="9.0.1.5" edition=":fips"/>
        <vers num="9.2.0.8"/>
        <vers num="9.2.0.8dv"/>
        <vers num="10.1.0.5"/>
        <vers num="10.2.0.2"/>
        <vers num="10.2.0.3"/>
        <vers num="11.1.0.6"/>
      </prod>
      <prod name="e-business_suite" vendor="oracle">
        <vers num="11.5.9"/>
        <vers num="11.5.10"/>
        <vers num="11.5.10.2"/>
        <vers num="12.0.0"/>
        <vers num="12.0.1"/>
        <vers num="12.0.2"/>
        <vers num="12.0.3"/>
      </prod>
      <prod name="peoplesoft_enterprise_peopletools" vendor="oracle">
        <vers num="8.47"/>
        <vers num="8.48"/>
        <vers num="8.49"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0350" seq="2008-0350" published="2008-01-17" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">admin/index.php in Evilsentinel 1.0.9 and earlier sends a redirect to the web browser but does not exit, which allows remote attackers to gain administrative privileges and make arbitrary configuration changes.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://evilsentinel.altervista.org/forum/index.php?topic=49.0">http://evilsentinel.altervista.org/forum/index.php?topic=49.0</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27227">27227</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4884">4884</ref>
    </refs>
    <vuln_soft>
      <prod name="evilsentinel" vendor="evilsentinel">
        <vers num="1.0.9" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0351" seq="2008-0351" published="2008-01-17" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">admin/config.php in Evilsentinel 1.0.9 and earlier allows remote attackers to bypass the CAPTCHA test by omitting the es_security_captcha parameter and not invoking captcha.php.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27227">27227</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4884">4884</ref>
    </refs>
    <vuln_soft>
      <prod name="evilsentinel" vendor="evilsentinel">
        <vers num="1.0.9" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0352" seq="2008-0352" published="2008-01-17" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">The Linux kernel 2.6.20 through 2.6.21.1 allows remote attackers to cause a denial of service (panic) via a certain IPv6 packet, possibly involving the Jumbo Payload hop-by-hop option (jumbogram).</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugzilla.kernel.org/show_bug.cgi?id=8450">http://bugzilla.kernel.org/show_bug.cgi?id=8450</ref>
      <ref source="MISC" url="http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21.2">http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21.2</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39643">linux-kernel-ipv6-jumbogram-dos(39643)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4893">4893</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.6.2" edition="rc1"/>
        <vers num="2.6.2" edition="rc2"/>
        <vers num="2.6.2" edition="rc3"/>
        <vers num="2.6.20" edition="rc2"/>
        <vers num="2.6.20.1"/>
        <vers num="2.6.20.2"/>
        <vers num="2.6.20.3"/>
        <vers num="2.6.20.4"/>
        <vers num="2.6.20.5"/>
        <vers num="2.6.20.6"/>
        <vers num="2.6.20.7"/>
        <vers num="2.6.20.8"/>
        <vers num="2.6.20.9"/>
        <vers num="2.6.20.10"/>
        <vers num="2.6.20.11"/>
        <vers num="2.6.20.12"/>
        <vers num="2.6.20.13"/>
        <vers num="2.6.20.14"/>
        <vers num="2.6.20.15"/>
        <vers num="2.6.21" edition="git1"/>
        <vers num="2.6.21" edition="git2"/>
        <vers num="2.6.21" edition="git3"/>
        <vers num="2.6.21" edition="git4"/>
        <vers num="2.6.21" edition="git5"/>
        <vers num="2.6.21" edition="git6"/>
        <vers num="2.6.21" edition="git7"/>
        <vers num="2.6.21.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0353" seq="2008-0353" published="2008-01-18" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in visualizza_tabelle.php in php-residence 0.7.2 and 1.0 allows remote attackers to execute arbitrary SQL commands via the cognome_cerca parameter.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27320">27320</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39739">phpresidence-visualizza-sql-injection(39739)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4925">4925</ref>
    </refs>
    <vuln_soft>
      <prod name="php-residence" vendor="php-residence">
        <vers num="0.7.2"/>
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0354" seq="2008-0354" published="2008-01-18" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the chat client in IBM Lotus Sametime 7.5 and 7.5.1 allows user-assisted remote attackers to inject arbitrary web script or HTML via a crafted message, which triggers code execution after a mouseover event initiated by the victim.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27316">27316</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019224">1019224</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0168">ADV-2008-0168</ref>
      <ref source="CONFIRM" url="http://www-1.ibm.com/support/docview.wss?uid=swg21292938">http://www-1.ibm.com/support/docview.wss?uid=swg21292938</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39726">sametime-client-mouseover-xss(39726)</ref>
    </refs>
    <vuln_soft>
      <prod name="lotus_sametime" vendor="ibm">
        <vers num="7.5"/>
        <vers num="7.5.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0355" seq="2008-0355" published="2008-01-18" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the forum module in PHPEcho CMS, probably 2.0-rc3 and earlier, allows remote attackers to execute arbitrary SQL commands via the id parameter in a section action, a different vector than CVE-2007-2866.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27326">27326</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39741">phpechocms-index-sql-injection(39741)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4929">4929</ref>
    </refs>
    <vuln_soft>
      <prod name="phpecho_cms" vendor="phpecho_cms">
        <vers num="2.0-rc3" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0356" seq="2008-0356" published="2008-01-18" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the Independent Management Architecture (IMA) service in Citrix Presentation Server (MetaFrame Presentation Server) 4.5 and earlier, Access Essentials 2.0 and earlier, and Desktop Server 1.0 allows remote attackers to execute arbitrary code via an invalid size value in a packet to TCP port 2512 or 2513.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://support.citrix.com/article/CTX114487" patch="1">http://support.citrix.com/article/CTX114487</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/412228">VU#412228</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486585/100/0/threaded">20080117 ZDI-08-002: Citrix Presentation Server IMA Service Heap Overflow Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27329">27329</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019231">1019231</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0172">ADV-2008-0172</ref>
      <ref source="MISC" url="http://zerodayinitiative.com/advisories/ZDI-08-002.html">http://zerodayinitiative.com/advisories/ZDI-08-002.html</ref>
    </refs>
    <vuln_soft>
      <prod name="access_essentials" vendor="citrix">
        <vers num="2.0" prev="1"/>
      </prod>
      <prod name="desktop_server" vendor="citrix">
        <vers num="1.0"/>
      </prod>
      <prod name="metaframe_presentation_server" vendor="citrix">
        <vers num="4.5" prev="1"/>
      </prod>
      <prod name="presentation_server" vendor="citrix">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0357" seq="2008-0357" published="2008-01-18" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in pages/upload.php in Galaxyscripts Mini File Host 1.2.1 and earlier allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the language parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27327">27327</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39799">minifilehost-uploadphp-file-include(39799)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4930">4930</ref>
    </refs>
    <vuln_soft>
      <prod name="mini_file_host" vendor="galaxyscripts">
        <vers num="1.2.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0358" seq="2008-0358" published="2008-01-18" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in Pixelpost 1.7 allows remote attackers to execute arbitrary SQL commands via the parent_id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.pixelpost.org/forum/showthread.php?t=7716" patch="1">http://www.pixelpost.org/forum/showthread.php?t=7716</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27242">27242</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019238">1019238</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39721">pixelpost-indexphp-sql-injection(39721)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4924">4924</ref>
    </refs>
    <vuln_soft>
      <prod name="pixelpost" vendor="pixelpost">
        <vers num="1.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0359" seq="2008-0359" published="2008-01-18" modified="2017-10-18" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in BLOG:CMS 4.2.1b allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO to (1) admin.php or (2) index.php in photo/.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://blogcms.com/wiki/changelog">http://blogcms.com/wiki/changelog</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=120049816924383&amp;w=2">20080116 [DSECRG-08-003] blogcms 4.2.1b Multiple Security Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27317" patch="1">27317</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39710">blogcms-index-xss(39710)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4919">4919</ref>
    </refs>
    <vuln_soft>
      <prod name="blog_cms" vendor="blog_cms">
        <vers num="4.2.1_c"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0360" seq="2008-0360" published="2008-01-18" modified="2017-10-18" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in BLOG:CMS 4.2.1b allow remote attackers to execute arbitrary SQL commands via (1) the blogid parameter to index.php, (2) the user parameter to action.php, or (3) the field parameter to admin/plugins/table/index.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://blogcms.com/wiki/changelog">http://blogcms.com/wiki/changelog</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=120049816924383&amp;w=2">20080116 [DSECRG-08-003] blogcms 4.2.1b Multiple Security Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27317" patch="1">27317</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4919">4919</ref>
    </refs>
    <vuln_soft>
      <prod name="blog_cms" vendor="blog_cms">
        <vers num="4.2.1_c"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0361" seq="2008-0361" published="2008-01-18" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in agregar_info.php in GradMan 0.1.3 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the tabla parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3552">3552</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486444/100/0/threaded">20080116 Gradman &lt;= 0.1.3 (agregar_info.php?tabla=) Local File Inclusion Exploit</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27324">27324</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39732">gradman-agregarinfo-file-include(39732)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4926">4926</ref>
    </refs>
    <vuln_soft>
      <prod name="gradman" vendor="instituto_politicnico_nacional">
        <vers num="0.1.3" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0362" seq="2008-0362" published="2008-01-18" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in gallery.php in Clever Copy 3.0 and earlier allows remote attackers to inject arbitrary web script or HTML via the album parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3553">3553</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486492/100/0/threaded">20080117 Clever Copy &lt;=3.0 Multiple Remote Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27335">27335</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39747">clevercopy-gallery-xss(39747)</ref>
    </refs>
    <vuln_soft>
      <prod name="clever_copy" vendor="clever_copy">
        <vers num="3.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0363" seq="2008-0363" published="2008-01-18" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in Clever Copy 3.0 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) ID parameter to postcomment.php and the (2) album parameter to gallery.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3553">3553</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486492/100/0/threaded">20080117 Clever Copy &lt;=3.0 Multiple Remote Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27335">27335</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39746">clevercopy-postcomment-sql-injection(39746)</ref>
    </refs>
    <vuln_soft>
      <prod name="clever_copy" vendor="clever_copy">
        <vers num="3.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0364" seq="2008-0364" published="2008-01-18" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in (1) BitTorrent 6.0 and earlier; and (2) uTorrent 1.7.5 and earlier, and 1.8-alpha-7834 and earlier in the 1.8.x series; on Windows allows remote attackers to cause a denial of service (application crash) via a long Unicode string representing a client version identifier.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/ruttorrent-adv.txt">http://aluigi.altervista.org/adv/ruttorrent-adv.txt</ref>
      <ref source="MISC" url="http://aluigi.org/poc/ruttorrent.zip">http://aluigi.org/poc/ruttorrent.zip</ref>
      <ref source="CONFIRM" url="http://download.utorrent.com/1.7.6/utorrent-1.7.6.txt">http://download.utorrent.com/1.7.6/utorrent-1.7.6.txt</ref>
      <ref source="CONFIRM" url="http://forum.utorrent.com/viewtopic.php?id=29330">http://forum.utorrent.com/viewtopic.php?id=29330</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3554">3554</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486426/100/0/threaded">20080116 Peers static overflow in BitTorrent 6.0 and uTorrent 1.7.5</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27321" patch="1">27321</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39719">bittorrent-peers-bo(39719)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39720">utorrent-peers-bo(39720)</ref>
    </refs>
    <vuln_soft>
      <prod name="bittorrent" vendor="bittorrent">
        <vers num="6.0" prev="1"/>
      </prod>
      <prod name="utorrent" vendor="utorrent">
        <vers num="1.7.5" prev="1"/>
        <vers num="1.8-alpha-7834"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0365" seq="2008-0365" published="2008-01-18" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple buffer overflows in CORE FORCE before 0.95.172 allow local users to cause a denial of service (system crash) and possibly execute arbitrary code in the kernel context via crafted arguments to (1) IOCTL functions in the Firewall module or (2) SSDT hook handler functions in the Registry module.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://force.coresecurity.com/index.php?module=articles&amp;func=display&amp;aid=32">http://force.coresecurity.com/index.php?module=articles&amp;func=display&amp;aid=32</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3555">3555</ref>
      <ref source="CONFIRM" url="http://www.coresecurity.com/?action=item&amp;id=2025">http://www.coresecurity.com/?action=item&amp;id=2025</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486513/100/0/threaded">20080117 CORE-2007-1119: CORE FORCE Kernel Buffer Overflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27341">27341</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019245">1019245</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0242">ADV-2008-0242</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39758">coreforce-firewall-registry-bo(39758)</ref>
    </refs>
    <vuln_soft>
      <prod name="core_force" vendor="core_security_technologies">
        <vers num="0.95.167" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0366" seq="2008-0366" published="2008-01-18" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">CORE FORCE before 0.95.172 does not properly validate arguments to SSDT hook handler functions in the Registry module, which allows local users to cause a denial of service (system crash) and possibly execute arbitrary code in the kernel context via crafted arguments.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://force.coresecurity.com/index.php?module=articles&amp;func=display&amp;aid=32">http://force.coresecurity.com/index.php?module=articles&amp;func=display&amp;aid=32</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3555">3555</ref>
      <ref source="CONFIRM" url="http://www.coresecurity.com/?action=item&amp;id=2025" patch="1">http://www.coresecurity.com/?action=item&amp;id=2025</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486513/100/0/threaded">20080117 CORE-2007-1119: CORE FORCE Kernel Buffer Overflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27341" patch="1">27341</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019245">1019245</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0242">ADV-2008-0242</ref>
    </refs>
    <vuln_soft>
      <prod name="core_force" vendor="core_security_technologies">
        <vers num="0.95.167" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0367" seq="2008-0367" published="2008-01-18" modified="2018-10-26" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Mozilla Firefox 2.0.0.11, 3.0b2, and possibly earlier versions, when prompting for HTTP Basic Authentication, displays the site requesting the authentication after the Realm text, which might make it easier for remote HTTP servers to conduct phishing and spoofing attacks.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aviv.raffon.net/2008/01/02/YetAnotherDialogSpoofingFirefoxBasicAuthentication.aspx" adv="1">http://aviv.raffon.net/2008/01/02/YetAnotherDialogSpoofingFirefoxBasicAuthentication.aspx</ref>
      <ref source="MISC" url="http://aviv.raffon.net/2008/01/05/FirefoxDialogSpoofingFAQ.aspx" adv="1">http://aviv.raffon.net/2008/01/05/FirefoxDialogSpoofingFAQ.aspx</ref>
      <ref source="CONFIRM" url="http://blog.mozilla.com/security/2008/01/04/basicauth-dialog-realm-value-spoofing/" adv="1">http://blog.mozilla.com/security/2008/01/04/basicauth-dialog-realm-value-spoofing/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/485732/100/200/threaded" adv="1">20080103 Yet another Dialog Spoofing Vulnerability - Firefox Basic Authentication</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/485738/100/200/threaded" adv="1">20080103 Re: [Full-disclosure] Yet another Dialog Spoofing Vulnerability - Firefox Basic Authentication</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27111" adv="1">27111</ref>
      <ref source="CONFIRM" url="https://bugzilla.mozilla.org/show_bug.cgi?id=244273" adv="1">https://bugzilla.mozilla.org/show_bug.cgi?id=244273</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="2.0.0.11" prev="1"/>
        <vers num="3.0" edition="beta2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0368" seq="2008-0368" published="2008-01-18" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">onedcu in IBM Informix Dynamic Server (IDS) 10.x before 10.00.xC8 allows local users to create arbitrary files via the Trace file argument.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=651">20080131 IBM Informix Dynamic Server onedcu File Creation Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27328">27328</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019237">1019237</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0169" adv="1">ADV-2008-0169</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/docview.wss?uid=swg1IC54307">IC54307</ref>
      <ref source="CONFIRM" url="http://www-1.ibm.com/support/docview.wss?uid=swg27011556">http://www-1.ibm.com/support/docview.wss?uid=swg27011556</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39751">ibm-ids-onedcu-sqlidebug-unspecified(39751)</ref>
    </refs>
    <vuln_soft>
      <prod name="informix_dynamic_server" vendor="ibm">
        <vers num="10.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0369" seq="2008-0369" published="2008-01-18" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.9" CVSS_base_score="6.9" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple unspecified programs in IBM Informix Dynamic Server (IDS) 10.x before 10.00.xC8 allow local users to create arbitrary files by specifying the target file in the SQLIDEBUG environment variable, whose ownership is changed to the user invoking the programs.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=650">20080131 IBM Informix Dynamic Server SQLIDEBUG File Creation Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27328">27328</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019237">1019237</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0169" adv="1">ADV-2008-0169</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/docview.wss?uid=swg1IC54309">IC54309</ref>
      <ref source="CONFIRM" url="http://www-1.ibm.com/support/docview.wss?uid=swg27011556">http://www-1.ibm.com/support/docview.wss?uid=swg27011556</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39751">ibm-ids-onedcu-sqlidebug-unspecified(39751)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40009">ibm-ids-sqlidebug-unspecified(40009)</ref>
    </refs>
    <vuln_soft>
      <prod name="informix_dynamic_server" vendor="ibm">
        <vers num="10.00"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0370" seq="2008-0370" published="2008-01-22" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in dohtaccess.html in cPanel before 11.17 build 19417 allows remote attackers to inject arbitrary web script or HTML via the rurl parameter.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aria-security.net/forum/showthread.php?p=1238">http://aria-security.net/forum/showthread.php?p=1238</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3561">3561</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486404/100/0/threaded">20080116 cPanel Hosting Manager (dohtaccess.html)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27308">27308</ref>
    </refs>
    <vuln_soft>
      <prod name="cpanel" vendor="cpanel">
        <vers num="11.16"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0371" seq="2008-0371" published="2008-01-22" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in aliTalk 1.9.1.1, when magic_quotes_gpc is disabled, allow remote authenticated users to execute arbitrary SQL commands via (1) the mohit parameter to (a) inc/receivertwo.php; and allow remote attackers to execute arbitrary SQL commands via (2) the id parameter to (b) inc/usercp.php, related to functionz/usercp.php; or (3) the username parameter to (c) admin/index.php, related to functionz/first_process.php, or (d) index.php.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27315">27315</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39733">alitalk-receivertwo-sql-injection(39733)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39735">alitalk-adminindex-sql-injection(39735)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39736">alitalk-usercp-sql-injection(39736)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39745">alitalk-index-sql-injection(39745)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4922">4922</ref>
    </refs>
    <vuln_soft>
      <prod name="alitalk" vendor="alilg">
        <vers num="1.9.1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0372" seq="2008-0372" published="2008-01-22" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">8e6 R3000 Internet Filter 2.0.05.33, and other versions before 2.0.11, allows remote attackers to bypass intended restrictions via a fragmented HTTP request.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3557">3557</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486398/100/0/threaded">20080116 8e6 Technologies R3000 Internet Filter Bypass by Request Split</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486770/100/0/threaded">20080121 Re: 8e6 Technologies R3000 Internet Filter Bypass by Request Split</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27309">27309</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39723">r3000-urlfilter-security-bypass(39723)</ref>
    </refs>
    <vuln_soft>
      <prod name="r3000_internet_filter" vendor="8e6">
        <vers num="2.0.05.33" prev="1"/>
        <vers num="2.0.10" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0373" seq="2008-0373" published="2008-01-22" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unrestricted file upload vulnerability in PHP F1 Max's File Uploader allows remote attackers to upload and execute arbitrary PHP files.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3572">3572</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486335/100/0/threaded">20080115 Max's File Uploader File Upload Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27285">27285</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39740">max-index-file-upload(39740)</ref>
    </refs>
    <vuln_soft>
      <prod name="f1_maxs_file_uploader" vendor="php">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0374" seq="2008-0374" published="2008-01-22" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">OKI C5510MFP Printer CU H2.15, PU 01.03.01, System F/W 1.01, and Web Page 1.00 sends the configuration of the printer in cleartext, which allows remote attackers to obtain the administrative password by connecting to TCP port 5548 or 7777.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3569">3569</ref>
      <ref source="MISC" url="http://www.csnc.ch/en/modules/news/news_0004.html_1394092626.html">http://www.csnc.ch/en/modules/news/news_0004.html_1394092626.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486511/100/0/threaded">20080117 [CSNC] OKI C5510MFP Printer Password Disclosure</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27339">27339</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39775">c5510mfp-configuration-info-disclosure(39775)</ref>
    </refs>
    <vuln_soft>
      <prod name="c5510_mfp_printer" vendor="oki_printing_solutions">
        <vers num="cu_h2.15"/>
        <vers num="pu_01.03.01"/>
        <vers num="system_fw_1.01"/>
        <vers num="web_page_1.00"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0375" seq="2008-0375" published="2008-01-22" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in OKI C5510MFP Printer CU H2.15, PU 01.03.01, System F/W 1.01, and Web Page 1.00 allows remote attackers to set the password and obtain administrative access via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3569">3569</ref>
      <ref source="MISC" url="http://www.csnc.ch/en/modules/news/news_0004.html_1394092626.html">http://www.csnc.ch/en/modules/news/news_0004.html_1394092626.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486511/100/0/threaded">20080117 [CSNC] OKI C5510MFP Printer Password Disclosure</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27339">27339</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39776">c5510mfp-password-security-bypass(39776)</ref>
    </refs>
    <vuln_soft>
      <prod name="c5510_mfp_printer" vendor="oki_printing_solutions">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0376" seq="2008-0376" published="2008-01-22" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in inc/linkbar.php in Small Axe Weblog 0.3.1 allows remote attackers to execute arbitrary PHP code via a URL in the cfile parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27345">27345</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39765">smallaxeweblog-linkbar-file-include(39765)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4937">4937</ref>
    </refs>
    <vuln_soft>
      <prod name="small_axe_weblog" vendor="softpedia">
        <vers num="0.3.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0377" seq="2008-0377" published="2008-01-22" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">MicroNews allows remote attackers to bypass authentication and gain administrative privileges via a direct request to admin.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3556">3556</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486349/100/0/threaded">20080115 MicroNews Admin Direct Access vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27288">27288</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39702">micronews-admin-authentication-bypass(39702)</ref>
    </refs>
    <vuln_soft>
      <prod name="micronews" vendor="news">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0378" seq="2008-0378" published="2008-01-22" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in SocksCap 2.40-051231 and earlier, when "Resolve all names remotely" is enabled, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long hostname.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3560">3560</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486632/100/0/threaded">20080118 SocksCap Stack Overflow (&lt;= 2.40-051231)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27357">27357</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39781">sockscap-hostname-bo(39781)</ref>
    </refs>
    <vuln_soft>
      <prod name="sockscap" vendor="nec">
        <vers num="2.40_051231" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0379" seq="2008-0379" published="2008-01-22" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Race condition in the Enterprise Tree ActiveX control (EnterpriseControls.dll 11.5.0.313) in Crystal Reports XI Release 2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the SelectedSession method, which triggers a buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27333">27333</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019239">1019239</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39743">crystalreports-enterprisetree-bo(39743)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4931">4931</ref>
    </refs>
    <vuln_soft>
      <prod name="crystal_reports_xi" vendor="businessobjects">
        <vers num="r2"/>
      </prod>
      <prod name="activex" vendor="microsoft">
        <vers num="enterprise_tree_control"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0380" seq="2008-0380" published="2008-01-22" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the Digital Data Communications RtspVaPgCtrl ActiveX control (RtspVapgDecoder.dll 1.1.0.29) allows remote attackers to execute arbitrary code via a long MP4Prefix property.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27337">27337</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0182">ADV-2008-0182</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4932">4932</ref>
    </refs>
    <vuln_soft>
      <prod name="rtspvapgdecoder.dll" vendor="digital_data_communications">
        <vers num="1.1.0.29"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0381" seq="2008-0381" published="2008-01-22" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Mahara before 0.9.1 has unknown impact and remote attack vectors, probably related to cross-site scripting (XSS) in uploaded files.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27348">27348</ref>
      <ref source="CONFIRM" url="https://eduforge.org/frs/shownotes.php?release_id=342" patch="1">https://eduforge.org/frs/shownotes.php?release_id=342</ref>
    </refs>
    <vuln_soft>
      <prod name="mahara" vendor="mahara">
        <vers num="0.9.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0382" seq="2008-0382" published="2008-01-22" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple eval injection vulnerabilities in MyBB 1.2.10 and earlier allow remote attackers to execute arbitrary code via the sortby parameter to (1) forumdisplay.php or (2) a results action in search.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3559">3559</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486434/100/0/threaded">20080116 [waraxe-2008-SA#061] - Remote Code Execution in MyBB 1.2.10</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27322">27322</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4927">4927</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4928">4928</ref>
    </refs>
    <vuln_soft>
      <prod name="mybulletinboard" vendor="mybulletinboard">
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.4"/>
        <vers num="1.0_pr2"/>
        <vers num="1.1"/>
        <vers num="1.1.1"/>
        <vers num="1.1.2"/>
        <vers num="1.1.3"/>
        <vers num="1.1.4"/>
        <vers num="1.1.5"/>
        <vers num="1.1.7"/>
        <vers num="1.1.8"/>
        <vers num="1.2"/>
        <vers num="1.2.3"/>
        <vers num="1.2.5"/>
        <vers num="1.2.10"/>
        <vers num="1.10"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0383" seq="2008-0383" published="2008-01-22" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in MyBB 1.2.10 and earlier allow remote moderators and administrators to execute arbitrary SQL commands via (1) the mergepost parameter in a do_mergeposts action, (2) rid parameter in an allreports action, or (3) threads parameter in a do_multimovethreads action to (a) moderation.php; or (4) gid parameter to (b) admin/usergroups.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://community.mybboard.net/showthread.php?tid=27227">http://community.mybboard.net/showthread.php?tid=27227</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3558">3558</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486433/100/0/threaded">20080116 [waraxe-2008-SA#062] - Multiple Sql Injections in MyBB 1.2.10</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27323" patch="1">27323</ref>
      <ref source="MISC" url="http://www.waraxe.us/advisory-62.html">http://www.waraxe.us/advisory-62.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39728">mybb-moderationphp-sql-injection(39728)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39729">mybb-usergroups-sql-injection(39729)</ref>
    </refs>
    <vuln_soft>
      <prod name="mybb" vendor="mybb">
        <vers num="1.2.10" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0384" seq="2008-0384" published="2008-01-22" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="4.9" CVSS_base_score="4.9" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">OpenBSD 4.2 allows local users to cause a denial of service (kernel panic) by calling the SIOCGIFRTLABEL IOCTL on an interface that does not have a route label, which triggers a NULL pointer dereference when the return value from the rtlabel_id2name function is not checked.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MLIST" url="http://marc.info/?l=openbsd-security-announce&amp;m=120007327504064">[openbsd-security-announce] 20080111 errata 005 for OpenBSD 4.2: local users can provoke a kernel panic</ref>
      <ref source="OPENBSD" url="http://www.openbsd.org/errata42.html#005_ifrtlabel">[4.2] 20080111 005: RELIABILITY FIX: January 11, 2008</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27252">27252</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019188">1019188</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4935">4935</ref>
    </refs>
    <vuln_soft>
      <prod name="openbsd" vendor="openbsd">
        <vers num="4.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0385" seq="2008-0385" published="2008-02-29" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in server/widgetallocator.php in Urulu 2.1 allows remote attackers to execute arbitrary SQL commands via the connectionId parameter to index.php with (1) statprt/js/request or (2) dyn/js/request in the PATH_INFO.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3707">3707</ref>
      <ref source="MISC" url="http://www.csnc.ch/misc/files/advisories/CVE-2008-0385.txt">http://www.csnc.ch/misc/files/advisories/CVE-2008-0385.txt</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488909/100/0/threaded">20080228 Urulu 2.1 Blind SQL Injection Vulnerability (CVE-2008-0385)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28032" patch="1">28032</ref>
    </refs>
    <vuln_soft>
      <prod name="urulu" vendor="urulu">
        <vers num="2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0386" seq="2008-0386" published="2008-02-04" modified="2011-03-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Xdg-utils 1.0.2 and earlier allows user-assisted remote attackers to execute arbitrary commands via shell metacharacters in a URL argument to (1) xdg-open or (2) xdg-email.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.gentoo.org/show_bug.cgi?id=207331">http://bugs.gentoo.org/show_bug.cgi?id=207331</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00008.html">SUSE-SR:2008:004</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200801-21.xml">GLSA-200801-21</ref>
      <ref source="CONFIRM" url="http://webcvs.freedesktop.org/portland/portland/xdg-utils/scripts/xdg-email.in?r1=1.24&amp;r2=1.25">http://webcvs.freedesktop.org/portland/portland/xdg-utils/scripts/xdg-email.in?r1=1.24&amp;r2=1.25</ref>
      <ref source="CONFIRM" url="http://webcvs.freedesktop.org/portland/portland/xdg-utils/scripts/xdg-email.in?view=log">http://webcvs.freedesktop.org/portland/portland/xdg-utils/scripts/xdg-email.in?view=log</ref>
      <ref source="CONFIRM" url="http://webcvs.freedesktop.org/portland/portland/xdg-utils/scripts/xdg-email?r1=1.36&amp;r2=1.37">http://webcvs.freedesktop.org/portland/portland/xdg-utils/scripts/xdg-email?r1=1.36&amp;r2=1.37</ref>
      <ref source="CONFIRM" url="http://webcvs.freedesktop.org/portland/portland/xdg-utils/scripts/xdg-open.in?r1=1.17&amp;r2=1.18">http://webcvs.freedesktop.org/portland/portland/xdg-utils/scripts/xdg-open.in?r1=1.17&amp;r2=1.18</ref>
      <ref source="CONFIRM" url="http://webcvs.freedesktop.org/portland/portland/xdg-utils/scripts/xdg-open?r1=1.32&amp;r2=1.33">http://webcvs.freedesktop.org/portland/portland/xdg-utils/scripts/xdg-open?r1=1.32&amp;r2=1.33</ref>
      <ref source="CONFIRM" url="http://webcvs.freedesktop.org/portland/portland/xdg-utils/scripts/xdg-open?view=log">http://webcvs.freedesktop.org/portland/portland/xdg-utils/scripts/xdg-open?view=log</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:031">MDVSA-2008:031</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27528">27528</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019284">1019284</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0342">ADV-2008-0342</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=429513">https://bugzilla.redhat.com/show_bug.cgi?id=429513</ref>
    </refs>
    <vuln_soft>
      <prod name="xdg-utils" vendor="gentoo">
        <vers num="1.0.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0387" seq="2008-0387" published="2008-01-28" modified="2018-10-26" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Integer overflow in Firebird SQL 1.0.3 and earlier, 1.5.x before 1.5.6, 2.0.x before 2.0.4, and 2.1.x before 2.1.0 RC1 might allow remote attackers to execute arbitrary code via crafted (1) op_receive, (2) op_start, (3) op_start_and_receive, (4) op_send, (5) op_start_and_send, and (6) op_start_send_and_receive XDR requests, which triggers memory corruption.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200803-02.xml" adv="1">GLSA-200803-02</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3580" adv="1">3580</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?group_id=9028&amp;release_id=570800" adv="1">http://sourceforge.net/project/shownotes.php?group_id=9028&amp;release_id=570800</ref>
      <ref source="CONFIRM" url="http://tracker.firebirdsql.org/browse/CORE-1681" adv="1">http://tracker.firebirdsql.org/browse/CORE-1681</ref>
      <ref source="MISC" url="http://www.coresecurity.com/?action=item&amp;id=2095" adv="1">http://www.coresecurity.com/?action=item&amp;id=2095</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1529" adv="1">DSA-1529</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487173/100/0/threaded" adv="1">20080128 CORE-2007-1219: Firebird Remote Memory Corruption</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27403" adv="1">27403</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39996" adv="1">firebird-xdrprotocol-integer-overflow(39996)</ref>
    </refs>
    <vuln_soft>
      <prod name="firebird" vendor="firebirdsql">
        <vers num="1.0.3" prev="1"/>
        <vers num="1.5"/>
        <vers num="1.5.0.4306"/>
        <vers num="1.5.1"/>
        <vers num="1.5.2"/>
        <vers num="1.5.2.4731"/>
        <vers num="1.5.3.4870"/>
        <vers num="1.5.4.4910"/>
        <vers num="1.5.5"/>
        <vers num="2.0.0"/>
        <vers num="2.0.0.12748"/>
        <vers num="2.0.1"/>
        <vers num="2.0.1.12855"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
        <vers num="2.1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0388" seq="2008-0388" published="2008-01-22" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the WP-Forum 1.7.4 plugin for WordPress allows remote attackers to execute arbitrary SQL commands via the user parameter in a showprofile action to the default URI.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2008-02/0272.html">20080216 WordPress forumaction (PAGE_id)(user)SQL Injectio</ref>
      <ref source="CONFIRM" url="http://weblogtoolscollection.com/archives/2008/01/21/wp-forum-plugin-security-bulletin/">http://weblogtoolscollection.com/archives/2008/01/21/wp-forum-plugin-security-bulletin/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27362">27362</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0235">ADV-2008-0235</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39800">wpforum-index-sql-injection(39800)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4939">4939</ref>
    </refs>
    <vuln_soft>
      <prod name="wp_forum" vendor="wordpress">
        <vers num="1.7.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0389" seq="2008-0389" published="2008-01-22" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the serveServletsByClassnameEnabled feature in IBM WebSphere Application Server (WAS) 6.0 through 6.0.2.25, 6.1 through 6.1.0.14, and 5.1.1.x before 5.1.1.18 has unknown impact and attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27371" patch="1">27371</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019251">1019251</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019894">1019894</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0219" adv="1">ADV-2008-0219</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1133" adv="1">ADV-2008-1133</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/docview.wss?uid=swg24018067">PK52059</ref>
      <ref source="CONFIRM" url="http://www-1.ibm.com/support/docview.wss?uid=swg27006879#51118">http://www-1.ibm.com/support/docview.wss?uid=swg27006879#51118</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39808">websphere-serveservlets-unspecified(39808)</ref>
    </refs>
    <vuln_soft>
      <prod name="websphere_application_server" vendor="ibm">
        <vers num="5.1.1"/>
        <vers num="5.1.1.1"/>
        <vers num="5.1.1.2"/>
        <vers num="5.1.1.3"/>
        <vers num="5.1.1.4"/>
        <vers num="5.1.1.5"/>
        <vers num="5.1.1.6"/>
        <vers num="5.1.1.7"/>
        <vers num="5.1.1.8"/>
        <vers num="5.1.1.9"/>
        <vers num="5.1.1.10"/>
        <vers num="5.1.1.12"/>
        <vers num="5.1.1.14"/>
        <vers num="5.1.1.15"/>
        <vers num="5.1.1.16"/>
        <vers num="5.1.1.17" prev="1"/>
        <vers num="6.0"/>
        <vers num="6.0.1"/>
        <vers num="6.0.2" edition=":fp17"/>
        <vers num="6.0.2.1"/>
        <vers num="6.0.2.3"/>
        <vers num="6.0.2.5"/>
        <vers num="6.0.2.7"/>
        <vers num="6.0.2.9"/>
        <vers num="6.0.2.11"/>
        <vers num="6.0.2.13"/>
        <vers num="6.0.2.19"/>
        <vers num="6.0.2.22"/>
        <vers num="6.0.2.23"/>
        <vers num="6.0.2.24"/>
        <vers num="6.0.2.25"/>
        <vers num="6.1"/>
        <vers num="6.1.1"/>
        <vers num="6.1.3"/>
        <vers num="6.1.5"/>
        <vers num="6.1.6"/>
        <vers num="6.1.7"/>
        <vers num="6.1.13"/>
        <vers num="6.1.14"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0390" seq="2008-0390" published="2008-01-22" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">stat.php in AuraCMS 1.62, and Mod Block Statistik for AuraCMS, allows remote attackers to inject arbitrary PHP code into online.db.txt via the X-Forwarded-For HTTP header in a stat action to index.php, and execute online.db.txt via a certain request to index.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27342">27342</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39777">auracms-stat-code-execution(39777)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4933">4933</ref>
    </refs>
    <vuln_soft>
      <prod name="auracms" vendor="auracms">
        <vers num="1.62"/>
      </prod>
      <prod name="mod_block_statistik" vendor="auracms">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0391" seq="2008-0391" published="2008-01-22" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">inc/elementz.php in aliTalk 1.9.1.1 does not properly verify authentication, which allows remote attackers to add an arbitrary user account via a modified lilil parameter, in conjunction with the ubild and pa parameters.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27315">27315</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4922">4922</ref>
    </refs>
    <vuln_soft>
      <prod name="alitalk" vendor="alilg">
        <vers num="1.9.1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0392" seq="2008-0392" published="2008-01-22" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple buffer overflows in Microsoft Visual Basic Enterprise Edition 6.0 SP6 allow user-assisted remote attackers to execute arbitrary code via a .dsr file with a long (1) ConnectionName or (2) CommandName line.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27349">27349</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019258">1019258</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0195">ADV-2008-0195</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39773">visualbasic-enterprise-dsr-bo(39773)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4938">4938</ref>
    </refs>
    <vuln_soft>
      <prod name="visual_basic" vendor="microsoft">
        <vers num="6.0" edition="sp6:enterprise"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0393" seq="2008-0393" published="2008-01-22" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="5.8" CVSS_base_score="5.8" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in info.php in GradMan 0.1.3 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the tabla parameter, a different vector than CVE-2008-0361.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27343">27343</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39768">gradman-info-file-include(39768)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4936">4936</ref>
    </refs>
    <vuln_soft>
      <prod name="gradman" vendor="gradman">
        <vers num="0.1.3" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0394" seq="2008-0394" published="2008-01-23" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in Citadel SMTP server 7.10 and earlier allows remote attackers to execute arbitrary code via a long RCPT TO command, which is not properly handled by the makeuserkey function.  NOTE: some of these details were obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.milw0rm.com/sploits/2008-vs-GNU-citadel.tar.gz">http://www.milw0rm.com/sploits/2008-vs-GNU-citadel.tar.gz</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27376">27376</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019255">1019255</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0252">ADV-2008-0252</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39807">citadel-makeuserkey-bo(39807)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4949">4949</ref>
    </refs>
    <vuln_soft>
      <prod name="smtp" vendor="citadel">
        <vers num="7.10" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0395" seq="2008-0395" published="2008-01-23" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Kayako SupportSuite 3.11.01 allows remote attackers to obtain server configuration information via a direct request to syncml/index.php, which prints the contents of the $_SERVER superglobal.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3573">3573</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486762/100/0/threaded">20080121 [waraxe-2008-SA#063] - Information Leakage in Kayako SupportSuite 3.11.01</ref>
      <ref source="MISC" url="http://www.waraxe.us/advisory-63.html">http://www.waraxe.us/advisory-63.html</ref>
    </refs>
    <vuln_soft>
      <prod name="supportsuite" vendor="kayako">
        <vers num="3.11.01"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0396" seq="2008-0396" published="2008-01-23" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in BitDefender Update Server (http.exe), as used in BitDefender products including Security for Fileservers and Enterprise Manager (BDEM), allows remote attackers to read arbitrary files via .. (dot dot) sequences in an HTTP request.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://oliver.greyhat.de/2008/01/19/bitdefender-unauthorized-remote-file-access-vulnerability/">http://oliver.greyhat.de/2008/01/19/bitdefender-unauthorized-remote-file-access-vulnerability/</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3568">3568</ref>
      <ref source="MISC" url="http://www.oliverkarow.de/research/bitdefender.txt">http://www.oliverkarow.de/research/bitdefender.txt</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486701/100/0/threaded">20080119 BitDefender Update Server - Unauthorized Remote File Access Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27358">27358</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0213">ADV-2008-0213</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39802">bitdefender-http-server-directory-traversal(39802)</ref>
    </refs>
    <vuln_soft>
      <prod name="update_server" vendor="bitdefender">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0397" seq="2008-0397" published="2008-01-23" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in aflog 1.01, and possibly earlier versions, allow remote attackers to execute arbitrary SQL commands via (1) the id parameter to comments.php and (2) an unspecified parameter to view.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27398">27398</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0255">ADV-2008-0255</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39825">aflog-comments-sql-injection(39825)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4958">4958</ref>
    </refs>
    <vuln_soft>
      <prod name="aflog" vendor="aflog.org">
        <vers num="1.01"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0398" seq="2008-0398" published="2008-01-23" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in aflog 1.01, and possibly earlier versions, allows remote attackers to inject arbitrary web script or HTML via the comment form.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27398">27398</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0255">ADV-2008-0255</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4958">4958</ref>
    </refs>
    <vuln_soft>
      <prod name="aflog" vendor="aflog">
        <vers num="1.01" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0399" seq="2008-0399" published="2008-01-23" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple buffer overflows in Toshiba Surveillance (Surveillix) RecordSend ActiveX control (MeIpCamX.DLL 1.0.0.4) allow remote attackers to execute arbitrary code via long arguments to the (1) SetPort and (2) SetIpAddress methods.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://retrogod.altervista.org/rgod_toshiba_control.html">http://retrogod.altervista.org/rgod_toshiba_control.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27360">27360</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0214">ADV-2008-0214</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39792">toshiba-recordsend-bo(39792)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4946">4946</ref>
    </refs>
    <vuln_soft>
      <prod name="surveillix" vendor="toshiba">
        <vers num="1.0.0.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0400" seq="2008-0400" published="2008-01-23" modified="2011-03-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in header.tpl.php in the modern template for Singapore 0.10.1 allows remote attackers to inject arbitrary web script or HTML via the gallery parameter to default.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://trew.icenetx.net/toolz/advisory-singapore-modern-template.txt">http://trew.icenetx.net/toolz/advisory-singapore-modern-template.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27382">27382</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0234">ADV-2008-0234</ref>
    </refs>
    <vuln_soft>
      <prod name="modern" vendor="modern">
        <vers num="1.3.2"/>
      </prod>
      <prod name="singapore" vendor="singapore">
        <vers num="0.10.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0401" seq="2008-0401" published="2008-01-23" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the logging functionality of the HTTP server in IBM Tivoli Provisioning Manager for OS Deployment (TPMfOSD) before 5.1.0.3 Interim Fix 3 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via an HTTP request with a long method string to port 443/tcp.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=647">20080122 IBM Tivoli PMfOSD HTTP Request Method Buffer Overflow Vulnerability</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/158609">VU#158609</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27387">27387</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019249">1019249</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0239">ADV-2008-0239</ref>
      <ref source="CONFIRM" url="http://www-1.ibm.com/support/docview.wss?uid=swg24018010" patch="1">http://www-1.ibm.com/support/docview.wss?uid=swg24018010</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39819">tivoli-provisioning-http-unspecified(39819)</ref>
    </refs>
    <vuln_soft>
      <prod name="tivoli_provisioning_manager_os_deployment" vendor="ibm">
        <vers num="5.1.0.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0402" seq="2008-0402" published="2008-01-23" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.0" CVSS_base_score="6.0" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="6.8" CVSS_vector="(AV:N/AC:M/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in IBM WebSphere Business Modeler Basic and Advanced 6.0.2.1 before Interim Fix 11 allows remote authenticated users to bypass intended access restrictions and delete unspecified repository resources via unknown vectors, even when they are not administrators or members of the repository's owning group.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27389">27389</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019252">1019252</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0254">ADV-2008-0254</ref>
      <ref source="CONFIRM" url="http://www-1.ibm.com/support/docview.wss?uid=swg24018060" patch="1">http://www-1.ibm.com/support/docview.wss?uid=swg24018060</ref>
      <ref source="CONFIRM" url="http://www-1.ibm.com/support/docview.wss?uid=swg24018061" patch="1">http://www-1.ibm.com/support/docview.wss?uid=swg24018061</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/search.wss?rs=0&amp;q=JR28175&amp;apar=only">JR28175</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39830">websphere-repository-weak-security(39830)</ref>
    </refs>
    <vuln_soft>
      <prod name="websphere_business_modeler" vendor="ibm">
        <vers num="6.0.2_1" edition=":advanced"/>
        <vers num="6.0.2_1" edition=":basic"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0403" seq="2008-0403" published="2008-01-23" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.5" CVSS_base_score="5.5" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">The web server in Belkin Wireless G Plus MIMO Router F5D9230-4 does not require authentication for SaveCfgFile.cgi, which allows remote attackers to read and modify configuration via a direct request to SaveCfgFile.cgi.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3566">3566</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486748/100/0/threaded">20080119 Belkin Wireless G Plus MIMO Router F5D9230-4 Authentication Bypass Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27359">27359</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0215">ADV-2008-0215</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39793">belkin-savecfgfile-authentication-bypass(39793)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4941">4941</ref>
    </refs>
    <vuln_soft>
      <prod name="f5d9230-4" vendor="belkin">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0404" seq="2008-0404" published="2008-01-23" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Mantis before 1.1.1 allows remote attackers to inject arbitrary web script or HTML via vectors related to the "Most active bugs" summary.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=569765" patch="1">http://sourceforge.net/project/shownotes.php?release_id=569765</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27367" patch="1">27367</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0232">ADV-2008-0232</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=429552">https://bugzilla.redhat.com/show_bug.cgi?id=429552</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39801">mantis-mostactive-xss(39801)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00676.html">FEDORA-2008-0796</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00734.html">FEDORA-2008-0856</ref>
    </refs>
    <vuln_soft>
      <prod name="mantis" vendor="mantis">
        <vers num="0.9"/>
        <vers num="0.9.1"/>
        <vers num="0.10"/>
        <vers num="0.10.1"/>
        <vers num="0.10.2"/>
        <vers num="0.11"/>
        <vers num="0.11.1"/>
        <vers num="0.12"/>
        <vers num="0.13"/>
        <vers num="0.13.1"/>
        <vers num="0.14"/>
        <vers num="0.14.1"/>
        <vers num="0.14.2"/>
        <vers num="0.14.3"/>
        <vers num="0.14.4"/>
        <vers num="0.14.5"/>
        <vers num="0.14.6"/>
        <vers num="0.14.7"/>
        <vers num="0.14.8"/>
        <vers num="0.15"/>
        <vers num="0.15.1"/>
        <vers num="0.15.2"/>
        <vers num="0.15.3"/>
        <vers num="0.15.4"/>
        <vers num="0.15.5"/>
        <vers num="0.15.6"/>
        <vers num="0.15.7"/>
        <vers num="0.15.8"/>
        <vers num="0.15.9"/>
        <vers num="0.15.10"/>
        <vers num="0.15.11"/>
        <vers num="0.15.12"/>
        <vers num="0.16"/>
        <vers num="0.16.0"/>
        <vers num="0.16.1"/>
        <vers num="0.17"/>
        <vers num="0.17.0"/>
        <vers num="0.17.1"/>
        <vers num="0.17.2"/>
        <vers num="0.17.3"/>
        <vers num="0.17.4"/>
        <vers num="0.17.4a"/>
        <vers num="0.17.5"/>
        <vers num="0.18"/>
        <vers num="0.18.0"/>
        <vers num="0.18.0_rc1"/>
        <vers num="0.18.0a2"/>
        <vers num="0.18.0a3"/>
        <vers num="0.18.0a4"/>
        <vers num="0.18.2"/>
        <vers num="0.18.3"/>
        <vers num="0.18a1"/>
        <vers num="0.19.0"/>
        <vers num="0.19.0_rc1"/>
        <vers num="0.19.0a"/>
        <vers num="0.19.0a1"/>
        <vers num="0.19.0a2"/>
        <vers num="0.19.1"/>
        <vers num="0.19.2"/>
        <vers num="0.19.3"/>
        <vers num="0.19.4"/>
        <vers num="1.0"/>
        <vers num="1.0.0_rc1"/>
        <vers num="1.0.0_rc2"/>
        <vers num="1.0.0_rc3"/>
        <vers num="1.0.0_rc4"/>
        <vers num="1.0.0a1"/>
        <vers num="1.0.0a2"/>
        <vers num="1.0.0a3"/>
        <vers num="1.0.1"/>
        <vers num="1.1"/>
        <vers num="1.1.0" prev="1"/>
        <vers num="1.1.0a1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0405" seq="2008-0405" published="2008-01-28" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple directory traversal vulnerabilities in HTTP File Server (HFS) before 2.2c, when account names are used as log filenames, allow remote attackers to create arbitrary (1) files and (2) directories via a .. (dot dot) in an account name, when requesting the / URI; and (3) append arbitrary data to a file via a .. (dot dot) in an account name, when requesting a URI composed of a "/?%0a" sequence followed by the data.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3581">3581</ref>
      <ref source="MISC" url="http://www.rejetto.com/hfs/?f=wn">http://www.rejetto.com/hfs/?f=wn</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486873/100/0/threaded">20080123 Syhunt: HFS (HTTP File Server) Log Arbitrary File/Directory Manipulation and Denial-of-Service Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27423">27423</ref>
      <ref source="MISC" url="http://www.syhunt.com/advisories/hfshack.txt">http://www.syhunt.com/advisories/hfshack.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39873">hfs-unspecified-command-execution(39873)</ref>
    </refs>
    <vuln_soft>
      <prod name="http_file_server" vendor="hfs">
        <vers num="2.2b" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0406" seq="2008-0406" published="2008-01-28" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">HTTP File Server (HFS) before 2.2c, when account names are used as log filenames, allows remote attackers to cause a denial of service (daemon crash) via a long account name.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3581">3581</ref>
      <ref source="MISC" url="http://www.rejetto.com/hfs/?f=wn">http://www.rejetto.com/hfs/?f=wn</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486873/100/0/threaded">20080123 Syhunt: HFS (HTTP File Server) Log Arbitrary File/Directory Manipulation and Denial-of-Service Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27423">27423</ref>
      <ref source="MISC" url="http://www.syhunt.com/advisories/hfshack.txt">http://www.syhunt.com/advisories/hfshack.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39875">hfs-filename-dos(39875)</ref>
    </refs>
    <vuln_soft>
      <prod name="http_file_server" vendor="hfs">
        <vers num="2.2b" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0407" seq="2008-0407" published="2008-01-28" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">HTTP File Server (HFS) before 2.2c tags HTTP request log entries with the username sent during HTTP Basic Authentication, regardless of whether authentication succeeded, which might make it more difficult for an administrator to determine who made a remote request.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3582">3582</ref>
      <ref source="MISC" url="http://www.rejetto.com/hfs/?f=wn">http://www.rejetto.com/hfs/?f=wn</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486874/100/0/threaded">20080123 Syhunt: HFS (HTTP File Server) Username Spoofing and Log Forging/Injection Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27423">27423</ref>
      <ref source="MISC" url="http://www.syhunt.com/advisories/hfshack.txt">http://www.syhunt.com/advisories/hfshack.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39877">hfs-username-spoofing(39877)</ref>
    </refs>
    <vuln_soft>
      <prod name="http_file_server" vendor="hfs">
        <vers num="2.2b" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0408" seq="2008-0408" published="2008-01-28" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">HTTP File Server (HFS) before 2.2c allows remote attackers to append arbitrary text to the log file by using the base64 representation of this text during HTTP Basic Authentication.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3582">3582</ref>
      <ref source="MISC" url="http://www.rejetto.com/hfs/?f=wn">http://www.rejetto.com/hfs/?f=wn</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486874/100/0/threaded">20080123 Syhunt: HFS (HTTP File Server) Username Spoofing and Log Forging/Injection Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27423">27423</ref>
      <ref source="MISC" url="http://www.syhunt.com/advisories/hfshack.txt">http://www.syhunt.com/advisories/hfshack.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39876">hfs-unspecified-log-injection(39876)</ref>
    </refs>
    <vuln_soft>
      <prod name="http_file_server" vendor="hfs">
        <vers num="2.2b" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0409" seq="2008-0409" published="2008-01-28" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in HTTP File Server (HFS) before 2.2c allows remote attackers to inject arbitrary web script or HTML via the userinfo subcomponent of a URL.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3583">3583</ref>
      <ref source="MISC" url="http://www.rejetto.com/hfs/?f=wn">http://www.rejetto.com/hfs/?f=wn</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486872/100/0/threaded">20080123 Syhunt: HFS (HTTP File Server) Template Cross-Site Scripting and Information Disclosure Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27423">27423</ref>
      <ref source="MISC" url="http://www.syhunt.com/advisories/hfshack.txt">http://www.syhunt.com/advisories/hfshack.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39870">hfs-host-xss(39870)</ref>
    </refs>
    <vuln_soft>
      <prod name="http_file_server" vendor="hfs">
        <vers num="2.2b" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0410" seq="2008-0410" published="2008-01-28" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">HTTP File Server (HFS) before 2.2c allows remote attackers to obtain configuration and usage details by using an id element such as &lt;id>%version%&lt;/id> in HTTP Basic Authentication instead of a username and password, as demonstrated by placing this id element in the userinfo subcomponent of a URL.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3583">3583</ref>
      <ref source="MISC" url="http://www.rejetto.com/hfs/?f=wn">http://www.rejetto.com/hfs/?f=wn</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486872/100/0/threaded">20080123 Syhunt: HFS (HTTP File Server) Template Cross-Site Scripting and Information Disclosure Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27423">27423</ref>
      <ref source="MISC" url="http://www.syhunt.com/advisories/hfshack.txt">http://www.syhunt.com/advisories/hfshack.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39871">hfs-sendhfsidentifier-info-disclosure(39871)</ref>
    </refs>
    <vuln_soft>
      <prod name="http_file_server" vendor="hfs">
        <vers num="2.2b" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0411" seq="2008-0411" published="2008-02-28" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the zseticcspace function in zicc.c in Ghostscript 8.61 and earlier allows remote attackers to execute arbitrary code via a postscript (.ps) file containing a long Range array in a .seticcspace operator.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00009.html">SUSE-SA:2008:010</ref>
      <ref source="MISC" url="http://scary.beasts.org/security/CESA-2008-001.html">http://scary.beasts.org/security/CESA-2008-001.html</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.370633">SSA:2008-062-01</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0082">http://wiki.rpath.com/Advisories:rPSA-2008-0082</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1510" patch="1">DSA-1510</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200803-14.xml">GLSA-200803-14</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:055">MDVSA-2008:055</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0155.html">RHSA-2008:0155</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488932/100/0/threaded">20080228 rPSA-2008-0082-1 espgs</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488946/100/0/threaded">20080228 Ghostscript buffer overflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28017">28017</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019511">1019511</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-599-1">USN-599-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0693/references">ADV-2008-0693</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2217">https://issues.rpath.com/browse/RPL-2217</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9557">oval:org.mitre.oval:def:9557</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00085.html">FEDORA-2008-1998</ref>
    </refs>
    <vuln_soft>
      <prod name="ghostscript" vendor="ghostscript">
        <vers num="0"/>
        <vers num="8.0.1"/>
        <vers num="8.15"/>
        <vers num="8.61" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0412" seq="2008-0412" published="2008-02-08" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The browser engine in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8 allows remote attackers to cause a denial of service (crash) and possibly trigger memory corruption via vectors related to the (1) nsTableFrame::GetFrameAtOrBefore, (2) nsAccessibilityService::GetAccessible, (3) nsBindingManager::GetNestedInsertionPoint, (4) nsXBLPrototypeBinding::AttributeChanged, (5) nsColumnSetFrame::GetContentInsertionFrame, and (6) nsLineLayout::TrimTrailingWhiteSpaceIn methods, and other vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://browser.netscape.com/releasenotes/">http://browser.netscape.com/releasenotes/</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00006.html">SUSE-SA:2008:008</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.445399">SSA:2008-061-01</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1">238492</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-239546-1">239546</ref>
      <ref source="CONFIRM" url="http://support.novell.com/techcenter/psdb/6251b18e050302ebe7fe74294b55c818.html">http://support.novell.com/techcenter/psdb/6251b18e050302ebe7fe74294b55c818.html</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0051">http://wiki.rpath.com/Advisories:rPSA-2008-0051</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0093">http://wiki.rpath.com/Advisories:rPSA-2008-0093</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0093">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0093</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1484">DSA-1484</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1485">DSA-1485</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1489">DSA-1489</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1506">DSA-1506</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml">GLSA-200805-18</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:048">MDVSA-2008:048</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:062">MDVSA-2008:062</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/security/announce/2008/mfsa2008-01.html">http://www.mozilla.org/security/announce/2008/mfsa2008-01.html</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0103.html">RHSA-2008:0103</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0104.html">RHSA-2008:0104</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0105.html">RHSA-2008:0105</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487826/100/0/threaded">20080209 rPSA-2008-0051-1 firefox</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488002/100/0/threaded">20080212 FLEA-2008-0001-1 firefox</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488971/100/0/threaded">20080229 rPSA-2008-0093-1 thunderbird</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27683">27683</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019320">1019320</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-576-1">USN-576-1</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-582-1">USN-582-1</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-582-2">USN-582-2</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0453/references">ADV-2008-0453</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0454/references">ADV-2008-0454</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0627/references">ADV-2008-0627</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1793/references">ADV-2008-1793</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2091/references">ADV-2008-2091</ref>
      <ref source="CONFIRM" url="https://bugzilla.mozilla.org/buglist.cgi?bug_id=398088,393141,364801,346405,396613,394337,406290">https://bugzilla.mozilla.org/buglist.cgi?bug_id=398088,393141,364801,346405,396613,394337,406290</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-1995">https://issues.rpath.com/browse/RPL-1995</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10573">oval:org.mitre.oval:def:10573</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00274.html">FEDORA-2008-1435</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00309.html">FEDORA-2008-1459</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00381.html">FEDORA-2008-1535</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00905.html">FEDORA-2008-2060</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00946.html">FEDORA-2008-2118</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="2.0.0.11" prev="1"/>
      </prod>
      <prod name="seamonkey" vendor="mozilla">
        <vers num="1.1.7" prev="1"/>
      </prod>
      <prod name="thunderbird" vendor="mozilla">
        <vers num="2.0.0.11" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0413" seq="2008-0413" published="2008-02-08" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The JavaScript engine in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8 allows remote attackers to cause a denial of service (crash) and possibly trigger memory corruption via (1) a large switch statement, (2) certain uses of watch and eval, (3) certain uses of the mousedown event listener, and other vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://browser.netscape.com/releasenotes/">http://browser.netscape.com/releasenotes/</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00006.html">SUSE-SA:2008:008</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.445399">SSA:2008-061-01</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1">238492</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-239546-1">239546</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0051">http://wiki.rpath.com/Advisories:rPSA-2008-0051</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0093">http://wiki.rpath.com/Advisories:rPSA-2008-0093</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0093">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0093</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1484">DSA-1484</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1485">DSA-1485</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1489">DSA-1489</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1506">DSA-1506</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml">GLSA-200805-18</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:048">MDVSA-2008:048</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:062">MDVSA-2008:062</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/security/announce/2008/mfsa2008-01.html">http://www.mozilla.org/security/announce/2008/mfsa2008-01.html</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0103.html">RHSA-2008:0103</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0104.html">RHSA-2008:0104</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0105.html">RHSA-2008:0105</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487826/100/0/threaded">20080209 rPSA-2008-0051-1 firefox</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488002/100/0/threaded">20080212 FLEA-2008-0001-1 firefox</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488971/100/0/threaded">20080229 rPSA-2008-0093-1 thunderbird</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27683">27683</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019321">1019321</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-576-1">USN-576-1</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-582-1">USN-582-1</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-582-2">USN-582-2</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0453/references">ADV-2008-0453</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0454/references">ADV-2008-0454</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0627/references">ADV-2008-0627</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1793/references">ADV-2008-1793</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2091/references">ADV-2008-2091</ref>
      <ref source="CONFIRM" url="https://bugzilla.mozilla.org/buglist.cgi?bug_id=407720,390597,373344,398085,406572,391028,406036,402087">https://bugzilla.mozilla.org/buglist.cgi?bug_id=407720,390597,373344,398085,406572,391028,406036,402087</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-1995">https://issues.rpath.com/browse/RPL-1995</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10385">oval:org.mitre.oval:def:10385</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00274.html">FEDORA-2008-1435</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00309.html">FEDORA-2008-1459</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00381.html">FEDORA-2008-1535</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00905.html">FEDORA-2008-2060</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00946.html">FEDORA-2008-2118</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="2.0.0.11" prev="1"/>
      </prod>
      <prod name="seamonkey" vendor="mozilla">
        <vers num="1.1.7" prev="1"/>
      </prod>
      <prod name="thunderbird" vendor="mozilla">
        <vers num="2.0.0.11" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0414" seq="2008-0414" published="2008-02-08" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8 allows user-assisted remote attackers to trick the user into uploading arbitrary files via label tags that shift focus to a file input field, aka "focus spoofing."</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://browser.netscape.com/releasenotes/">http://browser.netscape.com/releasenotes/</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00006.html">SUSE-SA:2008:008</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1">238492</ref>
      <ref source="CONFIRM" url="http://support.novell.com/techcenter/psdb/6251b18e050302ebe7fe74294b55c818.html">http://support.novell.com/techcenter/psdb/6251b18e050302ebe7fe74294b55c818.html</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0051">http://wiki.rpath.com/Advisories:rPSA-2008-0051</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1484">DSA-1484</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1485">DSA-1485</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1489">DSA-1489</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1506">DSA-1506</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml">GLSA-200805-18</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:048">MDVSA-2008:048</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/security/announce/2008/mfsa2008-02.html">http://www.mozilla.org/security/announce/2008/mfsa2008-02.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487826/100/0/threaded">20080209 rPSA-2008-0051-1 firefox</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488002/100/0/threaded">20080212 FLEA-2008-0001-1 firefox</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27683">27683</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019330">1019330</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-576-1">USN-576-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0453/references">ADV-2008-0453</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0627/references">ADV-2008-0627</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1793/references">ADV-2008-1793</ref>
      <ref source="CONFIRM" url="https://bugzilla.mozilla.org/buglist.cgi?bug_id=404451,408034,404391,405299">https://bugzilla.mozilla.org/buglist.cgi?bug_id=404451,408034,404391,405299</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00274.html">FEDORA-2008-1435</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00309.html">FEDORA-2008-1459</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00381.html">FEDORA-2008-1535</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="2.0.0.11" prev="1"/>
      </prod>
      <prod name="seamonkey" vendor="mozilla">
        <vers num="1.1.7" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0415" seq="2008-0415" published="2008-02-08" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8 allows remote attackers to execute script outside of the sandbox and conduct cross-site scripting (XSS) attacks via multiple vectors including the XMLDocument.load function, aka "JavaScript privilege escalation bugs."</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://browser.netscape.com/releasenotes/">http://browser.netscape.com/releasenotes/</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00006.html">SUSE-SA:2008:008</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.445399">SSA:2008-061-01</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1">238492</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-239546-1">239546</ref>
      <ref source="CONFIRM" url="http://support.novell.com/techcenter/psdb/6251b18e050302ebe7fe74294b55c818.html">http://support.novell.com/techcenter/psdb/6251b18e050302ebe7fe74294b55c818.html</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0051">http://wiki.rpath.com/Advisories:rPSA-2008-0051</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0093">http://wiki.rpath.com/Advisories:rPSA-2008-0093</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0093">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0093</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1484">DSA-1484</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1485">DSA-1485</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1489">DSA-1489</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1506">DSA-1506</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml">GLSA-200805-18</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:048">MDVSA-2008:048</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:062">MDVSA-2008:062</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/security/announce/2008/mfsa2008-03.html">http://www.mozilla.org/security/announce/2008/mfsa2008-03.html</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0103.html">RHSA-2008:0103</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0104.html">RHSA-2008:0104</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0105.html">RHSA-2008:0105</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487826/100/0/threaded">20080209 rPSA-2008-0051-1 firefox</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488002/100/0/threaded">20080212 FLEA-2008-0001-1 firefox</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488971/100/0/threaded">20080229 rPSA-2008-0093-1 thunderbird</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27683">27683</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019327">1019327</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-576-1">USN-576-1</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-582-1">USN-582-1</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-582-2">USN-582-2</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0453/references">ADV-2008-0453</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0454/references">ADV-2008-0454</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0627/references">ADV-2008-0627</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1793/references">ADV-2008-1793</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2091/references">ADV-2008-2091</ref>
      <ref source="CONFIRM" url="https://bugzilla.mozilla.org/buglist.cgi?bug_id=386695,393761,393762,399298,407289,372075,363597">https://bugzilla.mozilla.org/buglist.cgi?bug_id=386695,393761,393762,399298,407289,372075,363597</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-1995">https://issues.rpath.com/browse/RPL-1995</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9897">oval:org.mitre.oval:def:9897</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00274.html">FEDORA-2008-1435</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00309.html">FEDORA-2008-1459</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00381.html">FEDORA-2008-1535</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00905.html">FEDORA-2008-2060</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00946.html">FEDORA-2008-2118</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="2.0.0.11" prev="1"/>
      </prod>
      <prod name="seamonkey" vendor="mozilla">
        <vers num="1.1.7" prev="1"/>
      </prod>
      <prod name="thunderbird" vendor="mozilla">
        <vers num="2.0.0.11" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0416" seq="2008-0416" published="2008-02-11" modified="2018-10-03" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in Mozilla Firefox  before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8 allow remote attackers to inject arbitrary web script or HTML via certain character encodings, including (1) a backspace character that is treated as whitespace, (2) 0x80 with Shift_JIS encoding, and (3) "zero-length non-ASCII sequences" in certain Asian character sets.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="JVN" url="http://jvn.jp/en/jp/JVN21563357/index.html">JVN#21563357</ref>
      <ref source="JVNDB" url="http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000021.html">JVNDB-2008-000021</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1">238492</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-239546-1">239546</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1484">DSA-1484</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1485">DSA-1485</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1489">DSA-1489</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml">GLSA-200805-18</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/security/announce/2008/mfsa2008-13.html">http://www.mozilla.org/security/announce/2008/mfsa2008-13.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29303">29303</ref>
      <ref source="TURBO" url="http://www.turbolinux.com/security/2008/TLSA-2008-9.txt">TLSA-2008-9</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-592-1">USN-592-1</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-087A.html">TA08-087A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1793/references" adv="1">ADV-2008-1793</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2091/references" adv="1">ADV-2008-2091</ref>
      <ref source="MISC" url="https://bugzilla.mozilla.org/buglist.cgi?bug_id=404252,381412,407161">https://bugzilla.mozilla.org/buglist.cgi?bug_id=404252,381412,407161</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40488">firefox-character-encoding-xss(40488)</ref>
      <ref source="UBUNTU" url="https://usn.ubuntu.com/576-1/">USN-576-1</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="2.0.0.11" prev="1"/>
      </prod>
      <prod name="seamonkey" vendor="mozilla">
        <vers num="1.1.7" prev="1"/>
      </prod>
      <prod name="thunderbird" vendor="mozilla">
        <vers num="2.0.0.11" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0417" seq="2008-0417" published="2008-02-08" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">CRLF injection vulnerability in Mozilla Firefox before 2.0.0.12 allows remote user-assisted web sites to corrupt the user's password store via newlines that are not properly handled when the user saves a password.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://browser.netscape.com/releasenotes/">http://browser.netscape.com/releasenotes/</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00006.html">SUSE-SA:2008:008</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1">238492</ref>
      <ref source="CONFIRM" url="http://support.novell.com/techcenter/psdb/6251b18e050302ebe7fe74294b55c818.html">http://support.novell.com/techcenter/psdb/6251b18e050302ebe7fe74294b55c818.html</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0051">http://wiki.rpath.com/Advisories:rPSA-2008-0051</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1484">DSA-1484</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1485">DSA-1485</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1489">DSA-1489</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1506">DSA-1506</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml">GLSA-200805-18</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:048">MDVSA-2008:048</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/security/announce/2008/mfsa2008-04.html">http://www.mozilla.org/security/announce/2008/mfsa2008-04.html</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0103.html">RHSA-2008:0103</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0104.html">RHSA-2008:0104</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487826/100/0/threaded">20080209 rPSA-2008-0051-1 firefox</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488002/100/0/threaded">20080212 FLEA-2008-0001-1 firefox</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27683">27683</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019334">1019334</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-576-1">USN-576-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0453/references">ADV-2008-0453</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0627/references">ADV-2008-0627</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1793/references">ADV-2008-1793</ref>
      <ref source="CONFIRM" url="https://bugzilla.mozilla.org/show_bug.cgi?id=394610">https://bugzilla.mozilla.org/show_bug.cgi?id=394610</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11154">oval:org.mitre.oval:def:11154</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00274.html">FEDORA-2008-1435</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00309.html">FEDORA-2008-1459</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00381.html">FEDORA-2008-1535</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="2.0.0.11" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0418" seq="2008-0418" published="2008-02-08" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8, when using "flat" addons, allows remote attackers to read arbitrary Javascript, image, and stylesheet files via the chrome: URI scheme, as demonstrated by stealing session information from sessionstore.js.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://browser.netscape.com/releasenotes/">http://browser.netscape.com/releasenotes/</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00006.html">SUSE-SA:2008:008</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.445399">SSA:2008-061-01</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1">238492</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-239546-1">239546</ref>
      <ref source="CONFIRM" url="http://support.novell.com/techcenter/psdb/6251b18e050302ebe7fe74294b55c818.html">http://support.novell.com/techcenter/psdb/6251b18e050302ebe7fe74294b55c818.html</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0051">http://wiki.rpath.com/Advisories:rPSA-2008-0051</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0093">http://wiki.rpath.com/Advisories:rPSA-2008-0093</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0093">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0093</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1484">DSA-1484</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1485">DSA-1485</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1489">DSA-1489</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1506">DSA-1506</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml">GLSA-200805-18</ref>
      <ref source="MISC" url="http://www.hiredhacker.com/2008/01/19/firefox-chrome-url-handling-directory-traversal/">http://www.hiredhacker.com/2008/01/19/firefox-chrome-url-handling-directory-traversal/</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/309608">VU#309608</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:048">MDVSA-2008:048</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:062">MDVSA-2008:062</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/security/announce/2008/mfsa2008-05.html">http://www.mozilla.org/security/announce/2008/mfsa2008-05.html</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0103.html">RHSA-2008:0103</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0104.html">RHSA-2008:0104</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0105.html">RHSA-2008:0105</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487826/100/0/threaded">20080209 rPSA-2008-0051-1 firefox</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488002/100/0/threaded">20080212 FLEA-2008-0001-1 firefox</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488971/100/0/threaded">20080229 rPSA-2008-0093-1 thunderbird</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27406">27406</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019329">1019329</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-576-1">USN-576-1</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-582-1">USN-582-1</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-582-2">USN-582-2</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0263">ADV-2008-0263</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0453/references">ADV-2008-0453</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0454/references">ADV-2008-0454</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0627/references">ADV-2008-0627</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1793/references">ADV-2008-1793</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2091/references">ADV-2008-2091</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-1995">https://issues.rpath.com/browse/RPL-1995</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10705">oval:org.mitre.oval:def:10705</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00274.html">FEDORA-2008-1435</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00309.html">FEDORA-2008-1459</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00381.html">FEDORA-2008-1535</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00905.html">FEDORA-2008-2060</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00946.html">FEDORA-2008-2118</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="2.0.0.11" prev="1"/>
      </prod>
      <prod name="seamonkey" vendor="mozilla">
        <vers num="1.1.7" prev="1"/>
      </prod>
      <prod name="thunderbird" vendor="mozilla">
        <vers num="2.0.0.11" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0419" seq="2008-0419" published="2008-02-08" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8 allows remote attackers to steal navigation history and cause a denial of service (crash) via images in a page that uses designMode frames, which triggers memory corruption related to resize handles.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://browser.netscape.com/releasenotes/">http://browser.netscape.com/releasenotes/</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00006.html">SUSE-SA:2008:008</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1">238492</ref>
      <ref source="CONFIRM" url="http://support.novell.com/techcenter/psdb/6251b18e050302ebe7fe74294b55c818.html">http://support.novell.com/techcenter/psdb/6251b18e050302ebe7fe74294b55c818.html</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0051">http://wiki.rpath.com/Advisories:rPSA-2008-0051</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0093">http://wiki.rpath.com/Advisories:rPSA-2008-0093</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0093">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0093</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1484">DSA-1484</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1485">DSA-1485</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1489">DSA-1489</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1506">DSA-1506</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml">GLSA-200805-18</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/879056">VU#879056</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:048">MDVSA-2008:048</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/security/announce/2008/mfsa2008-06.html">http://www.mozilla.org/security/announce/2008/mfsa2008-06.html</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0103.html" adv="1">RHSA-2008:0103</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0104.html" adv="1">RHSA-2008:0104</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0105.html" adv="1">RHSA-2008:0105</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487826/100/0/threaded">20080209 rPSA-2008-0051-1 firefox</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488002/100/0/threaded">20080212 FLEA-2008-0001-1 firefox</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488971/100/0/threaded">20080229 rPSA-2008-0093-1 thunderbird</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27683">27683</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019328">1019328</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-576-1">USN-576-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0453/references">ADV-2008-0453</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0627/references">ADV-2008-0627</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1793/references">ADV-2008-1793</ref>
      <ref source="CONFIRM" url="https://bugzilla.mozilla.org/show_bug.cgi?id=400556">https://bugzilla.mozilla.org/show_bug.cgi?id=400556</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-1995">https://issues.rpath.com/browse/RPL-1995</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11652">oval:org.mitre.oval:def:11652</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00274.html">FEDORA-2008-1435</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00309.html">FEDORA-2008-1459</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00381.html">FEDORA-2008-1535</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00905.html">FEDORA-2008-2060</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00946.html">FEDORA-2008-2118</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="2.0.0.11" prev="1"/>
      </prod>
      <prod name="seamonkey" vendor="mozilla">
        <vers num="1.1.7" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0420" seq="2008-0420" published="2008-02-11" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">modules/libpr0n/decoders/bmp/nsBMPDecoder.cpp in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8 does not properly perform certain calculations related to the mColors table, which allows remote attackers to read portions of memory uninitialized via a crafted 8-bit bitmap (BMP) file that triggers an out-of-bounds read within the heap, as demonstrated using a CANVAS element; or cause a denial of service (application crash) via a crafted 8-bit bitmap file that triggers an out-of-bounds read. NOTE: the initial public reports stated that this affected Firefox in Ubuntu 6.06 through 7.10.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://browser.netscape.com/releasenotes/">http://browser.netscape.com/releasenotes/</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019434">1019434</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1">238492</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml">GLSA-200805-18</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:048">MDVSA-2008:048</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/security/announce/2008/mfsa2008-07.html">http://www.mozilla.org/security/announce/2008/mfsa2008-07.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488264/100/0/threaded">20080216 [HISPASEC] FireFox 2.0.0.11 and Opera 9.50 beta Remote Memory Information Leak, FireFox 2.0.0.11 Remote Denial of Service</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27826">27826</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-582-1">USN-582-1</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-582-2">USN-582-2</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0627/references" adv="1">ADV-2008-0627</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1793/references" adv="1">ADV-2008-1793</ref>
      <ref source="CONFIRM" url="https://bugzilla.mozilla.org/show_bug.cgi?id=408076">https://bugzilla.mozilla.org/show_bug.cgi?id=408076</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40491">firefox-bmp-information-disclosure(40491)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40606">firefox-bmp-dos(40606)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10119">oval:org.mitre.oval:def:10119</ref>
      <ref source="UBUNTU" url="https://usn.ubuntu.com/576-1/">USN-576-1</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00905.html">FEDORA-2008-2060</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00946.html">FEDORA-2008-2118</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="0.1"/>
        <vers num="0.2"/>
        <vers num="0.3"/>
        <vers num="0.4"/>
        <vers num="0.5"/>
        <vers num="0.6"/>
        <vers num="0.6.1"/>
        <vers num="0.7"/>
        <vers num="0.7.1"/>
        <vers num="0.8"/>
        <vers num="0.9"/>
        <vers num="0.9.1"/>
        <vers num="0.9.2"/>
        <vers num="0.9.3"/>
        <vers num="1.0" edition="preview_release"/>
        <vers num="1.0.3"/>
        <vers num="1.0.5"/>
        <vers num="1.0.8"/>
        <vers num="1.5"/>
        <vers num="1.5.0.1"/>
        <vers num="1.5.0.2"/>
        <vers num="1.5.0.4"/>
        <vers num="1.5.0.6"/>
        <vers num="1.5.0.7"/>
        <vers num="1.5.0.9"/>
        <vers num="1.5.0.10"/>
        <vers num="1.5.0.12"/>
        <vers num="2.0"/>
        <vers num="2.0.0.1"/>
        <vers num="2.0.0.2"/>
        <vers num="2.0.0.7"/>
        <vers num="2.0.0.8"/>
        <vers num="2.0.0.9"/>
        <vers num="2.0.0.10"/>
        <vers num="2.0.0.11" prev="1"/>
      </prod>
      <prod name="seamonkey" vendor="mozilla">
        <vers num="1.0" edition="alpha"/>
        <vers num="1.0" edition="beta"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.5"/>
        <vers num="1.0.6"/>
        <vers num="1.0.7"/>
        <vers num="1.0.8"/>
        <vers num="1.0.9"/>
        <vers num="1.1" edition="alpha"/>
        <vers num="1.1" edition="beta"/>
        <vers num="1.1.1"/>
        <vers num="1.1.2"/>
        <vers num="1.1.6"/>
        <vers num="1.1.7" prev="1"/>
      </prod>
      <prod name="thunderbird" vendor="mozilla">
        <vers num="0.1"/>
        <vers num="0.5"/>
        <vers num="0.6"/>
        <vers num="0.7"/>
        <vers num="0.8"/>
        <vers num="0.9"/>
        <vers num="1.0"/>
        <vers num="1.0.2"/>
        <vers num="1.0.5"/>
        <vers num="1.0.6"/>
        <vers num="1.0.8"/>
        <vers num="1.5"/>
        <vers num="1.5.0.2"/>
        <vers num="1.5.0.4"/>
        <vers num="1.5.0.5"/>
        <vers num="1.5.0.7"/>
        <vers num="1.5.0.9"/>
        <vers num="1.5.0.12"/>
        <vers num="1.5.0.13"/>
        <vers num="1.5.0.14"/>
        <vers num="2.0.0.0"/>
        <vers num="2.0.0.4"/>
        <vers num="2.0.0.5"/>
        <vers num="2.0.0.6"/>
        <vers num="2.0.0.9"/>
        <vers num="2.0.0.11" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0421" seq="2008-0421" published="2008-01-23" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in Invision Gallery 2.0.7 and earlier allows remote attackers to execute arbitrary SQL commands via the album parameter in a rate command.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4966">4966</ref>
    </refs>
    <vuln_soft>
      <prod name="invision_gallery" vendor="invision_power_services">
        <vers num="2.0.7" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0422" seq="2008-0422" published="2008-01-23" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in mail.php in boastMachine (aka bMachine) 3.1 and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3563">3563</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486737/100/0/threaded">20080121 boastMachine &lt;=3.1 SQL Injection Vulnerbility</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/498521/100/0/threaded">20081120 boastMachine v3.1 Remote Sql Injection</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27369">27369</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/32379">32379</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0227">ADV-2008-0227</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39813">boastmachine-mail-sql-injection(39813)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4952">4952</ref>
    </refs>
    <vuln_soft>
      <prod name="boastmachine" vendor="boastmachine">
        <vers num="3.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0423" seq="2008-0423" published="2008-01-23" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple PHP remote file inclusion vulnerabilities in Lama Software allow remote attackers to execute arbitrary PHP code via a URL in the MY_CONF[classRoot] parameter to (1) inc.steps.access_error.php, (2) inc.steps.check_login.php, or (3) inc.steps.init_system.php in admin/functions/.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27380">27380</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0230">ADV-2008-0230</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39821">lamasoftware-myconf-file-include(39821)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4955">4955</ref>
    </refs>
    <vuln_soft>
      <prod name="lama_software" vendor="lama">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0424" seq="2008-0424" published="2008-01-23" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in blog.php in Mooseguy Blog System (MGBS) 1.0 allows remote attackers to execute arbitrary SQL commands via the month parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27377">27377</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0226">ADV-2008-0226</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39816">mooseguy-blog-sql-injection(39816)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4951">4951</ref>
    </refs>
    <vuln_soft>
      <prod name="mgbs" vendor="mooseguy_blog_system">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0425" seq="2008-0425" published="2008-01-23" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Absolute path traversal vulnerability in explorerdir.php in Frimousse 0.0.2 allows remote attackers to read arbitrary files and list arbitrary directories via a full pathname in the name parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27385">27385</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0216">ADV-2008-0216</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39797">frimousse-explorerdir-directory-traversal(39797)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4943">4943</ref>
    </refs>
    <vuln_soft>
      <prod name="frimousse" vendor="frimousse">
        <vers num="0.0.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0426" seq="2008-0426" published="2008-01-23" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in submit.php in PacerCMS before 0.6.1 allow remote attackers to inject arbitrary web script or HTML via the (1) name, (2) headline, or (3) text field in a message.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://pacercms.sourceforge.net/index.php/2008/01/21/pacercms-061-streamlines-code-base-addresses-security-issue/">http://pacercms.sourceforge.net/index.php/2008/01/21/pacercms-061-streamlines-code-base-addresses-security-issue/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486796/100/0/threaded">20080122 PacerCMS Multiple Vulnerabilities (XSS/SQL)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27386" patch="1">27386</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39832">pacercms-submit-xss(39832)</ref>
    </refs>
    <vuln_soft>
      <prod name="pacercms" vendor="pacercms">
        <vers num="0.6.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0427" seq="2008-0427" published="2008-01-23" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in file.php in bloofoxCMS 0.3 allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugreport.ir/?/27">http://bugreport.ir/?/27</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=120093005310107&amp;w=2">20080120 Bloofox CMS SQL Injection (Authentication bypass) , Source code</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486714/100/0/threaded">20080120 Bloofox CMS SQL Injection (Authentication bypass) , Source codedisclosure</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27361">27361</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0218">ADV-2008-0218</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39795">bloofoxcms-file-directory-traversal(39795)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4945">4945</ref>
    </refs>
    <vuln_soft>
      <prod name="bloofoxcms" vendor="bloo">
        <vers num="0.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0428" seq="2008-0428" published="2008-01-23" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in the login function in system/class_permissions.php in bloofoxCMS 0.3 allow remote attackers to execute arbitrary SQL commands via the (1) username or (2) password parameter to admin/index.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugreport.ir/?/27">http://bugreport.ir/?/27</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=120093005310107&amp;w=2">20080120 Bloofox CMS SQL Injection (Authentication bypass) , Source code</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486714/100/0/threaded">20080120 Bloofox CMS SQL Injection (Authentication bypass) , Source codedisclosure</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27361">27361</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0218">ADV-2008-0218</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39794">bloofoxcms-index-sql-injection(39794)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4945">4945</ref>
    </refs>
    <vuln_soft>
      <prod name="bloofoxcms" vendor="bloofoxcms">
        <vers num="0.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0429" seq="2008-0429" published="2008-01-23" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in AlstraSoft Forum Pay Per Post Exchange 2.0 allows remote attackers to execute arbitrary SQL commands via the catid parameter in a forum_catview action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27381">27381</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0231">ADV-2008-0231</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39820">alstrasoft-indexphp-sql-injection(39820)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4956">4956</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/6401">6401</ref>
    </refs>
    <vuln_soft>
      <prod name="forum_pay_per_post_exchange" vendor="alstrasoft">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0430" seq="2008-0430" published="2008-01-23" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in form.php in 360 Web Manager 3.0 allows remote attackers to execute arbitrary SQL commands via the IDFM parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27364">27364</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0217">ADV-2008-0217</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39796">360web-form-sql-injection(39796)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4944">4944</ref>
    </refs>
    <vuln_soft>
      <prod name="360_web_manager" vendor="360_web_manager">
        <vers num="3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0431" seq="2008-0431" published="2008-01-23" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in administrator/download.php in IDMOS (aka Phoenix) 1.0 allows remote attackers to read arbitrary files via a .. (dot dot) in the fileName parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27379">27379</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0229">ADV-2008-0229</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39823">idmos-download-directory-traversal(39823)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4954">4954</ref>
    </refs>
    <vuln_soft>
      <prod name="idmos_cms" vendor="idmos">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0432" seq="2008-0432" published="2008-01-23" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php in phpAutoVideo 2.21 and earlier allows remote attackers to inject arbitrary web script or HTML via the cat parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3567">3567</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486591/100/0/threaded">20080118 Agares PhpAutoVideo 2.21(XSS/RFI) Multiple Remote Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27346">27346</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0225">ADV-2008-0225</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39771">phpautovideo-index-xss(39771)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpautovideo" vendor="agares_media">
        <vers num="2.21" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0433" seq="2008-0433" published="2008-01-23" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in theme/phpAutoVideo/LightTwoOh/sidebar.php in Agares phpAutoVideo 2.21 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the loadpage parameter, a different vector than CVE-2007-6614.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3567">3567</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486591/100/0/threaded">20080118 Agares PhpAutoVideo 2.21(XSS/RFI) Multiple Remote Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27346">27346</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0225">ADV-2008-0225</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39770">phpautovideo-sidebar-file-include(39770)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpautovideo" vendor="agares_media">
        <vers num="2.21" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0434" seq="2008-0434" published="2008-01-23" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Format string vulnerability in the AXIMilter module in AXIGEN Mail Server 5.0.2 allows remote attackers to execute arbitrary code via format string specifiers in the CNHO command.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059788.html">20080120 AXIGEN 5.0.x AXIMilter Format String Exploit</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3570">3570</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486722/100/0/threaded">20080120 AXIGEN 5.0.x AXIMilter Format String Exploit</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27363">27363</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0237">ADV-2008-0237</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39803">axigen-aximilter-format-string(39803)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4947">4947</ref>
    </refs>
    <vuln_soft>
      <prod name="axigen_mail_server" vendor="gecad_technologies">
        <vers num="5.0.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0435" seq="2008-0435" published="2008-01-23" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in index.php in OZJournals 2.1.1 allows remote attackers to read portions of arbitrary files via a .. (dot dot) in the id parameter in a printpreview action.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27375">27375</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0228">ADV-2008-0228</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39815">ozjournals-id-directory-traversal(39815)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4953">4953</ref>
    </refs>
    <vuln_soft>
      <prod name="ozjournals" vendor="ozjournals">
        <vers num="2.1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0436" seq="2008-0436" published="2008-01-23" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in profile-upload/upload.asp in PD9 Software MegaBBS 1.5.14b allows remote attackers to inject arbitrary web script or HTML via the target parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3565">3565</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486723/100/0/threaded">20080120 MegaBBS ASP Forum Cross-Site Scripting</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27368">27368</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39812">megabbs-upload-xss(39812)</ref>
    </refs>
    <vuln_soft>
      <prod name="megabbs" vendor="pd9_software">
        <vers num="1.5.14b"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0437" seq="2008-0437" published="2008-01-23" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple buffer overflows in the WebHPVCInstall.HPVirtualRooms14 ActiveX control in HPVirtualRooms14.dll 1.0.0.100, as used in the installation process for HP Virtual Rooms, allow remote attackers to execute arbitrary code via a long (1) AuthenticationURL, (2) PortalAPIURL, or (3) cabroot property value.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://marc.info/?l=full-disclosure&amp;m=120098751528333&amp;w=2">20080122 HP Virtual Rooms WebHPVCInstall Control Multiple Buffer Overflows</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27384">27384</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0236">ADV-2008-0236</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39836">hpvirtualrooms-hpvirtualrooms14-activex-bo(39836)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4959">4959</ref>
    </refs>
    <vuln_soft>
      <prod name="virtual_rooms" vendor="hp">
        <vers num="1.0.0.100"/>
      </prod>
      <prod name="activex" vendor="microsoft">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0438" seq="2008-0438" published="2008-01-23" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the font rendering functionality in Novemberborn sIFR 2.0.2 allows remote attackers to inject arbitrary web script or HTML via the txt parameter to a Flash (SWF) file, as demonstrated by fonts/FuturaLt.swf.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://novemberborn.net/sifr/2.0.3">http://novemberborn.net/sifr/2.0.3</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3571">3571</ref>
      <ref source="MISC" url="http://www.procheckup.com/Vulnerability_PR07-38.php">http://www.procheckup.com/Vulnerability_PR07-38.php</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486787/100/0/threaded">20080122 PR07-38: XSS on sIFR</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486829/100/0/threaded">20080122 Re: PR07-38: XSS on sIFR</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487585/100/200/threaded">20080205 Re: PR07-38: XSS on sIFR</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27394" patch="1">27394</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39835">sifr-fontname-xss(39835)</ref>
    </refs>
    <vuln_soft>
      <prod name="sifr" vendor="novemberborn">
        <vers num="2.0.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0439" seq="2008-0439" published="2008-01-23" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in templates/default/admincp/attachments_header.php in DeluxeBB 1.1 allows remote attackers to inject arbitrary web script or HTML via the lang_listofmatches parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3564">3564</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486804/100/0/threaded">20080122 DeluxeBB 1.1 XSS Vulnerabilitie</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27401">27401</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39829">deluxbb-attachmentsheader-xss(39829)</ref>
    </refs>
    <vuln_soft>
      <prod name="deluxebb" vendor="deluxebb">
        <vers num="1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0440" seq="2008-0440" published="2008-01-23" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">AlstraSoft Forum Pay Per Post Exchange 2.0 stores passwords in cleartext, which makes it easier for attackers to access user accounts.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4956">4956</ref>
    </refs>
    <vuln_soft>
      <prod name="forum_pay_per_post_exchange" vendor="alstrasoft">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0441" seq="2008-0441" published="2008-01-24" modified="2017-08-07" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">IBM Tivoli Business Service Manager (TBSM) 4.1.1 stores passwords in cleartext (1) after external authentication, which triggers writing the password to SM_server.log; and (2) after a reconfig action; which allows local users to obtain sensitive information.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27388">27388</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019250">1019250</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0240">ADV-2008-0240</ref>
      <ref source="CONFIRM" url="http://www-1.ibm.com/support/docview.wss?uid=swg24017939">http://www-1.ibm.com/support/docview.wss?uid=swg24017939</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39822">tbsm-reconfig-information-disclosure(39822)</ref>
    </refs>
    <vuln_soft>
      <prod name="tivoli_business_service_manager" vendor="ibm">
        <vers num="4.1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0442" seq="2008-0442" published="2008-01-24" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in inc/linkbar.php in Small Axe Weblog 0.3.1 allows remote attackers to execute arbitrary PHP code via a URL in the ffile parameter, a different vector than CVE-2008-0376.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27383">27383</ref>
    </refs>
    <vuln_soft>
      <prod name="weblog" vendor="small_axe_solutions">
        <vers num="0.3.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0443" seq="2008-0443" published="2008-01-24" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in the FileUploader.FUploadCtl.1 ActiveX control in FileUploader.dll 2.0.0.2 in Lycos FileUploader Module allows remote attackers to execute arbitrary code via a long HandwriterFilename property value.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27411">27411</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0253">ADV-2008-0253</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39849">lycosfileuploader-fileuploader-activex-bo(39849)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4967">4967</ref>
    </refs>
    <vuln_soft>
      <prod name="fileuploader.dll" vendor="lycos">
        <vers num="2.0.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0444" seq="2008-0444" published="2008-01-24" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Electronic Logbook (ELOG) before 2.7.0 allows remote attackers to inject arbitrary web script or HTML via subtext parameter to unspecified components.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://midas.psi.ch/elog/download/ChangeLog">http://midas.psi.ch/elog/download/ChangeLog</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27399" patch="1">27399</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0265">ADV-2008-0265</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39828">elog-subtext-xss(39828)</ref>
    </refs>
    <vuln_soft>
      <prod name="elog" vendor="elog">
        <vers num="1.0.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.4"/>
        <vers num="1.0.5"/>
        <vers num="1.1.0"/>
        <vers num="1.1.1"/>
        <vers num="1.1.2"/>
        <vers num="1.1.3"/>
        <vers num="1.2.0"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2"/>
        <vers num="1.2.3"/>
        <vers num="1.2.4"/>
        <vers num="1.2.5"/>
        <vers num="1.2.6"/>
        <vers num="1.3.0"/>
        <vers num="1.3.1"/>
        <vers num="1.3.2"/>
        <vers num="1.3.3"/>
        <vers num="1.3.4"/>
        <vers num="1.3.5"/>
        <vers num="1.3.6"/>
        <vers num="2.0.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
        <vers num="2.0.4"/>
        <vers num="2.0.5"/>
        <vers num="2.1.0"/>
        <vers num="2.1.1"/>
        <vers num="2.1.2"/>
        <vers num="2.1.3"/>
        <vers num="2.2.0"/>
        <vers num="2.2.1"/>
        <vers num="2.2.2"/>
        <vers num="2.2.3"/>
        <vers num="2.2.4"/>
        <vers num="2.2.5"/>
        <vers num="2.3.0"/>
        <vers num="2.3.1"/>
        <vers num="2.3.2"/>
        <vers num="2.3.3"/>
        <vers num="2.3.4"/>
        <vers num="2.3.5"/>
        <vers num="2.3.6"/>
        <vers num="2.3.7"/>
        <vers num="2.3.8"/>
        <vers num="2.3.9"/>
        <vers num="2.4.0"/>
        <vers num="2.4.1"/>
        <vers num="2.5.0"/>
        <vers num="2.5.1"/>
        <vers num="2.5.2"/>
        <vers num="2.5.3"/>
        <vers num="2.5.4"/>
        <vers num="2.5.5"/>
        <vers num="2.5.6"/>
        <vers num="2.5.7"/>
        <vers num="2.5.8"/>
        <vers num="2.5.9"/>
        <vers num="2.6.0"/>
        <vers num="2.6.1"/>
        <vers num="2.6.2"/>
        <vers num="2.6.3"/>
        <vers num="2.6.4"/>
        <vers num="2.6.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0445" seq="2008-0445" published="2008-01-24" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The replace_inline_img function in elogd in Electronic Logbook (ELOG) before 2.7.1 allows remote attackers to cause a denial of service (infinite loop) via crafted logbook entries.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27399" patch="1">27399</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0265">ADV-2008-0265</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39824">elog-elogd-logbook-dos(39824)</ref>
    </refs>
    <vuln_soft>
      <prod name="elog" vendor="elog">
        <vers num="1.0.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.4"/>
        <vers num="1.0.5"/>
        <vers num="1.1.0"/>
        <vers num="1.1.1"/>
        <vers num="1.1.2"/>
        <vers num="1.1.3"/>
        <vers num="1.2.0"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2"/>
        <vers num="1.2.3"/>
        <vers num="1.2.4"/>
        <vers num="1.2.5"/>
        <vers num="1.2.6"/>
        <vers num="1.3.0"/>
        <vers num="1.3.1"/>
        <vers num="1.3.2"/>
        <vers num="1.3.3"/>
        <vers num="1.3.4"/>
        <vers num="1.3.5"/>
        <vers num="1.3.6"/>
        <vers num="2.0.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
        <vers num="2.0.4"/>
        <vers num="2.0.5"/>
        <vers num="2.1.0"/>
        <vers num="2.1.1"/>
        <vers num="2.1.2"/>
        <vers num="2.1.3"/>
        <vers num="2.2.0"/>
        <vers num="2.2.1"/>
        <vers num="2.2.2"/>
        <vers num="2.2.3"/>
        <vers num="2.2.4"/>
        <vers num="2.2.5"/>
        <vers num="2.3.0"/>
        <vers num="2.3.1"/>
        <vers num="2.3.2"/>
        <vers num="2.3.3"/>
        <vers num="2.3.4"/>
        <vers num="2.3.5"/>
        <vers num="2.3.6"/>
        <vers num="2.3.7"/>
        <vers num="2.3.8"/>
        <vers num="2.3.9"/>
        <vers num="2.4.0"/>
        <vers num="2.4.1"/>
        <vers num="2.5.0"/>
        <vers num="2.5.1"/>
        <vers num="2.5.2"/>
        <vers num="2.5.3"/>
        <vers num="2.5.4"/>
        <vers num="2.5.5"/>
        <vers num="2.5.6"/>
        <vers num="2.5.7"/>
        <vers num="2.5.8"/>
        <vers num="2.5.9"/>
        <vers num="2.6.0"/>
        <vers num="2.6.1"/>
        <vers num="2.6.2"/>
        <vers num="2.6.3"/>
        <vers num="2.6.4"/>
        <vers num="2.6.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0446" seq="2008-0446" published="2008-01-24" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in voircom.php in LulieBlog 1.02 allows remote attackers to execute arbitrary SQL commands via the id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27416">27416</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39854">lulieblog-voircom-sql-injection(39854)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4969">4969</ref>
    </refs>
    <vuln_soft>
      <prod name="lulieblog" vendor="julian_pawlowski">
        <vers num="1.02"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0447" seq="2008-0447" published="2008-01-24" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in Foojan WMS PHP Weblog 1.0 allows remote attackers to execute arbitrary SQL commands via the story parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27415">27415</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39855">foojanwms-index-sql-injection(39855)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4968">4968</ref>
    </refs>
    <vuln_soft>
      <prod name="php_weblog" vendor="foojan">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0448" seq="2008-0448" published="2008-01-24" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in utils/class_HTTPRetriever.php in phpSearch allows remote attackers to execute arbitrary PHP code via a URL in the libcurlemuinc parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=120093067011293&amp;w=2">20080120 Php Search Remote Inclusion</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39805">phpsearch-classhttpretriever-file-include(39805)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpsearch" vendor="cybergl_dev_team">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0449" seq="2008-0449" published="2008-01-24" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in paypalresult.asp in VP-ASP Shopping Cart 6.50 and earlier allows remote attackers to execute arbitrary SQL commands via unspecified vectors.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27347" patch="1">27347</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39811">vpasp-paypalresult-sql-injection(39811)</ref>
    </refs>
    <vuln_soft>
      <prod name="vp_asp" vendor="rocksalt_international">
        <vers num="4.00"/>
        <vers num="4.50"/>
        <vers num="5.00"/>
        <vers num="5.50"/>
        <vers num="6.00"/>
        <vers num="6.50"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0450" seq="2008-0450" published="2008-01-24" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple PHP remote file inclusion vulnerabilities in BLOG:CMS 4.2.1.c allow remote attackers to execute arbitrary PHP code via a URL in the (1) DIR_PLUGINS parameter to (a) index.php, and the (2) DIR_LIBS parameter to (b) media.php and (c) xmlrpc/server.php in admin/.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3576">3576</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486743/100/0/threaded">20080121 BLOG:CMS 4.2.1.c (DIR_PLUGINS) Multiple Remote File Include</ref>
    </refs>
    <vuln_soft>
      <prod name="blog_cms" vendor="blog_cms">
        <vers num="4.2.1_c"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0451" seq="2008-0451" published="2008-01-24" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in PacerCMS 0.6 allow remote authenticated users to execute arbitrary SQL commands via the id parameter to (1) siteadmin/article-edit.php; and unspecified parameters to (2) submitted-edit.php, (3) page-edit.php, (4) section-edit.php, (5) staff-edit.php, and (6) staff-access.php in siteadmin/.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://pacercms.sourceforge.net/index.php/2008/01/21/pacercms-061-streamlines-code-base-addresses-security-issue/" patch="1">http://pacercms.sourceforge.net/index.php/2008/01/21/pacercms-061-streamlines-code-base-addresses-security-issue/</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3574">3574</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486796/100/0/threaded">20080122 PacerCMS Multiple Vulnerabilities (XSS/SQL)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27397" patch="1">27397</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39833">pacercms-articleedit-sql-injection(39833)</ref>
    </refs>
    <vuln_soft>
      <prod name="pacercms" vendor="pacercms">
        <vers num="0.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0452" seq="2008-0452" published="2008-01-24" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in articles.php in Siteman 1.1.9 allows remote attackers to read arbitrary files via directory traversal sequences in the cat parameter in a viewart action.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27422">27422</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4973">4973</ref>
    </refs>
    <vuln_soft>
      <prod name="siteman" vendor="siteman">
        <vers num="1.1.9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0453" seq="2008-0453" published="2008-01-24" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in list.php in Easysitenetwork Recipe allows remote attackers to execute arbitrary SQL commands via the categoryid parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27405">27405</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39853">easysitenetworkrecipe-list-sql-injection(39853)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4960">4960</ref>
    </refs>
    <vuln_soft>
      <prod name="recipe_website_script" vendor="easysitenetwork">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0454" seq="2008-0454" published="2008-01-24" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Cross-zone scripting vulnerability in the Internet Explorer web control in Skype 3.6.0.244, and earlier 3.5.x and 3.6.x versions, on Windows allows user-assisted remote attackers to inject arbitrary web script or HTML in the Local Machine Zone via the Title field of a (1) Dailymotion and possibly (2) Metacafe movie in the Skype video gallery, accessible through a search within the "Add video to chat" dialog, aka "videomood XSS."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2008-01/0337.html">20080117 Skype videomood XSS</ref>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2008-01/0363.html">20080117 Re: Skype videomood XSS</ref>
      <ref source="MISC" url="http://aviv.raffon.net/2008/01/17/SkypeCrosszoneScriptingVulnerability.aspx">http://aviv.raffon.net/2008/01/17/SkypeCrosszoneScriptingVulnerability.aspx</ref>
      <ref source="CONFIRM" url="http://share.skype.com/sites/security/2008/01/skype_cross_zone_scripting_vul.html">http://share.skype.com/sites/security/2008/01/skype_cross_zone_scripting_vul.html</ref>
      <ref source="CONFIRM" url="http://skype.com/security/skype-sb-2008-001.html">http://skype.com/security/skype-sb-2008-001.html</ref>
      <ref source="CONFIRM" url="http://skype.com/security/skype-sb-2008-001-update1.html">http://skype.com/security/skype-sb-2008-001-update1.html</ref>
      <ref source="MISC" url="http://www.critical.lt/?opinions/show/1470">http://www.critical.lt/?opinions/show/1470</ref>
      <ref source="MISC" url="http://www.gnucitizen.org/blog/vulnerabilities-in-skype">http://www.gnucitizen.org/blog/vulnerabilities-in-skype</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/248184">VU#248184</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486512/100/0/threaded">20080117 RE: Skype videomood XSS</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27338">27338</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0194">ADV-2008-0194</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39754">skype-addvideotochat-code-execution(39754)</ref>
    </refs>
    <vuln_soft>
      <prod name="ie" vendor="microsoft">
        <vers num=""/>
      </prod>
      <prod name="skype" vendor="skype_technologies">
        <vers num="3.5"/>
        <vers num="3.6"/>
        <vers num="3.6.0.244" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0455" seq="2008-0455" published="2008-01-24" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the mod_negotiation module in the Apache HTTP Server 2.2.6 and earlier in the 2.2.x series, 2.0.61 and earlier in the 2.0.x series, and 1.3.39 and earlier in the 1.3.x series allows remote authenticated users to inject arbitrary web script or HTML by uploading a file with a name containing XSS sequences and a file extension, which leads to injection within a (1) "406 Not Acceptable" or (2) "300 Multiple Choices" HTTP response when the extension is omitted in a request for the file.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2012-1591.html">RHSA-2012:1591</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2012-1592.html">RHSA-2012:1592</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2012-1594.html">RHSA-2012:1594</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2013-0130.html">RHSA-2013:0130</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200803-19.xml">GLSA-200803-19</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3575">3575</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019256">1019256</ref>
      <ref source="MISC" url="http://www.mindedsecurity.com/MSA01150108.html">http://www.mindedsecurity.com/MSA01150108.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486847/100/0/threaded">20080122 Apache mod_negotiation Xss and Http Response Splitting</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27409">27409</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39867">apache-modnegotiation-xss(39867)</ref>
      <ref source="MLIST" url="https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E">[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html</ref>
      <ref source="MLIST" url="https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E">[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html</ref>
    </refs>
    <vuln_soft>
      <prod name="http_server" vendor="apache">
        <vers num="-"/>
        <vers num="1.3"/>
        <vers num="1.3.1"/>
        <vers num="1.3.3"/>
        <vers num="1.3.11"/>
        <vers num="1.3.12"/>
        <vers num="1.3.14"/>
        <vers num="1.3.17"/>
        <vers num="1.3.18"/>
        <vers num="1.3.19"/>
        <vers num="1.3.20"/>
        <vers num="1.3.22"/>
        <vers num="1.3.23"/>
        <vers num="1.3.24"/>
        <vers num="1.3.25"/>
        <vers num="1.3.26"/>
        <vers num="1.3.27"/>
        <vers num="1.3.28"/>
        <vers num="1.3.29"/>
        <vers num="1.3.31"/>
        <vers num="1.3.32"/>
        <vers num="1.3.33"/>
        <vers num="1.3.34"/>
        <vers num="1.3.35"/>
        <vers num="1.3.36"/>
        <vers num="1.3.37"/>
        <vers num="1.3.39"/>
        <vers num="2.0"/>
        <vers num="2.0.9"/>
        <vers num="2.0.28" edition="beta"/>
        <vers num="2.0.32"/>
        <vers num="2.0.35"/>
        <vers num="2.0.36"/>
        <vers num="2.0.37"/>
        <vers num="2.0.38"/>
        <vers num="2.0.39"/>
        <vers num="2.0.40"/>
        <vers num="2.0.41"/>
        <vers num="2.0.42"/>
        <vers num="2.0.43"/>
        <vers num="2.0.44"/>
        <vers num="2.0.45"/>
        <vers num="2.0.46"/>
        <vers num="2.0.47"/>
        <vers num="2.0.48"/>
        <vers num="2.0.49"/>
        <vers num="2.0.50"/>
        <vers num="2.0.51"/>
        <vers num="2.0.52"/>
        <vers num="2.0.53"/>
        <vers num="2.0.54"/>
        <vers num="2.0.55"/>
        <vers num="2.0.56"/>
        <vers num="2.0.58"/>
        <vers num="2.0.59"/>
        <vers num="2.0.60"/>
        <vers num="2.0.61"/>
        <vers num="2.2.0"/>
        <vers num="2.2.2"/>
        <vers num="2.2.3"/>
        <vers num="2.2.4"/>
        <vers num="2.2.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0456" seq="2008-0456" published="2008-01-24" modified="2019-08-15" severity="Low" CVSS_version="2.0" CVSS_score="2.6" CVSS_base_score="2.6" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">CRLF injection vulnerability in the mod_negotiation module in the Apache HTTP Server 2.2.6 and earlier in the 2.2.x series, 2.0.61 and earlier in the 2.0.x series, and 1.3.39 and earlier in the 1.3.x series allows remote authenticated users to inject arbitrary HTTP headers and conduct HTTP response splitting attacks by uploading a file with a multi-line name containing HTTP header sequences and a file extension, which leads to injection within a (1) "406 Not Acceptable" or (2) "300 Multiple Choices" HTTP response when the extension is omitted in a request for the file.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" adv="1">APPLE-SA-2009-05-12</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2013-0130.html" adv="1">RHSA-2013:0130</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200803-19.xml" adv="1">GLSA-200803-19</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3575" adv="1">3575</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019256" adv="1">1019256</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3549" adv="1">http://support.apple.com/kb/HT3549</ref>
      <ref source="MISC" url="http://www.mindedsecurity.com/MSA01150108.html">http://www.mindedsecurity.com/MSA01150108.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486847/100/0/threaded" adv="1">20080122 Apache mod_negotiation Xss and Http Response Splitting</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27409" adv="1">27409</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA09-133A.html" adv="1">TA09-133A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/1297" adv="1">ADV-2009-1297</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39893" adv="1">apache-modnegotiation-response-splitting(39893)</ref>
      <ref source="MLIST" url="https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E">[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html</ref>
      <ref source="MLIST" url="https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E">[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html</ref>
    </refs>
    <vuln_soft>
      <prod name="http_server" vendor="apache">
        <vers num="1.3.0"/>
        <vers num="1.3.1"/>
        <vers num="1.3.1.1"/>
        <vers num="1.3.2"/>
        <vers num="1.3.3"/>
        <vers num="1.3.4"/>
        <vers num="1.3.5"/>
        <vers num="1.3.6"/>
        <vers num="1.3.7"/>
        <vers num="1.3.8"/>
        <vers num="1.3.9"/>
        <vers num="1.3.10"/>
        <vers num="1.3.11"/>
        <vers num="1.3.12"/>
        <vers num="1.3.13"/>
        <vers num="1.3.14"/>
        <vers num="1.3.15"/>
        <vers num="1.3.16"/>
        <vers num="1.3.17"/>
        <vers num="1.3.18"/>
        <vers num="1.3.19"/>
        <vers num="1.3.20"/>
        <vers num="1.3.22"/>
        <vers num="1.3.23"/>
        <vers num="1.3.24"/>
        <vers num="1.3.25"/>
        <vers num="1.3.26"/>
        <vers num="1.3.27"/>
        <vers num="1.3.28"/>
        <vers num="1.3.29"/>
        <vers num="1.3.30"/>
        <vers num="1.3.31"/>
        <vers num="1.3.32"/>
        <vers num="1.3.33"/>
        <vers num="1.3.34"/>
        <vers num="1.3.35"/>
        <vers num="1.3.36"/>
        <vers num="1.3.37"/>
        <vers num="1.3.38"/>
        <vers num="1.3.39"/>
        <vers num="2.0.0"/>
        <vers num="2.0.9"/>
        <vers num="2.0.28" edition="beta"/>
        <vers num="2.0.32" edition="beta"/>
        <vers num="2.0.34" edition="beta"/>
        <vers num="2.0.35"/>
        <vers num="2.0.36"/>
        <vers num="2.0.37"/>
        <vers num="2.0.38"/>
        <vers num="2.0.39"/>
        <vers num="2.0.40"/>
        <vers num="2.0.41"/>
        <vers num="2.0.42"/>
        <vers num="2.0.43"/>
        <vers num="2.0.44"/>
        <vers num="2.0.45"/>
        <vers num="2.0.46"/>
        <vers num="2.0.47"/>
        <vers num="2.0.48"/>
        <vers num="2.0.49"/>
        <vers num="2.0.50"/>
        <vers num="2.0.51"/>
        <vers num="2.0.52"/>
        <vers num="2.0.53"/>
        <vers num="2.0.54"/>
        <vers num="2.0.55"/>
        <vers num="2.0.56"/>
        <vers num="2.0.57"/>
        <vers num="2.0.58"/>
        <vers num="2.0.59"/>
        <vers num="2.0.60"/>
        <vers num="2.0.61"/>
        <vers num="2.2.0"/>
        <vers num="2.2.1"/>
        <vers num="2.2.2"/>
        <vers num="2.2.3"/>
        <vers num="2.2.4"/>
        <vers num="2.2.5"/>
        <vers num="2.2.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0457" seq="2008-0457" published="2008-02-07" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unrestricted file upload vulnerability in the FileUpload class running on the Symantec LiveState Apache Tomcat server, as used by Symantec Backup Exec System Recovery Manager 7.0 and 7.0.1, allows remote attackers to upload and execute arbitrary JSP files via unknown vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://seer.entsupport.symantec.com/docs/297171.htm" patch="1">http://seer.entsupport.symantec.com/docs/297171.htm</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487688/100/0/threaded">20080206 ZDI-08-003: Symantec Backup Exec Remote File Upload Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27487">27487</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019303">1019303</ref>
      <ref source="CONFIRM" url="http://www.symantec.com/avcenter/security/Content/2008.02.04.html" patch="1">http://www.symantec.com/avcenter/security/Content/2008.02.04.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0413" adv="1">ADV-2008-0413</ref>
      <ref source="MISC" url="http://www.zerodayinitiative.com/advisories/ZDI-08-003.html">http://www.zerodayinitiative.com/advisories/ZDI-08-003.html</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5078">5078</ref>
    </refs>
    <vuln_soft>
      <prod name="backupexec_system_recovery" vendor="symantec">
        <vers num="7.0"/>
        <vers num="7.01"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0458" seq="2008-0458" published="2008-01-25" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in function/sources.php in SLAED CMS 2.5 Lite allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the newlang parameter to index.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27426">27426</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0308">ADV-2008-0308</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39897">slaedcms-index-file-include(39897)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4975">4975</ref>
    </refs>
    <vuln_soft>
      <prod name="slaed_cms" vendor="slaed">
        <vers num="2.5_lite"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0459" seq="2008-0459" published="2008-01-25" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in update/index.php in Liquid-Silver CMS 0.35, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the update parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27425">27425</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0309">ADV-2008-0309</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39895">liquidsilvercms-index-file-include(39895)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4976">4976</ref>
    </refs>
    <vuln_soft>
      <prod name="liquidsilvercms" vendor="liquidsilvercms">
        <vers num="0.3"/>
        <vers num="0.35"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0460" seq="2008-0460" published="2008-01-25" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in api.php in (1) MediaWiki 1.11 through 1.11.0rc1, 1.10 through 1.10.2, 1.9 through 1.9.4, and 1.8; and (2) the BotQuery extension for MediaWiki 1.7 and earlier; when Internet Explorer is used, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MLIST" url="http://lists.wikimedia.org/pipermail/mediawiki-announce/2008-January/000068.html">[MediaWiki-announce] 20080124 MediaWiki 1.11.1, 1.10.3, 1.9.5 released</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28137">28137</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0280">ADV-2008-0280</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39901">mediawiki-api-xss(39901)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00147.html">FEDORA-2008-2245</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00189.html">FEDORA-2008-2288</ref>
    </refs>
    <vuln_soft>
      <prod name="mediawiki" vendor="mediawiki">
        <vers num="1.7.0"/>
        <vers num="1.8.0"/>
        <vers num="1.8.1"/>
        <vers num="1.8.2"/>
        <vers num="1.8.3"/>
        <vers num="1.8.4"/>
        <vers num="1.9.0"/>
        <vers num="1.9.1"/>
        <vers num="1.9.2"/>
        <vers num="1.9.3"/>
        <vers num="1.9.4"/>
        <vers num="1.10.0"/>
        <vers num="1.10.1"/>
        <vers num="1.10.2"/>
        <vers num="1.11"/>
        <vers num="1.11.0rc1"/>
      </prod>
      <prod name="mediawiki_botquery_ext" vendor="mediawiki">
        <vers num=""/>
      </prod>
      <prod name="ie" vendor="microsoft">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0461" seq="2008-0461" published="2008-01-25" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the Search module in PHP-Nuke 8.0 FINAL and earlier, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the sid parameter in a comments action to modules.php.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27408">27408</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0264">ADV-2008-0264</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39850">phpnuke-index-search-sql-injection(39850)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4965">4965</ref>
    </refs>
    <vuln_soft>
      <prod name="php-nuke" vendor="francisco_burzi">
        <vers num="8.0_final" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0462" seq="2008-0462" published="2008-01-25" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the Archive 5.x before 5.x-1.8 module for Drupal allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://drupal.org/node/213478" patch="1">http://drupal.org/node/213478</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27436">27436</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0278">ADV-2008-0278</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39898">drupal-archive-unspecified-xss(39898)</ref>
    </refs>
    <vuln_soft>
      <prod name="archive_module" vendor="drupal">
        <vers num="5_1.7" prev="1"/>
      </prod>
      <prod name="drupal" vendor="drupal">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0463" seq="2008-0463" published="2008-01-25" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the Workflow 4.7.x before 4.7.x-1.2 and 5.x before 5.x-1.2 module for Drupal allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving node properties.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://drupal.org/node/213473" patch="1">http://drupal.org/node/213473</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27444">27444</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0279">ADV-2008-0279</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39896">workflow-messages-xss(39896)</ref>
    </refs>
    <vuln_soft>
      <prod name="workflow" vendor="drupal">
        <vers num="4.7.x-1.1" prev="1"/>
        <vers num="5.x-1.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0464" seq="2008-0464" published="2008-01-25" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in archiv.cgi in absofort aconon Mail 2007 Enterprise SQL 11.7.0 and Mail 2004 Enterprise SQL 11.5.1 allows remote attackers to read arbitrary files via a .. (dot dot) in the template parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://burnachurch.com/67/directory-traversal-luecke-in-aconon-mail/">http://burnachurch.com/67/directory-traversal-luecke-in-aconon-mail/</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059856.html">20080124 Directory Traversal Vulnerability in Aconon Mail</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27427">27427</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0310">ADV-2008-0310</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4977">4977</ref>
    </refs>
    <vuln_soft>
      <prod name="aconon_mail_enterprise_sql" vendor="absofort">
        <vers num="11.5.1" edition="2004"/>
        <vers num="11.7.0" edition="2007"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0465" seq="2008-0465" published="2008-01-25" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in optimizer.php in Seagull 0.6.3 allows remote attackers to read arbitrary files via a .. (dot dot) in the files parameter.</descript>
    </desc>
    <sols>
      <sol source="nvd">The vendor has released a patch for 0.6.3.  A patch can be found at the following location: 

http://seagullproject.org/download/

</sol>
    </sols>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://seagullproject.org/publisher/articleview/action/view/frmArticleID/98/">http://seagullproject.org/publisher/articleview/action/view/frmArticleID/98/</ref>
      <ref source="VIM" url="http://www.attrition.org/pipermail/vim/2008-January/001891.html">20080129 Seagull 0.6.3 Remote File Disclosure Vulnerability fixed</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27437">27437</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0311">ADV-2008-0311</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39902">seagullstable-optimizer-directory-traversal(39902)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4980">4980</ref>
    </refs>
    <vuln_soft>
      <prod name="seagull" vendor="seagullproject.org">
        <vers num="0.6.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0466" seq="2008-0466" published="2008-01-28" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Web Wiz RTE_file_browser.asp in, as used in Web Wiz Rich Text Editor 4.0, Web Wiz Forums 9.07, and Web Wiz Newspad 1.02, does not require authentication, which allows remote attackers to list directories and read files.  NOTE: this can be leveraged for listings outside the configured directory tree by exploiting a separate directory traversal vulnerability.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3584">3584</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019267">1019267</ref>
      <ref source="MISC" url="http://www.bugreport.ir/?/29">http://www.bugreport.ir/?/29</ref>
      <ref source="MISC" url="http://www.bugreport.ir/?/31">http://www.bugreport.ir/?/31</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486866/100/0/threaded">20080123 Web Wiz Forums Directory traversal</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486868/100/0/threaded">20080123 Web Wiz Rich Text Editor Directory traversal + HTM/HTML filecreation on the server</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27419">27419</ref>
      <ref source="MISC" url="http://www.webwizguide.com/webwizrichtexteditor/kb/release_notes.asp">http://www.webwizguide.com/webwizrichtexteditor/kb/release_notes.asp</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4970">4970</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4971">4971</ref>
    </refs>
    <vuln_soft>
      <prod name="web_wiz_forums" vendor="webwiz">
        <vers num="9.07"/>
      </prod>
      <prod name="web_wiz_newspad" vendor="webwiz">
        <vers num="1.02"/>
      </prod>
      <prod name="web_wiz_rich_text_editor" vendor="webwiz">
        <vers num="4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0467" seq="2008-0467" published="2008-01-28" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in Firebird before 2.0.4, and 2.1.x before 2.1.0 RC1, might allow remote attackers to execute arbitrary code via a long username.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200803-02.xml">GLSA-200803-02</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?group_id=9028&amp;release_id=570800">http://sourceforge.net/project/shownotes.php?group_id=9028&amp;release_id=570800</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=570816&amp;group_id=9028">http://sourceforge.net/project/shownotes.php?release_id=570816&amp;group_id=9028</ref>
      <ref source="CONFIRM" url="http://tracker.firebirdsql.org/browse/CORE-1603">http://tracker.firebirdsql.org/browse/CORE-1603</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1529">DSA-1529</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27467">27467</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019277">1019277</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0300">ADV-2008-0300</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39981">firebird-username-bo(39981)</ref>
    </refs>
    <vuln_soft>
      <prod name="firebird" vendor="firebirdsql">
        <vers num="2.0.3" prev="1"/>
        <vers num="2.1" prev="1" edition="rc1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0468" seq="2008-0468" published="2008-01-29" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in category.php in Flinx 1.3 and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27448">27448</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0313">ADV-2008-0313</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39930">flinx-category-sql-injection(39930)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4985">4985</ref>
    </refs>
    <vuln_soft>
      <prod name="flinx" vendor="flinx">
        <vers num="1.3" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0469" seq="2008-0469" published="2008-01-29" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in Tiger Php News System (TPNS) 1.0b and earlier allows remote attackers to execute arbitrary SQL commands via the catid parameter in a newscat action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3587">3587</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486961/100/0/threaded">20080124 Tiger PHP News System SQL Injection</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27445">27445</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0312">ADV-2008-0312</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39908">tigerphpnewssystem-catid-sql-injection(39908)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4984">4984</ref>
    </refs>
    <vuln_soft>
      <prod name="tiger_php_news_system" vendor="tiger_php_news_system">
        <vers num="1.0b" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0470" seq="2008-0470" published="2008-01-29" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">A certain ActiveX control in Comodo AntiVirus 2.0 allows remote attackers to execute arbitrary commands via the ExecuteStr method.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27424">27424</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39904">comodo-antivirus-command-execution(39904)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4974">4974</ref>
    </refs>
    <vuln_soft>
      <prod name="comodo_antivirus" vendor="comodo">
        <vers num="2.0"/>
      </prod>
      <prod name="activex" vendor="microsoft">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0471" seq="2008-0471" published="2008-01-29" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site request forgery (CSRF) vulnerability in privmsg.php in phpBB 2.0.22 allows remote attackers to delete private messages (PM) as arbitrary users via a deleteall action.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=463589">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=463589</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3585">3585</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1488">DSA-1488</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487004/100/0/threaded">20080123 phpBB 2.0.22 Remote PM Delete XSRF Vulnerability</ref>
    </refs>
    <vuln_soft>
      <prod name="phpbb" vendor="phpbb">
        <vers num="2.0.22"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0472" seq="2008-0472" published="2008-01-29" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site request forgery (CSRF) vulnerability in modcp.php in Woltlab Burning Board (wBB) 2.3.6 PL2 allows remote attackers to delete threads as moderators or administrators via a thread_del action.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3586">3586</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486884/100/0/threaded">20080123 Woltlab Burning Board 2.3.6 PL2 Remote Delete Thread XSRF Vulnerability</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39878">wbb-modcp-csrf(39878)</ref>
    </refs>
    <vuln_soft>
      <prod name="burning_board" vendor="woltlab">
        <vers num="2.3.6_pl2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0473" seq="2008-0473" published="2008-01-29" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">RTE_popup_save_file.asp in Web Wiz Rich Text Editor 4.0 allows remote attackers to upload (1) .html and (2) .htm files via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3584">3584</ref>
      <ref source="MISC" url="http://www.bugreport.ir/?/31">http://www.bugreport.ir/?/31</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486868/100/0/threaded">20080123 Web Wiz Rich Text Editor Directory traversal + HTM/HTML filecreation on the server</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27419">27419</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27420">27420</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019267">1019267</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4971">4971</ref>
    </refs>
    <vuln_soft>
      <prod name="rich_text_editor" vendor="web_wiz">
        <vers num="4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0474" seq="2008-0474" published="2008-01-29" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in ManageEngine Applications Manager 8.1 build 8100 allow remote attackers to inject arbitrary web script or HTML via the (1) showlink parameter to jsp/DiscoveryProfiles.jsp; the (2) attributeIDs, (3) attributeToSelect, (4) redirectto, and (5) resourceid parameters to (a) jsp/ThresholdActionConfiguration.jsp; the (6) page and (7) redirect parameters to (b) jsp/UpdateGlobalSettings.jsp; and the (8) haid and (9) returnpath parameters to (c) showTile.do.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27443">27443</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39914">manageengine-multiple-xss(39914)</ref>
    </refs>
    <vuln_soft>
      <prod name="applications_manager" vendor="manageengine">
        <vers num="8.1_build_8100"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0475" seq="2008-0475" published="2008-01-29" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">ManageEngine Applications Manager 8.1 build 8100 allows remote attackers to obtain sensitive information ( Home->Summary) via an invalid URI, as demonstrated by the "/-" URI.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27443">27443</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39917">manageengine-home-information-disclosure(39917)</ref>
    </refs>
    <vuln_soft>
      <prod name="applications_manager" vendor="manageengine">
        <vers num="8.1_build_8100"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0476" seq="2008-0476" published="2008-01-29" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">ManageEngine Applications Manager 8.1 build 8100 does not check authentication for monitorType.do and unspecified other pages, which allows remote attackers to obtain sensitive information and change settings via unspecified vectors.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27443">27443</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39915">manageengine-checks-security-bypass(39915)</ref>
    </refs>
    <vuln_soft>
      <prod name="applications_manager" vendor="manageengine">
        <vers num="8.1_build_8100"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0477" seq="2008-0477" published="2008-01-29" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the QMPUpgrade.Upgrade.1 ActiveX control in QMPUpgrade.dll 1.0.0.1 in Move Networks Upgrade Manager allows remote attackers to execute arbitrary code via a long first argument to the Upgrade method.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27438">27438</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019270">1019270</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0274">ADV-2008-0274</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39913">movenetworks-qmpupgrade-bo(39913)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4979">4979</ref>
    </refs>
    <vuln_soft>
      <prod name="move_media_player" vendor="move_networks_inc">
        <vers num="1.0.0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0478" seq="2008-0478" published="2008-01-29" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in index.php in SetCMS 3.6.5 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the set parameter, as demonstrated by sending a certain CLIENT_IP HTTP header in an enter action to index.php, and injecting PHP sequences into files/enter.set, which is then included by index.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27407">27407</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39864">setcms-index-file-include(39864)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4962">4962</ref>
    </refs>
    <vuln_soft>
      <prod name="setcms" vendor="setcms">
        <vers num="3.6.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0479" seq="2008-0479" published="2008-01-29" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in RTE_file_browser.asp in Web Wiz NewsPad 1.02 allows remote attackers to list arbitrary directories, and .txt and .zip files, via a .....\\\ in the sub parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3588">3588</ref>
      <ref source="MISC" url="http://www.bugreport.ir/?/30">http://www.bugreport.ir/?/30</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486869/100/0/threaded">20080123 Web Wiz NewsPad Directory traversal</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27419">27419</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019268">1019268</ref>
      <ref source="CONFIRM" url="http://www.webwizguide.com/webwiznewspad/kb/release_notes.asp">http://www.webwizguide.com/webwiznewspad/kb/release_notes.asp</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39863">newspad-rte-directory-traversal(39863)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4972">4972</ref>
    </refs>
    <vuln_soft>
      <prod name="newspad" vendor="web_wiz">
        <vers num="1.02"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0480" seq="2008-0480" published="2008-01-29" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Multiple directory traversal vulnerabilities in Web Wiz Forums 9.07 and earlier allow remote attackers to list arbitrary directories, and .txt and .zip files, via a .....\\\ in the sub parameter to (1) RTE_file_browser.asp or (2) file_browser.asp.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3589">3589</ref>
      <ref source="MISC" url="http://www.bugreport.ir/?/29">http://www.bugreport.ir/?/29</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486866/100/0/threaded">20080123 Web Wiz Forums Directory traversal</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27419">27419</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019266">1019266</ref>
      <ref source="CONFIRM" url="http://www.webwizguide.com/webwizforums/kb/release_notes.asp">http://www.webwizguide.com/webwizforums/kb/release_notes.asp</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39856">webwiz-rte-filebrowser-directory-traversal(39856)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4970">4970</ref>
    </refs>
    <vuln_soft>
      <prod name="web_wiz_forums" vendor="web_wiz">
        <vers num="9.07" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0481" seq="2008-0481" published="2008-01-29" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in RTE_file_browser.asp in Web Wiz Rich Text Editor 4.0 allows remote attackers to list arbitrary directories, and .txt and .zip files, via a .....\\\ in the sub parameter in a save action.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3584">3584</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019267">1019267</ref>
      <ref source="MISC" url="http://www.bugreport.ir/?/31">http://www.bugreport.ir/?/31</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486868/100/0/threaded">20080123 Web Wiz Rich Text Editor Directory traversal + HTM/HTML filecreation on the server</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27419">27419</ref>
      <ref source="CONFIRM" url="http://www.webwizguide.com/webwizrichtexteditor/kb/release_notes.asp">http://www.webwizguide.com/webwizrichtexteditor/kb/release_notes.asp</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39868">editor-rte-directory-traversal(39868)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4971">4971</ref>
    </refs>
    <vuln_soft>
      <prod name="rich_text_editor" vendor="web_wiz">
        <vers num="4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0485" seq="2008-0485" published="2008-02-05" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Array index error in libmpdemux/demux_mov.c in MPlayer 1.0 rc2 and earlier might allow remote attackers to execute arbitrary code via a QuickTime MOV file with a crafted stsc atom tag.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2008-February/060032.html">20080204 CORE-2008-0122: MPlayer arbitrary pointer dereference</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200803-16.xml">GLSA-200803-16</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3607">3607</ref>
      <ref source="MISC" url="http://www.coresecurity.com/?action=item&amp;id=2102">http://www.coresecurity.com/?action=item&amp;id=2102</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1496">DSA-1496</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:045">MDVSA-2008:045</ref>
      <ref source="CONFIRM" url="http://www.mplayerhq.hu/design7/news.html">http://www.mplayerhq.hu/design7/news.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487500/100/0/threaded">20080204 CORE-2008-0122: MPlayer arbitrary pointer dereference</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27499">27499</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019299">1019299</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0406/references">ADV-2008-0406</ref>
    </refs>
    <vuln_soft>
      <prod name="mplayer" vendor="mplayer">
        <vers num="1.02rc2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0486" seq="2008-0486" published="2008-02-05" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Array index vulnerability in libmpdemux/demux_audio.c in MPlayer 1.0rc2 and SVN before r25917, and possibly earlier versions, as used in Xine-lib 1.1.10, might allow remote attackers to execute arbitrary code via a crafted FLAC tag, which triggers a buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.gentoo.org/show_bug.cgi?id=209106">http://bugs.gentoo.org/show_bug.cgi?id=209106</ref>
      <ref source="CONFIRM" url="http://bugs.xine-project.org/show_bug.cgi?id=38">http://bugs.xine-project.org/show_bug.cgi?id=38</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2008-February/060033.html">20080204 CORE-2007-1218: MPlayer 1.0rc2 buffer overflow vulnerability</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html">SUSE-SR:2008:006</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200802-12.xml">GLSA-200802-12</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200803-16.xml">GLSA-200803-16</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3608">3608</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?group_id=9655&amp;release_id=574735">http://sourceforge.net/project/shownotes.php?group_id=9655&amp;release_id=574735</ref>
      <ref source="MISC" url="http://www.coresecurity.com/?action=item&amp;id=2103">http://www.coresecurity.com/?action=item&amp;id=2103</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1496">DSA-1496</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1536">DSA-1536</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:045">MDVSA-2008:045</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:046">MDVSA-2008:046</ref>
      <ref source="CONFIRM" url="http://www.mplayerhq.hu/design7/news.html">http://www.mplayerhq.hu/design7/news.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487501/100/0/threaded">20080204 CORE-2007-1218: MPlayer 1.0rc2 buffer overflow vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27441">27441</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-635-1">USN-635-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0406/references">ADV-2008-0406</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0421">ADV-2008-0421</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=431541">https://bugzilla.redhat.com/show_bug.cgi?id=431541</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00395.html">FEDORA-2008-1543</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00442.html">FEDORA-2008-1581</ref>
    </refs>
    <vuln_soft>
      <prod name="mplayer" vendor="mplayer">
        <vers num="1.02rc2"/>
      </prod>
      <prod name="xine-lib" vendor="xine">
        <vers num="1.1.10"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0487" seq="2008-0487" published="2008-01-30" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in login.asp in ASPired2Protect allow remote attackers to execute arbitrary SQL commands via the (1) username and (2) password parameters.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3598">3598</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487137/100/0/threaded">20080126 ASPired2Protect bypass</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27474">27474</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39989">aspired2protect-login-sql-injection(39989)</ref>
    </refs>
    <vuln_soft>
      <prod name="aspired2protect" vendor="the_net_guys">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0488" seq="2008-0488" published="2008-01-30" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in tseekdir.cgi in VB Marketing allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the location parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3596">3596</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487174/100/0/threaded">20080128 VB Marketing "tseekdir.cgi" Local File Inclusion</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27475">27475</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39970">vbmarketing-tseekdir-file-include(39970)</ref>
    </refs>
    <vuln_soft>
      <prod name="vb_marketing" vendor="vb_marketing">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0489" seq="2008-0489" published="2008-01-30" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in install.php in Clansphere 2007.4.4 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the lang parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3597">3597</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487132/100/0/threaded">20080127 ClanSphere 2007.4.4 Remote File Disclosure Vulnerability.</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27471">27471</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39977">clansphere-install-directory-traversal(39977)</ref>
    </refs>
    <vuln_soft>
      <prod name="clansphere" vendor="clansphere">
        <vers num="2007.4.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0490" seq="2008-0490" published="2008-01-30" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in functions/editevent.php in the WP-Cal 0.3 plugin for WordPress allows remote attackers to execute arbitrary SQL commands via the id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27465">27465</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0348">ADV-2008-0348</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39966">wpcal-editevent-sql-injection(39966)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4992">4992</ref>
    </refs>
    <vuln_soft>
      <prod name="wp_cal_plugin" vendor="wordpress">
        <vers num="0.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0491" seq="2008-0491" published="2008-01-30" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in fim_rss.php in the fGallery 2.4.1 plugin for WordPress allows remote attackers to execute arbitrary SQL commands via the album parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27464">27464</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0349">ADV-2008-0349</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39964">fgallery-fimrss-sql-injection(39964)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4993">4993</ref>
    </refs>
    <vuln_soft>
      <prod name="fgallery_plugin" vendor="wordpress">
        <vers num="2.4.1"/>
      </prod>
      <prod name="wordpress" vendor="wordpress">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0492" seq="2008-0492" published="2008-01-30" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the Persits.XUpload.2 ActiveX control in XUpload.ocx 3.0.0.4 and earlier in Persits XUpload 3.0 allows remote attackers to execute arbitrary code via a long argument to the AddFile method.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27456">27456</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0315">ADV-2008-0315</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39967">persits-xupload-bo(39967)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4987">4987</ref>
    </refs>
    <vuln_soft>
      <prod name="xupload" vendor="persits">
        <vers num="3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0493" seq="2008-0493" published="2008-01-30" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">fpx.dll 3.9.8.0 in the FlashPix plugin for IrfanView 4.10 allows remote attackers to execute arbitrary code via a crafted FlashPix (.FPX) file, which triggers heap corruption.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27479">27479</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0318">ADV-2008-0318</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40012">irfanview-flashpix-bo(40012)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4998">4998</ref>
    </refs>
    <vuln_soft>
      <prod name="irfanview" vendor="irfanview">
        <vers num="4.10"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0494" seq="2008-0494" published="2008-01-30" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in vpnum/userslist.php in Endian Firewall 2.1.2 allows remote attackers to inject arbitrary web script or HTML via the psearch parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://downloads.securityfocus.com/vulnerabilities/exploits/27477.html">http://downloads.securityfocus.com/vulnerabilities/exploits/27477.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27477">27477</ref>
    </refs>
    <vuln_soft>
      <prod name="firewall" vendor="endian">
        <vers num="2.1.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0495" seq="2008-0495" published="2008-01-30" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Pegasus CIM Server in IBM Hardware Management Console (HMC) 7 R3.2.0 allows remote attackers to cause a denial of service via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27484">27484</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019280">1019280</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0323">ADV-2008-0323</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0638">ADV-2008-0638</ref>
      <ref source="CONFIRM" url="http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4129">http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4129</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40021">hmc-pegasus-cim-dos(40021)</ref>
      <ref source="CONFIRM" url="https://www14.software.ibm.com/webapp/set2/sas/f/hmc/power6/install/v7.Readme.html">https://www14.software.ibm.com/webapp/set2/sas/f/hmc/power6/install/v7.Readme.html</ref>
    </refs>
    <vuln_soft>
      <prod name="hardware_management_console" vendor="ibm">
        <vers num="7.3.2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0496" seq="2008-0496" published="2008-01-30" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php in AmpJuke 0.7.0 allows remote attackers to inject arbitrary web script or HTML via the limit parameter in a search action.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3594">3594</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487258/100/0/threaded">20080129 AmpJuke-0.7.0 (index.php) Xss VuLn.</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27498">27498</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0332">ADV-2008-0332</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40023">juke-index-xss(40023)</ref>
    </refs>
    <vuln_soft>
      <prod name="ampjuke" vendor="ampjuke">
        <vers num="0.7.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0497" seq="2008-0497" published="2008-01-30" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in action.php in Nucleus CMS 3.31 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO, which is not quoted when processing PHP_SELF.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3593">3593</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?group_id=66479&amp;release_id=572117" patch="1">http://sourceforge.net/project/shownotes.php?group_id=66479&amp;release_id=572117</ref>
      <ref source="CONFIRM" url="http://www.nucleuscms.org/item/3047">http://www.nucleuscms.org/item/3047</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487252/100/0/threaded">20080129 Nucleus 3.31 XSS in path</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487255/100/0/threaded">20080129 [!!FIX Information ] Nucleus 3.31 XSS in path</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27492">27492</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0369">ADV-2008-0369</ref>
    </refs>
    <vuln_soft>
      <prod name="nucleus_cms" vendor="nucleus_cms">
        <vers num="3.31"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0498" seq="2008-0498" published="2008-01-30" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in main_bigware_53.tpl.php in Bigware Shop 2.0 allows remote attackers to execute arbitrary SQL commands via the pollid parameter in a results action to main_bigware_53.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27489">27489</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0351">ADV-2008-0351</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40010">bigwareshop-mainbigware-sql-injection(40010)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5002">5002</ref>
    </refs>
    <vuln_soft>
      <prod name="bigware_shop" vendor="bigware">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0499" seq="2008-0499" published="2008-01-30" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in Mambo LaiThai 4.5.5 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?group_id=192544&amp;release_id=571300" patch="1">http://sourceforge.net/project/shownotes.php?group_id=192544&amp;release_id=571300</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27483" patch="1">27483</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0316">ADV-2008-0316</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40013">mambo-laithai-unspecified-sql-injection(40013)</ref>
    </refs>
    <vuln_soft>
      <prod name="laithai" vendor="mamboxchange">
        <vers num="4.5.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0500" seq="2008-0500" published="2008-01-30" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple unspecified vulnerabilities in Mambo LaiThai 4.5.5 have unknown impact and attack vectors related to (1) mod_login and (2) mod_template_chooser.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?group_id=192544&amp;release_id=571300">http://sourceforge.net/project/shownotes.php?group_id=192544&amp;release_id=571300</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27483" patch="1">27483</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0316">ADV-2008-0316</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40014">mambo-laithai-multiple-unspecified(40014)</ref>
    </refs>
    <vuln_soft>
      <prod name="laithai" vendor="mamboxchange">
        <vers num="4.5.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0501" seq="2008-0501" published="2008-01-30" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="5.8" CVSS_base_score="5.8" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in phpMyClub 0.0.1 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the page_courante parameter to the top-level URI.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27480">27480</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0350">ADV-2008-0350</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40007">phpmyclub-pagecourante-file-include(40007)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5000">5000</ref>
    </refs>
    <vuln_soft>
      <prod name="phpmyclub" vendor="sourceforge">
        <vers num="0.0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0502" seq="2008-0502" published="2008-01-31" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in templates/Official/part_userprofile.php in Connectix Boards 0.8.2 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the template_path parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27506">27506</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0363">ADV-2008-0363</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40040">connectixboards-templatepath-file-include(40040)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5012">5012</ref>
    </refs>
    <vuln_soft>
      <prod name="connectix_boards" vendor="connectix">
        <vers num="0.8.1"/>
        <vers num="0.8.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0503" seq="2008-0503" published="2008-01-31" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Eval injection vulnerability in admin/op/disp.php in Netwerk Smart Publisher 1.0.1 allows remote attackers to execute arbitrary PHP code via the filedata parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27488">27488</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0352">ADV-2008-0352</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5003">5003</ref>
    </refs>
    <vuln_soft>
      <prod name="smart_publisher" vendor="netwerk">
        <vers num="1.0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0504" seq="2008-0504" published="2008-01-31" modified="2018-10-16" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in Coppermine Photo Gallery (CPG) before 1.4.15 allow remote authenticated administrators to execute arbitrary SQL commands via the (1) albumid, (2) startpic, and (3) numpics parameters to util.php; and (4) cid_array parameter to reviewcom.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://coppermine-gallery.net/forum/index.php?topic=50103.0" patch="1">http://coppermine-gallery.net/forum/index.php?topic=50103.0</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487351/100/200/threaded">20080131 [waraxe-2008-SA#066] - Multiple Vulnerabilities in Coppermine 1.4.14</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27509" patch="1">27509</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019285">1019285</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0367" adv="1">ADV-2008-0367</ref>
      <ref source="MISC" url="http://www.waraxe.us/advisory-66.html">http://www.waraxe.us/advisory-66.html</ref>
    </refs>
    <vuln_soft>
      <prod name="coppermine_photo_gallery" vendor="coppermine-gallery">
        <vers num="1.0" edition="rc3"/>
        <vers num="1.1" edition="beta_2"/>
        <vers num="1.1.0"/>
        <vers num="1.2"/>
        <vers num="1.2.0" edition="rc2"/>
        <vers num="1.2.1" edition="b"/>
        <vers num="1.2.1" edition="b-nuke"/>
        <vers num="1.3.0"/>
        <vers num="1.3.1"/>
        <vers num="1.3.2"/>
        <vers num="1.3.3"/>
        <vers num="1.3.4"/>
        <vers num="1.3.5"/>
        <vers num="1.4"/>
        <vers num="1.4.0" edition="alpha"/>
        <vers num="1.4.0" edition="beta"/>
        <vers num="1.4.1" edition="beta"/>
        <vers num="1.4.10"/>
        <vers num="1.4.11"/>
        <vers num="1.4.12"/>
        <vers num="1.4.13"/>
        <vers num="1.4.14" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0505" seq="2008-0505" published="2008-01-31" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in docs/showdoc.php in Coppermine Photo Gallery (CPG) before 1.4.15 allow remote attackers to inject arbitrary web script or HTML via the (1) h and (2) t parameters.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://coppermine-gallery.net/forum/index.php?topic=50103.0" patch="1">http://coppermine-gallery.net/forum/index.php?topic=50103.0</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487351/100/200/threaded">20080131 [waraxe-2008-SA#066] - Multiple Vulnerabilities in Coppermine 1.4.14</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27511" patch="1">27511</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019285">1019285</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0367" adv="1">ADV-2008-0367</ref>
      <ref source="MISC" url="http://www.waraxe.us/advisory-66.html">http://www.waraxe.us/advisory-66.html</ref>
    </refs>
    <vuln_soft>
      <prod name="coppermine_photo_gallery" vendor="coppermine">
        <vers num="1.4.10"/>
        <vers num="1.4.11"/>
        <vers num="1.4.12"/>
        <vers num="1.4.13"/>
        <vers num="1.4.14" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0506" seq="2008-0506" published="2008-01-31" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">include/imageObjectIM.class.php in Coppermine Photo Gallery (CPG) before 1.4.15, when the ImageMagick picture processing method is configured, allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) quality, (2) angle, or (3) clipval parameter to picEditor.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://coppermine-gallery.net/forum/index.php?topic=50103.0" patch="1">http://coppermine-gallery.net/forum/index.php?topic=50103.0</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487310/100/200/threaded">20080130 [waraxe-2008-SA#065] - Remote Shell Command Execution in Coppermine 1.4.14</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27512" patch="1">27512</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019286">1019286</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0367" adv="1">ADV-2008-0367</ref>
      <ref source="MISC" url="http://www.waraxe.us/advisory-65.html">http://www.waraxe.us/advisory-65.html</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5019">5019</ref>
    </refs>
    <vuln_soft>
      <prod name="coppermine_photo_gallery" vendor="coppermine">
        <vers num="1.4.14" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0507" seq="2008-0507" published="2008-01-31" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in adclick.php in the AdServe 0.2 plugin for WordPress allows remote attackers to execute arbitrary SQL commands via the id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27504">27504</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0364">ADV-2008-0364</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40045">adserve-adclick-sql-injection(40045)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5013">5013</ref>
    </refs>
    <vuln_soft>
      <prod name="adserve" vendor="wordpress">
        <vers num="0.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0508" seq="2008-0508" published="2008-01-31" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site request forgery (CSRF) vulnerability in deans_permalinks_migration.php in the Dean's Permalinks Migration 1.0 plugin for WordPress allows remote attackers to modify the oldstructure (aka dean_pm_config[oldstructure]) configuration setting as administrators via the old_struct parameter in a deans_permalinks_migration.php action to wp-admin/options-general.php, as demonstrated by placing an XSS sequence in this setting.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://g30rg3x.com/wp-files/dpm_11gx.zip" patch="1">http://g30rg3x.com/wp-files/dpm_11gx.zip</ref>
      <ref source="MISC" url="http://g30rg3x.com/xsrf-bajo-deans-permalinks-migration-10" patch="1">http://g30rg3x.com/xsrf-bajo-deans-permalinks-migration-10</ref>
      <ref source="MISC" url="http://packetstorm.linuxsecurity.com/0801-advisories/deans-xsrf.txt">http://packetstorm.linuxsecurity.com/0801-advisories/deans-xsrf.txt</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3595">3595</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486840/100/0/threaded">20080122 XSRF under Dean&amp;acirc;??s Permalinks Migration 1.0</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0281">ADV-2008-0281</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39845">permalinks-deanpmconfig-csrf(39845)</ref>
    </refs>
    <vuln_soft>
      <prod name="permalinks_migration_plugin" vendor="wordpress">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0509" seq="2008-0509" published="2008-01-31" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.4" CVSS_base_score="4.4" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="2.7" CVSS_vector="(AV:L/AC:M/Au:S/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Multiple buffer overflows in IBM AIX 4.3 allow remote attackers to cause a denial of service (crash) or possibly gain privileges via a long argument to (1) piox25, related to piox25.c; or (2) piox25remote, related to piox25remote.sh.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27510">27510</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0324">ADV-2008-0324</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/docview.wss?uid=isg1IZ13739">IZ13739</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5796">oval:org.mitre.oval:def:5796</ref>
    </refs>
    <vuln_soft>
      <prod name="aix" vendor="ibm">
        <vers num="4.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0510" seq="2008-0510" published="2008-01-31" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the Newsletter (com_newsletter) component for Mambo 4.5 and Joomla! allows remote attackers to execute arbitrary SQL commands via the listid parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27502">27502</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0354">ADV-2008-0354</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40036">newsletter-index-sql-injection(40036)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5007">5007</ref>
    </refs>
    <vuln_soft>
      <prod name="com_newsletter" vendor="joomla">
        <vers num=""/>
      </prod>
      <prod name="com_newsletter" vendor="mambo">
        <vers num=""/>
      </prod>
      <prod name="mambo" vendor="mambo">
        <vers num="4.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0511" seq="2008-0511" published="2008-01-31" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the MaMML (com_mamml) component for Mambo and Joomla! allows remote attackers to execute arbitrary SQL commands via the listid parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27503">27503</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0356">ADV-2008-0356</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40037">mamml-index-sql-injection(40037)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5009">5009</ref>
    </refs>
    <vuln_soft>
      <prod name="com_mamml" vendor="joomla">
        <vers num=""/>
      </prod>
      <prod name="com_mamml" vendor="mambo">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0512" seq="2008-0512" published="2008-01-31" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the fq (com_fq) component for Mambo and Joomla! allows remote attackers to execute arbitrary SQL commands via the listid parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27501">27501</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0355">ADV-2008-0355</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40035">fq-index-sql-injection(40035)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5008">5008</ref>
    </refs>
    <vuln_soft>
      <prod name="com_fq" vendor="joomla">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0513" seq="2008-0513" published="2008-01-31" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in parser/include/class.cache_phpcms.php in phpCMS 1.2.2 allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter to parser/parser.php, as demonstrated by a filename ending with %00.gif, a different vector than CVE-2005-1840.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487251/100/0/threaded">20080129 Remote File Disclosure in phpCMS 1.2.2</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487254/100/0/threaded">20080129 Re: Remote File Disclosure in phpCMS 1.2.2</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27495">27495</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0353">ADV-2008-0353</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40017">phpcms-parser-directory-traversal(40017)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5006">5006</ref>
    </refs>
    <vuln_soft>
      <prod name="phpcms" vendor="phpcms">
        <vers num="1.2.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0514" seq="2008-0514" published="2008-01-31" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the Glossary (com_glossary) 2.0 component for Mambo and Joomla! allows remote attackers to execute arbitrary SQL commands via the catid parameter in a display action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27505">27505</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0357">ADV-2008-0357</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40038">glossary-index-sql-injection(40038)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5010">5010</ref>
    </refs>
    <vuln_soft>
      <prod name="glossary" vendor="joomla">
        <vers num="2.0"/>
      </prod>
      <prod name="glossary" vendor="mambo">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0515" seq="2008-0515" published="2008-01-31" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the musepoes (com_musepoes) component for Mambo and Joomla! allows remote attackers to execute arbitrary SQL commands via the aid parameter in an answer action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27507">27507</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0358">ADV-2008-0358</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5011">5011</ref>
    </refs>
    <vuln_soft>
      <prod name="musepoes_component" vendor="joomla">
        <vers num=""/>
      </prod>
      <prod name="musepoes_component" vendor="mambo">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0516" seq="2008-0516" published="2008-01-31" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in spaw/dialogs/confirm.php in SQLiteManager 1.2.0 allows remote attackers to execute arbitrary PHP code via a URL in the spaw_root parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27515">27515</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40065">sqlitemanager-confirm-file-include(40065)</ref>
    </refs>
    <vuln_soft>
      <prod name="sqlite_manager" vendor="sqlite_manager">
        <vers num="1.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0517" seq="2008-0517" published="2008-01-31" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the Darko Selesi EstateAgent (com_estateagent) 0.1 component for Mambo 4.5.x and Joomla! allows remote attackers to execute arbitrary SQL commands via the objid parameter in a contact showObject action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27520">27520</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0362">ADV-2008-0362</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40060">estateagent-index-sql-injection(40060)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5016">5016</ref>
    </refs>
    <vuln_soft>
      <prod name="estateagent" vendor="darko_selesi">
        <vers num="0.1"/>
      </prod>
      <prod name="joomla" vendor="joomla">
        <vers num=""/>
      </prod>
      <prod name="mambo" vendor="mambo">
        <vers num="4.5"/>
        <vers num="4.5.0.2"/>
        <vers num="4.5.1.3"/>
        <vers num="4.5.1_1.0.9"/>
        <vers num="4.5.1_beta"/>
        <vers num="4.5.1_beta2"/>
        <vers num="4.5.1a"/>
        <vers num="4.5.2"/>
        <vers num="4.5.2.1"/>
        <vers num="4.5.2.2"/>
        <vers num="4.5.2.3"/>
        <vers num="4.5.3h"/>
        <vers num="4.5.4"/>
        <vers num="4.5_1.0.0"/>
        <vers num="4.5_1.0.1"/>
        <vers num="4.5_1.0.2"/>
        <vers num="4.5_1.0.3_beta"/>
        <vers num="4.5_1.0.9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0518" seq="2008-0518" published="2008-01-31" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the Recipes (com_recipes) 1.00 component for Mambo and Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a detail action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27519">27519</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0360">ADV-2008-0360</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40064">recipes-index-sql-injection(40064)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5014">5014</ref>
    </refs>
    <vuln_soft>
      <prod name="com_recipes" vendor="joomla">
        <vers num="1.00"/>
      </prod>
      <prod name="com_recipes" vendor="mambo">
        <vers num="1.00"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0519" seq="2008-0519" published="2008-01-31" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the Atapin Jokes (com_jokes) 1.0 component for Mambo and Joomla! allows remote attackers to execute arbitrary SQL commands via the cat parameter in a CatView action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27522">27522</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0361">ADV-2008-0361</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40067">jokes-index-sql-injection(40067)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5015">5015</ref>
    </refs>
    <vuln_soft>
      <prod name="com_jokes" vendor="joomla">
        <vers num="1.0"/>
      </prod>
      <prod name="com_jokes" vendor="mambo">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0520" seq="2008-0520" published="2008-01-31" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in main.php in the WassUp plugin 1.4 through 1.4.3 for WordPress allow remote attackers to execute arbitrary SQL commands via the (1) from_date or (2) to_date parameter to spy.php.</descript>
      <descript source="nvd">Additional research found the following links:

http://secunia.com/advisories/28702/

http://www.securityfocus.com/bid/27525</descript>
    </desc>
    <sols>
      <sol source="nvd">Additional research found the following link:
http://downloads.wordpress.org/plugin/wassup.1.4.3a.zip</sol>
    </sols>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27525">27525</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0365">ADV-2008-0365</ref>
      <ref source="CONFIRM" url="http://www.wpwp.org/archives/warning-security-bug-in-version/">http://www.wpwp.org/archives/warning-security-bug-in-version/</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5017">5017</ref>
    </refs>
    <vuln_soft>
      <prod name="wassup_plugin" vendor="wordpress">
        <vers num="1.4"/>
        <vers num="1.4.3" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0521" seq="2008-0521" published="2008-01-31" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Multiple directory traversal vulnerabilities in Bubbling Library 1.32 allow remote attackers to read arbitrary files via a .. (dot dot) in the uri parameter to dispatcher.php in (1) examples/dispatcher/framework/, (2) examples/dispatcher/, (3) examples/wizard/, and (4) PHP/, different vectors than CVE-2008-0545.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27482">27482</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40008">bubbling-dispatcher-directory-traversal(40008)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5001">5001</ref>
    </refs>
    <vuln_soft>
      <prod name="bubbling_library" vendor="bubbling_library">
        <vers num="1.32"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0522" seq="2008-0522" published="2008-01-31" modified="2011-03-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in multiple Hal Networks shopping-cart products allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="JVN" url="http://jvn.jp/jp/JVN%2301162446/index.html">JVN#01162446</ref>
      <ref source="CONFIRM" url="http://www.hal9800.com/home/bug/20080123.html">http://www.hal9800.com/home/bug/20080123.html</ref>
      <ref source="CONFIRM" url="http://www.hal9800.com/home/bug/20080127.html">http://www.hal9800.com/home/bug/20080127.html</ref>
      <ref source="CONFIRM" url="http://www.hal9800.com/home/bug/20080128.html">http://www.hal9800.com/home/bug/20080128.html</ref>
      <ref source="CONFIRM" url="http://www.hal9800.com/home/bug/20080129.html">http://www.hal9800.com/home/bug/20080129.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27513">27513</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0368">ADV-2008-0368</ref>
    </refs>
    <vuln_soft>
      <prod name="perl__cgi_cart" vendor="hal_networks">
        <vers num=""/>
      </prod>
      <prod name="php_cart" vendor="hal_networks">
        <vers num=""/>
      </prod>
      <prod name="shop_hal_v1" vendor="hal_networks">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0523" seq="2008-0523" published="2008-01-31" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in SoftCart.exe in SoftCart 5.1.2.2 allow remote attackers to inject arbitrary web script or HTML via the (1) License_Plate, (2) License_State, (3) Ticket_Date, and (4) Ticket_Number parameters.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27524">27524</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40061">softcart-softcart-xss(40061)</ref>
    </refs>
    <vuln_soft>
      <prod name="softcart" vendor="softcart">
        <vers num="5.1.2.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0524" seq="2008-0524" published="2008-01-31" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site request forgery (CSRF) vulnerability in the management interface in multiple Yamaha RT series routers allows remote attackers to change password settings and probably other configuration settings as administrators via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="JVN" url="http://jvn.jp/jp/JVN%2388575577/index.html">JVN#88575577</ref>
      <ref source="CONFIRM" url="http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVN88575577.html">http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVN88575577.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27491">27491</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40015">yamaha-routers-http-csrf(40015)</ref>
    </refs>
    <vuln_soft>
      <prod name="rt107e" vendor="yamaha">
        <vers num=""/>
      </prod>
      <prod name="rt52pro" vendor="yamaha">
        <vers num=""/>
      </prod>
      <prod name="rt56v" vendor="yamaha">
        <vers num=""/>
      </prod>
      <prod name="rt57i" vendor="yamaha">
        <vers num=""/>
      </prod>
      <prod name="rt58i" vendor="yamaha">
        <vers num=""/>
      </prod>
      <prod name="rt60w" vendor="yamaha">
        <vers num=""/>
      </prod>
      <prod name="rt80i" vendor="yamaha">
        <vers num=""/>
      </prod>
      <prod name="rta50i" vendor="yamaha">
        <vers num=""/>
      </prod>
      <prod name="rta52i" vendor="yamaha">
        <vers num=""/>
      </prod>
      <prod name="rta54i" vendor="yamaha">
        <vers num=""/>
      </prod>
      <prod name="rta55i" vendor="yamaha">
        <vers num=""/>
      </prod>
      <prod name="rtv700" vendor="yamaha">
        <vers num=""/>
      </prod>
      <prod name="rtw65b" vendor="yamaha">
        <vers num=""/>
      </prod>
      <prod name="rtw65i" vendor="yamaha">
        <vers num=""/>
      </prod>
      <prod name="rtx1000" vendor="yamaha">
        <vers num=""/>
      </prod>
      <prod name="rtx1100" vendor="yamaha">
        <vers num=""/>
      </prod>
      <prod name="rtx1500" vendor="yamaha">
        <vers num=""/>
      </prod>
      <prod name="srt100" vendor="yamaha">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0525" seq="2008-0525" published="2008-01-31" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PatchLink Update client for Unix, as used by Novell ZENworks Patch Management Update Agent for Linux/Unix/Mac (LUM) 6.2094 through 6.4102 and other products, allows local users to (1) truncate arbitrary files via a symlink attack on the /tmp/patchlink.tmp file used by the logtrimmer script, and (2) execute arbitrary code via a symlink attack on the /tmp/plshutdown file used by the rebootTask script.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3599">3599</ref>
      <ref source="CONFIRM" url="http://support.lumension.com/scripts/rightnow.cfg/php.exe/enduser/std_adp.php?p_faqid=527">http://support.lumension.com/scripts/rightnow.cfg/php.exe/enduser/std_adp.php?p_faqid=527</ref>
      <ref source="CONFIRM" url="http://support.lumension.com/scripts/rightnow.cfg/php.exe/enduser/std_adp.php?p_faqid=528">http://support.lumension.com/scripts/rightnow.cfg/php.exe/enduser/std_adp.php?p_faqid=528</ref>
      <ref source="CONFIRM" url="http://support.lumension.com/scripts/rightnow.cfg/php.exe/enduser/std_adp.php?p_faqid=530">http://support.lumension.com/scripts/rightnow.cfg/php.exe/enduser/std_adp.php?p_faqid=530</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487103/100/0/threaded">20080125 Two vulnerabilities for PatchLink Update Client for Unix.</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27458">27458</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019272">1019272</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0426" adv="1">ADV-2008-0426</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39956">patchlinkupdate-logtrimmer-symlink(39956)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39958">patchlinkupdate-reboottask-symlink(39958)</ref>
      <ref source="CONFIRM" url="https://secure-support.novell.com/KanisaPlatform/Publishing/18/3908994_f.SAL_Public.html">https://secure-support.novell.com/KanisaPlatform/Publishing/18/3908994_f.SAL_Public.html</ref>
    </refs>
    <vuln_soft>
      <prod name="patchlink_update" vendor="lumension_security">
        <vers num="6.2" edition=":linux"/>
        <vers num="6.2" edition=":mac"/>
        <vers num="6.2" edition=":unix"/>
        <vers num="6.3" edition=":linux"/>
        <vers num="6.3" edition=":mac"/>
        <vers num="6.3" edition=":unix"/>
        <vers num="6.4" edition=":linux"/>
        <vers num="6.4" edition=":mac"/>
        <vers num="6.4" edition=":unix"/>
      </prod>
      <prod name="zenworks_patch_management_update_agent" vendor="novell">
        <vers num="6.2" edition=":linux"/>
        <vers num="6.2" edition=":mac"/>
        <vers num="6.2" edition=":unix"/>
        <vers num="6.3" edition=":linux"/>
        <vers num="6.3" edition=":mac"/>
        <vers num="6.3" edition=":unix"/>
        <vers num="6.4" edition=":linux"/>
        <vers num="6.4" edition=":mac"/>
        <vers num="6.4" edition=":unix"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0526" seq="2008-0526" published="2008-02-14" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Cisco Unified IP Phone 7940, 7940G, 7960, and 7960G running SCCP firmware allows remote attackers to cause a denial of service (reboot) via a long ICMP echo request (ping) packet.</descript>
    </desc>
    <sols>
      <sol source="nvd">In order to download the patch, login is required</sol>
    </sols>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_advisory09186a0080949c7a.shtml" patch="1">20080213 Cisco Unified IP Phone Overflow and Denial of Service Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27774">27774</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019407">1019407</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0543">ADV-2008-0543</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40487">cisco-unifiedipphone-icmp-dos(40487)</ref>
    </refs>
    <vuln_soft>
      <prod name="session_initiation_protocol_(sip)_firmware" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="skinny_client_control_protocol_(sccp)_firmware" vendor="cisco">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0527" seq="2008-0527" published="2008-02-14" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">The HTTP server in Cisco Unified IP Phone 7935 and 7936 running SCCP firmware allows remote attackers to cause a denial of service (reboot) via a crafted HTTP request.</descript>
    </desc>
    <sols>
      <sol source="nvd">Patch download requires login</sol>
    </sols>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_advisory09186a0080949c7a.shtml" patch="1">20080213 Cisco Unified IP Phone Overflow and Denial of Service Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27774">27774</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019408">1019408</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0543">ADV-2008-0543</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40489">cisco-unifiedipphone-httpserver-dos(40489)</ref>
    </refs>
    <vuln_soft>
      <prod name="session_initiation_protocol_(sip)_firmware" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="skinny_client_control_protocol_(sccp)_firmware" vendor="cisco">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0528" seq="2008-0528" published="2008-02-14" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in Cisco Unified IP Phone 7940, 7940G, 7960, and 7960G running SIP firmware might allow remote attackers to execute arbitrary code via a SIP message with crafted MIME data.</descript>
    </desc>
    <sols>
      <sol source="nvd">Patch requires login</sol>
    </sols>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_advisory09186a0080949c7a.shtml" patch="1">20080213 Cisco Unified IP Phone Overflow and Denial of Service Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27774">27774</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019409">1019409</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0543">ADV-2008-0543</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40492">cisco-unifiedipphone-sipmime-bo(40492)</ref>
    </refs>
    <vuln_soft>
      <prod name="session_initiation_protocol_(sip)_firmware" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="skinny_client_control_protocol_(sccp)_firmware" vendor="cisco">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0529" seq="2008-0529" published="2008-02-14" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the telnet server in Cisco Unified IP Phone 7906G, 7911G, 7941G, 7961G, 7970G, and 7971G running SCCP firmware might allow remote authenticated users to execute arbitrary code via a crafted command.</descript>
    </desc>
    <sols>
      <sol source="nvd">Patch requires login</sol>
    </sols>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_advisory09186a0080949c7a.shtml" patch="1">20080213 Cisco Unified IP Phone Overflow and Denial of Service Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27774">27774</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019410">1019410</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0543">ADV-2008-0543</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40493">cisco-unifiedipphone-telnet-bo(40493)</ref>
    </refs>
    <vuln_soft>
      <prod name="session_initiation_protocol_(sip)_firmware" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="skinny_client_control_protocol_(sccp)_firmware" vendor="cisco">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0530" seq="2008-0530" published="2008-02-14" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in Cisco Unified IP Phone 7940, 7940G, 7960, and 7960G running SCCP and SIP firmware might allow remote attackers to execute arbitrary code via a crafted DNS response.</descript>
    </desc>
    <sols>
      <sol source="nvd">Patch requires login</sol>
    </sols>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_advisory09186a0080949c7a.shtml" patch="1">20080213 Cisco Unified IP Phone Overflow and Denial of Service Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27774">27774</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019406">1019406</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0543">ADV-2008-0543</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40485">cisco-unifiedipphone-dns-bo(40485)</ref>
    </refs>
    <vuln_soft>
      <prod name="session_initiation_protocol_(sip)_firmware" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="skinny_client_control_protocol_(sccp)_firmware" vendor="cisco">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0531" seq="2008-0531" published="2008-02-14" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in Cisco Unified IP Phone 7940, 7940G, 7960, and 7960G running SIP firmware might allow remote SIP servers to execute arbitrary code via a crafted challenge/response message.</descript>
    </desc>
    <sols>
      <sol source="nvd">Patch requires login</sol>
    </sols>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_advisory09186a0080949c7a.shtml" patch="1">20080213 Cisco Unified IP Phone Overflow and Denial of Service Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27774">27774</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019411">1019411</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0543">ADV-2008-0543</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40498">cisco-unifiedipphone-sipproxy-bo(40498)</ref>
    </refs>
    <vuln_soft>
      <prod name="session_initiation_protocol_(sip)_firmware" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="skinny_client_control_protocol_(sccp)_firmware" vendor="cisco">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0532" seq="2008-0532" published="2008-03-14" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple buffer overflows in securecgi-bin/CSuserCGI.exe in User-Changeable Password (UCP) before 4.2 in Cisco Secure Access Control Server (ACS) for Windows and ACS Solution Engine allow remote attackers to execute arbitrary code via a long argument located immediately after the Logout argument, and possibly unspecified other vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3743">3743</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019608">1019608</ref>
      <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_advisory09186a008095f0c4.shtml" patch="1">20080312 Cisco Secure Access Control Server for Windows User-Changeable Password Vulnerabilities</ref>
      <ref source="MISC" url="http://www.recurity-labs.com/content/pub/RecurityLabs_Cisco_ACS_UCP_advisory.txt">http://www.recurity-labs.com/content/pub/RecurityLabs_Cisco_ACS_UCP_advisory.txt</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489463/100/0/threaded">20080312 Cisco ACS UCP Remote Pre-Authentication Buffer Overflows</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28222" patch="1">28222</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0868">ADV-2008-0868</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41154">cisco-acs-ucp-csusercgi-bo(41154)</ref>
    </refs>
    <vuln_soft>
      <prod name="acs_for_windows" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="acs_solution_engine" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="user_changeable_password" vendor="cisco">
        <vers num="4.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0533" seq="2008-0533" published="2008-03-14" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in securecgi-bin/CSuserCGI.exe in User-Changeable Password (UCP) before 4.2 in Cisco Secure Access Control Server (ACS) for Windows and ACS Solution Engine allow remote attackers to inject arbitrary web script or HTML via an argument located immediately after the Help argument, and possibly unspecified other vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3743">3743</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019607">1019607</ref>
      <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_advisory09186a008095f0c4.shtml" patch="1">20080312 Cisco Secure Access Control Server for Windows User-Changeable Password Vulnerabilities</ref>
      <ref source="MISC" url="http://www.recurity-labs.com/content/pub/RecurityLabs_Cisco_ACS_UCP_advisory.txt">http://www.recurity-labs.com/content/pub/RecurityLabs_Cisco_ACS_UCP_advisory.txt</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489463/100/0/threaded">20080312 Cisco ACS UCP Remote Pre-Authentication Buffer Overflows</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28222">28222</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0868">ADV-2008-0868</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41156">cisco-acs-ucp-csusercgi-xss(41156)</ref>
    </refs>
    <vuln_soft>
      <prod name="acs_for_windows" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="acs_solution_engine" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="user_changeable_password" vendor="cisco">
        <vers num="4.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0534" seq="2008-0534" published="2008-05-22" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">The SSH server in (1) Cisco Service Control Engine (SCE) before 3.1.6, and (2) Icon Labs Iconfidant SSH before 2.3.8, allows remote attackers to cause a denial of service (device restart or daemon outage) via a high rate of login attempts, aka Bug ID CSCsi68582.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020074">1020074</ref>
      <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_advisory09186a008099bf65.shtml" patch="1">20080521 Cisco Service Control Engine Denial of Service Vulnerabilities</ref>
      <ref source="CONFIRM" url="http://www.icon-labs.com/news/read.asp?newsID=77">http://www.icon-labs.com/news/read.asp?newsID=77</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/626979">VU#626979</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29316">29316</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29609">29609</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1604/references" adv="1">ADV-2008-1604</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1774/references" adv="1">ADV-2008-1774</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42565">cisco-sce-sshlogin-dos(42565)</ref>
    </refs>
    <vuln_soft>
      <prod name="service_control_engine" vendor="cisco">
        <vers num="3.1.6" prev="1"/>
      </prod>
      <prod name="iconfidant_ssh" vendor="icon-labs">
        <vers num="2.3.7" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0535" seq="2008-0535" published="2008-05-22" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the SSH server in (1) Cisco Service Control Engine (SCE) before 3.1.6, and (2) Icon Labs Iconfidant SSH before 2.3.8, allows remote attackers to cause a denial of service (device instability) via "SSH credentials that attempt to change the authentication method," aka Bug ID CSCsm14239.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020074">1020074</ref>
      <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_advisory09186a008099bf65.shtml" patch="1">20080521 Cisco Service Control Engine Denial of Service Vulnerabilities</ref>
      <ref source="CONFIRM" url="http://www.icon-labs.com/news/read.asp?newsID=77">http://www.icon-labs.com/news/read.asp?newsID=77</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/626979">VU#626979</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29316">29316</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29609">29609</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1604/references" adv="1">ADV-2008-1604</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1774/references" adv="1">ADV-2008-1774</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42567">cisco-sce-ssh-credentials-dos(42567)</ref>
    </refs>
    <vuln_soft>
      <prod name="service_control_engine" vendor="cisco">
        <vers num="3.1.5" prev="1"/>
      </prod>
      <prod name="iconfidant_ssh" vendor="icon-labs">
        <vers num="2.3.7" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0536" seq="2008-0536" published="2008-05-22" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the SSH server in (1) Cisco Service Control Engine (SCE) 3.0.x before 3.0.7 and 3.1.x before 3.1.0, and (2) Icon Labs Iconfidant SSH before 2.3.8, allows remote attackers to cause a denial of service (management interface outage) via SSH traffic that occurs during management operations and triggers "illegal I/O operations," aka Bug ID CSCsh49563.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020074">1020074</ref>
      <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_advisory09186a008099bf65.shtml" patch="1">20080521 Cisco Service Control Engine Denial of Service Vulnerabilities</ref>
      <ref source="CONFIRM" url="http://www.icon-labs.com/news/read.asp?newsID=77">http://www.icon-labs.com/news/read.asp?newsID=77</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/626979">VU#626979</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29316">29316</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29609">29609</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1604/references" adv="1">ADV-2008-1604</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1774/references" adv="1">ADV-2008-1774</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42566">cisco-sce-managementagent-dos(42566)</ref>
    </refs>
    <vuln_soft>
      <prod name="service_control_engine" vendor="cisco">
        <vers num="3.0"/>
        <vers num="3.1.6" prev="1"/>
      </prod>
      <prod name="iconfidant_ssh" vendor="icon-labs">
        <vers num="2.3.7" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0537" seq="2008-0537" published="2008-03-27" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.1" CVSS_base_score="7.1" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Supervisor Engine 32 (Sup32), Supervisor Engine 720 (Sup720), and Route Switch Processor 720 (RSP720) for multiple Cisco products, when using Multi Protocol Label Switching (MPLS) VPN and OSPF sham-link, allows remote attackers to cause a denial of service (blocked queue, device restart, or memory leak) via unknown vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CISCO" url="http://www.cisco.com/warp/public/707/cisco-sa-20080326-queue.shtml" adv="1">20080326 Vulnerability in Cisco IOS with OSPF, MPLS VPN, and Supervisor 32, Supervisor 720, or Route Switch Processor 720</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28463">28463</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019716">1019716</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-087B.html">TA08-087B</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1005/references">ADV-2008-1005</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41466">cisco-catalyst-sup-rsp-dos(41466)</ref>
    </refs>
    <vuln_soft>
      <prod name="route_switch_processor" vendor="cisco">
        <vers num="rsp720"/>
      </prod>
      <prod name="supervisor_engine" vendor="cisco">
        <vers num="sup32"/>
        <vers num="sup720"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0538" seq="2008-0538" published="2008-02-01" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in phpIP Management 4.3.2 allow remote attackers to execute arbitrary SQL commands via the (1) password parameter to login.php, the (2) id parameter to display.php, and unspecified other vectors.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://marc.info/?l=full-disclosure&amp;m=120139657100513&amp;w=2">20080127 phpIP 4.3.2 - Numerous SQL Injection Vulnerablities</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487122/100/0/threaded">20080127 phpIP 4.3.2 - Numerous SQL Injection Vulnerablities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27468">27468</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0346">ADV-2008-0346</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39965">phpip-display-sql-injection(39965)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4990">4990</ref>
    </refs>
    <vuln_soft>
      <prod name="phpip_management" vendor="phpip">
        <vers num="4.3.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0539" seq="2008-0539" published="2008-02-01" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in dms/policy/rep_request.php in F5 BIG-IP Application Security Manager (ASM) 9.4.3 allows remote attackers to inject arbitrary web script or HTML via the report_type parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3602">3602</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487118/100/0/threaded">20080126 F5 BIG-IP Web Management ASM Security Report XSS</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489290/100/0/threaded">20080308 F5 BIG-IP Web Management Console XSS</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27462">27462</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28151">28151</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019276">1019276</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0301">ADV-2008-0301</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39979">f5bigipwebmgmt-reprequest-xss(39979)</ref>
    </refs>
    <vuln_soft>
      <prod name="tmos" vendor="f5">
        <vers num="9.4.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0540" seq="2008-0540" published="2008-02-01" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in trixbox 2.4.2.0 allow remote attackers to inject arbitrary web script or HTML via the query string to index.php in (1) user/ or (2) maint/.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.digitrustgroup.com/advisories/web-application-security-trixbox.html">http://www.digitrustgroup.com/advisories/web-application-security-trixbox.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27460">27460</ref>
    </refs>
    <vuln_soft>
      <prod name="trixbox" vendor="trixbox">
        <vers num="2.4.2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0541" seq="2008-0541" published="2008-02-01" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in forum.php in Gerd Tentler Simple Forum 3.2 allow remote attackers to inject arbitrary web script or HTML via the (1) open and (2) date_show parameters.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27463">27463</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39978">simpleforum-forum-xss(39978)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4989">4989</ref>
    </refs>
    <vuln_soft>
      <prod name="simple_forum" vendor="gerd_tentler">
        <vers num="3.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0542" seq="2008-0542" published="2008-02-01" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in thumbnail.php in Gerd Tentler Simple Forum 3.2 allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27463">27463</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39980">simpleforum-thumbnail-directory-traversal(39980)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4989">4989</ref>
    </refs>
    <vuln_soft>
      <prod name="simple_forum" vendor="gerd_tentler">
        <vers num="3.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0543" seq="2008-0543" published="2008-02-01" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in Pre Dynamic Institution allow remote attackers to execute arbitrary SQL commands via the (1) sloginid and (2) spass parameters to (a) login.asp and (b) siteadmin/login.asp.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3603">3603</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487054/100/0/threaded">20080124 Pre Dynamic Institution bypass</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27451">27451</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39942">predynamic-login-sql-injection(39942)</ref>
    </refs>
    <vuln_soft>
      <prod name="pre_dynamic_institution" vendor="pre_projects">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0544" seq="2008-0544" published="2008-02-01" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in the IMG_LoadLBM_RW function in IMG_lbm.c in SDL_image before 1.2.7 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted IFF ILBM file.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.gentoo.org/show_bug.cgi?id=207933">http://bugs.gentoo.org/show_bug.cgi?id=207933</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0061">http://wiki.rpath.com/Advisories:rPSA-2008-0061</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1493">DSA-1493</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200802-01.xml">GLSA-200802-01</ref>
      <ref source="CONFIRM" url="http://www.libsdl.org/cgi/viewvc.cgi/trunk/SDL_image/IMG_lbm.c?r1=3341&amp;r2=3521">http://www.libsdl.org/cgi/viewvc.cgi/trunk/SDL_image/IMG_lbm.c?r1=3341&amp;r2=3521</ref>
      <ref source="CONFIRM" url="http://www.libsdl.org/cgi/viewvc.cgi/trunk/SDL_image/IMG_lbm.c?revision=3521&amp;view=markup">http://www.libsdl.org/cgi/viewvc.cgi/trunk/SDL_image/IMG_lbm.c?revision=3521&amp;view=markup</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:040">MDVSA-2008:040</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488079/100/0/threaded">20080213 rPSA-2008-0061-1 SDL_image</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27435">27435</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-595-1">USN-595-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0266">ADV-2008-0266</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39899">sdlimage-imgloadlbmrw-bo(39899)</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2206">https://issues.rpath.com/browse/RPL-2206</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00008.html">FEDORA-2008-1208</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00039.html">FEDORA-2008-1231</ref>
    </refs>
    <vuln_soft>
      <prod name="sdl_image" vendor="sdl">
        <vers num="1.2.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0545" seq="2008-0545" published="2008-02-01" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple directory traversal vulnerabilities in Bubbling Library 1.32 allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the (1) uri parameter to (a) yui-menu.tpl.php, (b) simple.tpl.php, and (c) advanced.tpl.php in dispatcher/framework/; and the (2) page parameter to (d) yui-menu.php, (e) simple.php, and (f) advanced.php in dispatcher/framework/, different vectors than CVE-2008-0521.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27466">27466</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0347">ADV-2008-0347</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39969">bubblinglibrary-page-uri-file-include(39969)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4991">4991</ref>
    </refs>
    <vuln_soft>
      <prod name="bubbling_library" vendor="bubbling_library">
        <vers num="1.32"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0546" seq="2008-0546" published="2008-02-01" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in CandyPress (CP) 4.1.1.26, and earlier 4.1.x versions, allow remote attackers to execute arbitrary SQL commands via the (1) idProduct and (2) options parameters to (a) ajax/ajax_optInventory.asp, or the (2) recid parameter to (b) ajax/ajax_getBrands.asp.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3600">3600</ref>
      <ref source="CONFIRM" url="http://www.candypress.com/CPforum/forum_posts.asp?TID=10630&amp;PN=1">http://www.candypress.com/CPforum/forum_posts.asp?TID=10630&amp;PN=1</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487058/100/0/threaded">20080125 [CandyPress] eCommerce suite (SQL Injection + XSS + Path Disclosure)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27454">27454</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0314">ADV-2008-0314</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39939">ecommercesuite-ajaxgetbrands-sql-injection(39939)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4988">4988</ref>
    </refs>
    <vuln_soft>
      <prod name="candypress_store" vendor="shoppingtree">
        <vers num="4.1"/>
        <vers num="4.1.1.26"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0547" seq="2008-0547" published="2008-02-01" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in admin/utilities_ConfigHelp.asp in CandyPress (CP) 4.1.1.26, and probably earlier 4.x and 3.x versions, allows remote attackers to inject arbitrary web script or HTML via the helpfield parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3600">3600</ref>
      <ref source="CONFIRM" url="http://www.candypress.com/CPforum/forum_posts.asp?TID=10630&amp;PN=1">http://www.candypress.com/CPforum/forum_posts.asp?TID=10630&amp;PN=1</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487058/100/0/threaded">20080125 [CandyPress] eCommerce suite (SQL Injection + XSS + Path Disclosure</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27454">27454</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0314">ADV-2008-0314</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39940">ecommercesuite-utilitiesconfighelp-xss(39940)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4988">4988</ref>
    </refs>
    <vuln_soft>
      <prod name="candypress_store" vendor="shoppingtree">
        <vers num="4.1"/>
        <vers num="4.1.1.26"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0548" seq="2008-0548" published="2008-02-01" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Steamcast 0.9.75 and earlier allows remote attackers to cause a denial of service (daemon crash) via a large integer in the Content-Length HTTP header, which triggers a NULL dereference when malloc fails.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/steamcazz-adv.txt">http://aluigi.altervista.org/adv/steamcazz-adv.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39927">steamcast-contentlength-dos(39927)</ref>
    </refs>
    <vuln_soft>
      <prod name="steamcast" vendor="radio_toolbox">
        <vers num="0.9.75" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0549" seq="2008-0549" published="2008-02-01" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Integer overflow in the OggHeaderParse function in Steamcast 0.9.75 and earlier allows remote authenticated users to cause a denial of service (daemon crash) via a long Ogg tag.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/steamcazz-adv.txt">http://aluigi.altervista.org/adv/steamcazz-adv.txt</ref>
      <ref source="MISC" url="http://aluigi.org/poc/steamcazz.zip">http://aluigi.org/poc/steamcazz.zip</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39929">steamcast-oggheaderparse-dos(39929)</ref>
    </refs>
    <vuln_soft>
      <prod name="steamcast" vendor="radio_toolbox">
        <vers num="0.9.75" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0550" seq="2008-0550" published="2008-02-01" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Off-by-one error in Steamcast 0.9.75 and earlier allows remote attackers to cause a denial of service (daemon crash) or execute arbitrary code via a certain HTTP request that leads to a buffer overflow, as demonstrated by a long User-Agent header.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/steamcazz-adv.txt">http://aluigi.altervista.org/adv/steamcazz-adv.txt</ref>
      <ref source="MISC" url="http://aluigi.org/poc/steamcazz.zip">http://aluigi.org/poc/steamcazz.zip</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39928">steamcast-http-bo(39928)</ref>
    </refs>
    <vuln_soft>
      <prod name="steamcast" vendor="radio_toolbox">
        <vers num="0.9.75" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0551" seq="2008-0551" published="2008-02-01" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The NamoInstaller.NamoInstall.1 ActiveX control in NamoInstaller.dll 3.0.0.1 and earlier in Namo Web Editor in Sejoong Namo ActiveSquare 6 allows remote attackers to execute arbitrary code via a URL in the argument to the Install method.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27453">27453</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27580">27580</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0299">ADV-2008-0299</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39943">activesquare-namoinstaller-code-execution(39943)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39974">namoinstaller-namoinstaller-code-execution(39974)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4986">4986</ref>
    </refs>
    <vuln_soft>
      <prod name="activex" vendor="microsoft">
        <vers num=""/>
      </prod>
      <prod name="activesquare" vendor="sejoong_namo">
        <vers num="6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0552" seq="2008-0552" published="2008-02-01" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php in eTicket 1.5.6-RC4 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3601">3601</ref>
      <ref source="MISC" url="http://www.lonerunners.net/users/jekil/pub/hack-eticket/hack-eticket.txt">http://www.lonerunners.net/users/jekil/pub/hack-eticket/hack-eticket.txt</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487133/100/0/threaded">20080127 eTicket 'index.php' Cross Site Scripting Path Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27473">27473</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019278">1019278</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39968">eticket-index-xss(39968)</ref>
    </refs>
    <vuln_soft>
      <prod name="eticket" vendor="eticket">
        <vers num="1.5.6_rc4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0553" seq="2008-0553" published="2008-02-07" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the ReadImage function in tkImgGIF.c in Tk (Tcl/Tk) before 8.5.1 allows remote attackers to execute arbitrary code via a crafted GIF image, a similar issue to CVE-2006-4484.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00005.html">SUSE-SR:2008:008</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019309">1019309</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=573933&amp;group_id=10894">http://sourceforge.net/project/shownotes.php?release_id=573933&amp;group_id=10894</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-237465-1">237465</ref>
      <ref source="UBUNTU" url="http://ubuntu.com/usn/usn-664-1">USN-664-1</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0054">http://wiki.rpath.com/Advisories:rPSA-2008-0054</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1490">DSA-1490</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1491">DSA-1491</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1598">DSA-1598</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:041">MDVSA-2008:041</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2008_13_sr.html">SUSE-SR:2008:013</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0134.html">RHSA-2008:0134</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0135.html">RHSA-2008:0135</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0136.html">RHSA-2008:0136</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488069/100/0/threaded">20080212 rPSA-2008-0054-1 tk</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493080/100/0/threaded">20080604 VMSA-2008-0009 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Fusion, VMware Server, VMware VIX API, VMware ESX, VMware ESXi resolve critical security issues</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27655" patch="1">27655</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2008-0009.html">http://www.vmware.com/security/advisories/VMSA-2008-0009.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0430" adv="1">ADV-2008-0430</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1456/references" adv="1">ADV-2008-1456</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1744" adv="1">ADV-2008-1744</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=431518">https://bugzilla.redhat.com/show_bug.cgi?id=431518</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2215">https://issues.rpath.com/browse/RPL-2215</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10098">oval:org.mitre.oval:def:10098</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00115.html">FEDORA-2008-1323</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00132.html">FEDORA-2008-1131</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00193.html">FEDORA-2008-1122</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00205.html">FEDORA-2008-1384</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00116.html">FEDORA-2008-3545</ref>
    </refs>
    <vuln_soft>
      <prod name="tcl_tk" vendor="tcl_tk">
        <vers num="2.1"/>
        <vers num="3.3"/>
        <vers num="4.0p1"/>
        <vers num="6.1"/>
        <vers num="6.1p1"/>
        <vers num="6.2"/>
        <vers num="6.4"/>
        <vers num="6.5"/>
        <vers num="6.6"/>
        <vers num="6.7"/>
        <vers num="7.0"/>
        <vers num="7.1"/>
        <vers num="7.3"/>
        <vers num="7.4"/>
        <vers num="7.5"/>
        <vers num="7.5p1"/>
        <vers num="7.6"/>
        <vers num="7.6p2"/>
        <vers num="8.0"/>
        <vers num="8.0.3"/>
        <vers num="8.0.4"/>
        <vers num="8.0.5"/>
        <vers num="8.0p2"/>
        <vers num="8.1"/>
        <vers num="8.1.1"/>
        <vers num="8.2.0"/>
        <vers num="8.2.1"/>
        <vers num="8.2.2"/>
        <vers num="8.2.3"/>
        <vers num="8.3.0"/>
        <vers num="8.3.1"/>
        <vers num="8.3.2"/>
        <vers num="8.3.3"/>
        <vers num="8.3.4"/>
        <vers num="8.3.5"/>
        <vers num="8.4.0"/>
        <vers num="8.4.1"/>
        <vers num="8.4.2"/>
        <vers num="8.4.3"/>
        <vers num="8.4.4"/>
        <vers num="8.4.5"/>
        <vers num="8.4.6"/>
        <vers num="8.4.7"/>
        <vers num="8.4.8"/>
        <vers num="8.4.9"/>
        <vers num="8.4.10"/>
        <vers num="8.4.11"/>
        <vers num="8.4.12"/>
        <vers num="8.4.13"/>
        <vers num="8.4.14"/>
        <vers num="8.4.15"/>
        <vers num="8.4.16"/>
        <vers num="8.4.17" prev="1"/>
        <vers num="8.4a2"/>
        <vers num="8.4a3"/>
        <vers num="8.4a4"/>
        <vers num="8.4b1"/>
        <vers num="8.4b2"/>
        <vers num="8.5.0"/>
        <vers num="8.5_a3"/>
        <vers num="8.5a1"/>
        <vers num="8.5a2"/>
        <vers num="8.5a3"/>
        <vers num="8.5a4"/>
        <vers num="8.5a5"/>
        <vers num="8.5a6"/>
        <vers num="8.5b1"/>
        <vers num="8.5b2"/>
        <vers num="8.5b3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0554" seq="2008-0554" published="2008-02-07" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in the readImageData function in giftopnm.c in netpbm before 10.27 in netpbm before 10.27 allows remote user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted GIF image, a similar issue to CVE-2006-4484.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464056">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464056</ref>
      <ref source="UBUNTU" url="http://ubuntu.com/usn/usn-665-1">USN-665-1</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1579">DSA-1579</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:039">MDVSA-2008:039</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0131.html">RHSA-2008:0131</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27682">27682</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019358">1019358</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0460">ADV-2008-0460</ref>
      <ref source="MISC" url="https://issues.rpath.com/browse/RPL-2216">https://issues.rpath.com/browse/RPL-2216</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10975">oval:org.mitre.oval:def:10975</ref>
    </refs>
    <vuln_soft>
      <prod name="netpbm" vendor="netpbm">
        <vers num="10.26" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0555" seq="2008-0555" published="2008-04-03" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The ExpandCert function in Apache-SSL before apache_1.3.41+ssl_1.59 does not properly handle (1) '/' and (2) '=' characters in a Distinguished Name (DN) in a client certificate, which might allow remote attackers to bypass authentication via a crafted DN that triggers overwriting of environment variables.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3797">3797</ref>
      <ref source="MISC" url="http://www.apache-ssl.org/advisory-cve-2008-0555.txt">http://www.apache-ssl.org/advisory-cve-2008-0555.txt</ref>
      <ref source="MISC" url="http://www.cynops.de/advisories/CVE-2008-0555.txt">http://www.cynops.de/advisories/CVE-2008-0555.txt</ref>
      <ref source="MISC" url="http://www.klink.name/security/aklink-sa-2008-005-apache-ssl.txt">http://www.klink.name/security/aklink-sa-2008-005-apache-ssl.txt</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490386/100/0/threaded">20080402 ANNOUNCE: Apache-SSL security release - apache_1.3.41+ssl_1.59</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28576" patch="1">28576</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019784">1019784</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1079/references">ADV-2008-1079</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41618">apachessl-expandcert-information-disclosure(41618)</ref>
    </refs>
    <vuln_soft>
      <prod name="apache-ssl" vendor="apache-ssl">
        <vers num="1.3.34_1.57"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0556" seq="2008-0556" published="2008-02-18" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site request forgery (CSRF) vulnerability in OpenCA PKI 0.9.2.5, and possibly earlier versions, allows remote attackers to perform unauthorized actions as authorized users via a link or IMG tag to RAServer.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2008-February/060300.html">20080213 OpenCA XSRF (CVE-2008-0556)</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019426">1019426</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/264385">VU#264385</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0588">ADV-2008-0588</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40476">openca-certificate-csrf(40476)</ref>
      <ref source="MISC" url="https://www.cynops.de/advisories/CVE-2008-0556.txt">https://www.cynops.de/advisories/CVE-2008-0556.txt</ref>
    </refs>
    <vuln_soft>
      <prod name="openca_pki" vendor="openca">
        <vers num="0.9.2.5" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0557" seq="2008-0557" published="2008-02-04" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the CatalogShop (com_catalogshop) 1.0b1 componenent for Mambo and Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a detail action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27558">27558</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40142">catalogshop-index-sql-injection(40142)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5030">5030</ref>
    </refs>
    <vuln_soft>
      <prod name="catalogshop" vendor="mamboserver">
        <vers num="1.0b1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0558" seq="2008-0558" published="2008-02-04" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Uniwin eCart Professional before 2.0.16 allows remote attackers to inject arbitrary web script or HTML via the rp parameter to cartView.asp and unspecified other components.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27560">27560</ref>
    </refs>
    <vuln_soft>
      <prod name="ecart_professional" vendor="uniwin">
        <vers num="2.0.11"/>
        <vers num="2.0.12"/>
        <vers num="2.0.14"/>
        <vers num="2.0.15"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0559" seq="2008-0559" published="2008-02-04" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Multiple directory traversal vulnerabilities in Nilson's Blogger 0.11 allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in (1) the permalink parameter in core.php, accessed through index.php; and (2) the thispost parameter in comments.php.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3604">3604</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487384/100/0/threaded">20080131 nilson's blogger 0.11 remote file disclosure vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27559">27559</ref>
    </refs>
    <vuln_soft>
      <prod name="nilsons_blogger" vendor="nilsons_blogger">
        <vers num="0.11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0560" seq="2008-0560" published="2008-02-04" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">** DISPUTED **  PHP remote file inclusion vulnerability in cforms-css.php in Oliver Seidel cforms (contactforms), a Wordpress plugin, allows remote attackers to execute arbitrary PHP code via a URL in the tm parameter. NOTE: CVE disputes this issue for 7.3, since there is no tm parameter, and the code exits with a fatal error due to a call to an undefined function.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3605">3605</ref>
      <ref source="VIM" url="http://www.attrition.org/pipermail/vim/2008-January/001895.html">20080131 [Fwd: contactforms "cforms-css.php" Remote File Inclusion]</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487347/100/0/threaded">20080131 contactforms "cforms-css.php" Remote File Inclusion</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40143">contactform-cformscss-file-include(40143)</ref>
    </refs>
    <vuln_soft>
      <prod name="cforms" vendor="contact_forms">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0561" seq="2008-0561" published="2008-02-04" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the Arthur Konze AkoGallery (com_akogallery) 2.5 beta component for Mambo and Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a detail action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27557">27557</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40141">akogallery-index-sql-injection(40141)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5029">5029</ref>
    </refs>
    <vuln_soft>
      <prod name="akogallery" vendor="arthur_konze_webdesign">
        <vers num="2.5_beta"/>
      </prod>
      <prod name="joomla" vendor="joomla">
        <vers num=""/>
      </prod>
      <prod name="mambo" vendor="mambo">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0562" seq="2008-0562" published="2008-02-04" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the Restaurant (com_restaurant) 1.0 component for Mambo and Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a detail action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27551">27551</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40144">restaurant-index-sql-injection(40144)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5031">5031</ref>
    </refs>
    <vuln_soft>
      <prod name="joomla" vendor="mamboserver">
        <vers num="1.0"/>
      </prod>
      <prod name="mambo" vendor="mamboserver">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0563" seq="2008-0563" published="2008-02-04" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site request forgery (CSRF) vulnerability in service/impl/UserLocalServiceImpl.java in Liferay Portal 4.3.6 allows remote attackers to perform unspecified actions as unspecified authenticated users via the User-Agent HTTP header, which is used when composing Forgot Password e-mail messages in HTML format.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://support.liferay.com/browse/LEP-4737">http://support.liferay.com/browse/LEP-4737</ref>
    </refs>
    <vuln_soft>
      <prod name="liferay_enterprise_portal" vendor="liferay">
        <vers num="4.3.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0564" seq="2008-0564" published="2008-02-04" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in Mailman before 2.1.10b1 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors related to (1) editing templates and (2) the list's "info attribute" in the web administrator interface, a different vulnerability than CVE-2006-3636.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html">APPLE-SA-2010-03-29-1</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html">SUSE-SR:2008:017</ref>
      <ref source="MLIST" url="http://mail.python.org/pipermail/mailman-announce/2008-February/000096.html">[Mailman-Announce] 20080203 Mailman 2.1.10b3 Released (was: Re: Mailman 2.1.10b1 Released)</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=559308&amp;group_id=103">http://sourceforge.net/project/shownotes.php?release_id=559308&amp;group_id=103</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT4077">http://support.apple.com/kb/HT4077</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0056">http://wiki.rpath.com/Advisories:rPSA-2008-0056</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:061">MDVSA-2008:061</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2011-0307.html">RHSA-2011:0307</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488236/100/0/threaded">20080215 rPSA-2008-0056-1 mailman</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27630">27630</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-586-1">USN-586-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0422">ADV-2008-0422</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2011/0542">ADV-2011-0542</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=431526">https://bugzilla.redhat.com/show_bug.cgi?id=431526</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2207">https://issues.rpath.com/browse/RPL-2207</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00452.html">FEDORA-2008-1334</ref>
    </refs>
    <vuln_soft>
      <prod name="mailman" vendor="mailman">
        <vers num="2.1.10b" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0565" seq="2008-0565" published="2008-02-04" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in vote.php in DeltaScripts PHP Links 1.3 and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27530">27530</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5021">5021</ref>
    </refs>
    <vuln_soft>
      <prod name="php_links" vendor="deltascripts">
        <vers num="1.3" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0566" seq="2008-0566" published="2008-02-04" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in includes/smarty.php in DeltaScripts PHP Links 1.3 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the full_path_to_public_program parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27529">27529</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5022">5022</ref>
    </refs>
    <vuln_soft>
      <prod name="php_links" vendor="deltascripts">
        <vers num="1.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0567" seq="2008-0567" published="2008-02-04" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple PHP remote file inclusion vulnerabilities in ChronoEngine ChronoForms (com_chronocontact) 2.3.5 component for Joomla! allow remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter to (1) PPS/File.php, (2) Writer.php, and (3) PPS.php in excelwriter/; and (4) BIFFwriter.php, (5) Workbook.php, (6) Worksheet.php, and (7) Format.php in excelwriter/Writer/.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27531">27531</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5020">5020</ref>
    </refs>
    <vuln_soft>
      <prod name="chronoforms" vendor="chronoengine">
        <vers num="2.3.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0568" seq="2008-0568" published="2008-02-04" modified="2011-03-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the IP-authentication feature in the Secure Site 5.x-1.0 and 4.7.x-1.0 module for Drupal allows remote attackers to gain the privileges of a user who has authenticated from behind the same proxy server as the attacker.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://drupal.org/node/216019" patch="1">http://drupal.org/node/216019</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27543">27543</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0377/references">ADV-2008-0377</ref>
    </refs>
    <vuln_soft>
      <prod name="secure_site_module" vendor="drupal">
        <vers num="4.7"/>
        <vers num="5.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0569" seq="2008-0569" published="2008-02-04" modified="2011-03-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">The Comment Upload 4.7.x before 4.7.x-0.1 and 5.x before 5.x-0.1 module for Drupal does not properly use functions in the upload module, which allows remote attackers to bypass upload validation, and upload arbitrary files and possibly execute arbitrary code, via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://drupal.org/node/216024">http://drupal.org/node/216024</ref>
      <ref source="CONFIRM" url="http://drupal.org/node/216035">http://drupal.org/node/216035</ref>
      <ref source="CONFIRM" url="http://drupal.org/node/216036">http://drupal.org/node/216036</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27544">27544</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0374/references">ADV-2008-0374</ref>
    </refs>
    <vuln_soft>
      <prod name="comment_upload_module" vendor="drupal">
        <vers num="4.7"/>
        <vers num="5.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0570" seq="2008-0570" published="2008-02-04" modified="2011-03-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The OpenID 5.x-1.0 and earlier module for Drupal does not properly verify the claimed_id returned by an OpenID provider, which allows remote OpenID providers to spoof OpenID authentication for domains associated with other providers.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://drupal.org/node/216022">http://drupal.org/node/216022</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27542">27542</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0373/references">ADV-2008-0373</ref>
    </refs>
    <vuln_soft>
      <prod name="openid" vendor="drupal">
        <vers num="5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0571" seq="2008-0571" published="2008-02-04" modified="2011-03-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The point moderation form in the Userpoints 4.7.x before 4.7.x-2.3, 5.x-2 before 5.x-2.16, and 5.x-3 before 5.x-3.3 module for Drupal does not follow Drupal's Forms API submission model, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks and manipulate points.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://drupal.org/node/216023" patch="1">http://drupal.org/node/216023</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0375/references">ADV-2008-0375</ref>
    </refs>
    <vuln_soft>
      <prod name="userpoints_module" vendor="drupal">
        <vers num="4.7"/>
        <vers num="5.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0572" seq="2008-0572" published="2008-02-04" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple PHP remote file inclusion vulnerabilities in Mindmeld 1.2.0.10 allow remote attackers to execute arbitrary PHP code via a URL in the MM_GLOBALS[home] parameter to (1) acweb/admin_index.php; and (2) ask.inc.php, (3) learn.inc.php, (4) manage.inc.php, (5) mind.inc.php, and (6) sensory.inc.php in include/.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27538">27538</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5026">5026</ref>
    </refs>
    <vuln_soft>
      <prod name="mindmeld" vendor="mindmeld">
        <vers num="1.2.0.10"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0573" seq="2008-0573" published="2008-02-04" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">IPSecDrv.sys 10.4.0.12 in SafeNET HighAssurance Remote and SoftRemote allows local users to gain privileges via a crafted IPSECDRV_IOCTL IOCTL request.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27496">27496</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019282">1019282</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0333">ADV-2008-0333</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5004">5004</ref>
    </refs>
    <vuln_soft>
      <prod name="ipsecdrv.sys" vendor="safenet">
        <vers num="10.4.0.12"/>
      </prod>
      <prod name="safenet_highassurance_remote" vendor="safenet">
        <vers num="1.4.12"/>
      </prod>
      <prod name="softremote_vpn_client" vendor="safenet">
        <vers num="1.4.12"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0574" seq="2008-0574" published="2008-02-04" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php in webSPELL 4.01.02 allows remote attackers to inject arbitrary web script or HTML via the sort parameter in a whoisonline action.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3606">3606</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487312/100/0/threaded">20080130 Webspell 4.01.02 2 Vulnerabilites</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27517">27517</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40084">webspell-index-xss(40084)</ref>
    </refs>
    <vuln_soft>
      <prod name="webspell" vendor="webspell">
        <vers num="4.01.02"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0575" seq="2008-0575" published="2008-02-04" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site request forgery (CSRF) vulnerability in admin/admincenter.php in webSPELL 4.01.02 allows remote attackers to assign the superadmin privilege level to arbitrary accounts as administrators via an "update member" action.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3606">3606</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487312/100/0/threaded">20080130 Webspell 4.01.02 2 Vulnerabilites</ref>
    </refs>
    <vuln_soft>
      <prod name="webspell" vendor="webspell">
        <vers num="4.01.02"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0576" seq="2008-0576" published="2008-02-04" modified="2011-03-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the Project Issue Tracking module 5.x-2.x-dev before 20080130 in the 5.x-2.x series, 5.x-1.2 and earlier in the 5.x-1.x series, 4.7.x-2.6 and earlier in the 4.7.x-2.x series, and 4.7.x-1.6 and earlier in the 4.7.x-1.x series for Drupal allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors that write to summary table pages.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://drupal.org/node/216062">http://drupal.org/node/216062</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0376/references">ADV-2008-0376</ref>
    </refs>
    <vuln_soft>
      <prod name="project_issue_tracking_module" vendor="drupal">
        <vers num="4.7"/>
        <vers num="5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0577" seq="2008-0577" published="2008-02-04" modified="2011-03-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">The Project Issue Tracking module 5.x-2.x-dev before 20080130 in the 5.x-2.x series, 5.x-1.2 and earlier in the 5.x-1.x series, 4.7.x-2.6 and earlier in the 4.7.x-2.x series, and 4.7.x-1.6 and earlier in the 4.7.x-1.x series for Drupal (1) does not restrict the extensions of attached files when the Upload module is enabled for issue nodes, which allows remote attackers to upload and possibly execute arbitrary files; and (2) accepts the .html extension within the bundled file-upload functionality, which allows remote attackers to upload files containing arbitrary web script or HTML.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://drupal.org/node/216063">http://drupal.org/node/216063</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0376/references">ADV-2008-0376</ref>
    </refs>
    <vuln_soft>
      <prod name="project_issue_tracking_module" vendor="drupal">
        <vers num="4.7"/>
        <vers num="5.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0578" seq="2008-0578" published="2008-02-04" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the web management login page in Tripwire Enterprise 7.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3610">3610</ref>
      <ref source="MISC" url="http://www.liquidmatrix.org/blog/2008/01/29/advisory-tripwire-enterprise-xss-vulnerability">http://www.liquidmatrix.org/blog/2008/01/29/advisory-tripwire-enterprise-xss-vulnerability</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487229/100/0/threaded">20080129 Advisory: Tripwire Enterprise/Server XSS Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27486">27486</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019279">1019279</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0372/references">ADV-2008-0372</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40016">tripwire-login-xss(40016)</ref>
    </refs>
    <vuln_soft>
      <prod name="tripwire_enterprise" vendor="tripwire">
        <vers num="7.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0579" seq="2008-0579" published="2008-02-04" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the buslicense (com_buslicense) component for Joomla! allows remote attackers to execute arbitrary SQL commands via the aid parameter in a list action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27508">27508</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0359/references">ADV-2008-0359</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5011">5011</ref>
    </refs>
    <vuln_soft>
      <prod name="com_buslicense" vendor="joomla">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0580" seq="2008-0580" published="2008-02-04" modified="2018-10-15" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Geert Moernaut LSrunasE and Supercrypt use an encryption key composed of an SHA1 hash of a fixed string embedded in the executable file, which makes it easier for local users to obtain this key without reverse engineering.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3611">3611</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487269/100/0/threaded">20080129 Insecure Use of RC4 in LSrunasE and Supercrypt (CVE-2007-6340)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27500">27500</ref>
    </refs>
    <vuln_soft>
      <prod name="lsrunase" vendor="geert_moernaut">
        <vers num=""/>
      </prod>
      <prod name="supercrypt" vendor="geert_moernaut">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0581" seq="2008-0581" published="2008-02-04" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Geert Moernaut LSrunasE allows local users to gain privileges by obtaining the encrypted password from a batch file, and constructing a modified batch file that specifies this password in the /password switch and specifies an arbitrary program in the /command switch.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3611">3611</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487269/100/0/threaded">20080129 Insecure Use of RC4 in LSrunasE and Supercrypt (CVE-2007-6340)</ref>
    </refs>
    <vuln_soft>
      <prod name="lsrunase" vendor="moernaut">
        <vers num="1.0"/>
      </prod>
      <prod name="supercrypt" vendor="moernaut">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0582" seq="2008-0582" published="2008-02-04" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-zone scripting vulnerability in the Internet Explorer web control in Skype 3.1 through 3.6.0.244 on Windows allows remote attackers to inject arbitrary web script or HTML in the Local Machine Zone via the Full Name field of a reviewer of a business item entry, accessible through (1) the SkypeFind dialog and (2) a skype:?skypefind URI for the skype: URI handler.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aviv.raffon.net/2008/01/31/AttackersCanSkypeFindYou.aspx">http://aviv.raffon.net/2008/01/31/AttackersCanSkypeFindYou.aspx</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/794236">VU#794236</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487370/100/0/threaded">20080131 Attackers can SkypeFind you</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27338">27338</ref>
    </refs>
    <vuln_soft>
      <prod name="skype" vendor="skype_technologies">
        <vers num="3.1"/>
        <vers num="3.2"/>
        <vers num="3.5"/>
        <vers num="3.6"/>
        <vers num="3.6.0.244"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0583" seq="2008-0583" published="2008-02-04" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-zone scripting vulnerability in the Internet Explorer web control in Skype 3.6.0.244, and earlier 3.5.x and 3.6.x versions, on Windows allows user-assisted remote attackers to inject arbitrary web script or HTML in the Local Machine Zone via the Description and unspecified other metadata fields of a Metacafe movie submitted by Metacafe Pro to the Skype video gallery, accessible through a search within the (1) "Add video to chat" or (2) "Add video to mood" dialog, a different vector than CVE-2008-0454.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aviv.raffon.net/2008/01/22/NoMoreVideosForYouComeBackWhenPatchAvailable.aspx">http://aviv.raffon.net/2008/01/22/NoMoreVideosForYouComeBackWhenPatchAvailable.aspx</ref>
      <ref source="MISC" url="http://skype.com/security/skype-sb-2008-001-update1.htm">http://skype.com/security/skype-sb-2008-001-update1.htm</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/794236">VU#794236</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27338">27338</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39754">skype-addvideotochat-code-execution(39754)</ref>
    </refs>
    <vuln_soft>
      <prod name="skype" vendor="skype_technologies">
        <vers num="3.5"/>
        <vers num="3.6"/>
        <vers num="3.6.216"/>
        <vers num="3.6.244"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0584" seq="2008-0584" published="2008-02-04" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple buffer overflows in bos.rte.control in IBM AIX 5.2 and 5.3 allow local users to gain privileges via unspecified vectors related to the (1) swap, (2) swapoff, and (3) swapon programs.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IY96095">IY96095</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IY96101">IY96101</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27432">27432</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0261">ADV-2008-0261</ref>
      <ref source="CONFIRM" url="http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4064">http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4064</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5744">oval:org.mitre.oval:def:5744</ref>
    </refs>
    <vuln_soft>
      <prod name="aix" vendor="ibm">
        <vers num="5.2"/>
        <vers num="5.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0585" seq="2008-0585" published="2008-02-04" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.6" CVSS_base_score="6.6" CVSS_impact_subscore="9.2" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:N)">
    <desc>
      <descript source="cve">sysmgt.websm.webaccess in IBM AIX 5.2 and 5.3 has world writable permissions for unspecified WebSM Remote Client files, which allows local users to "alter the behavior of" this client by overwriting these files.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IY97257">IY97257</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27433">27433</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0261">ADV-2008-0261</ref>
      <ref source="CONFIRM" url="http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4066">http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4066</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39906">aix-websm-insecure-permissions(39906)</ref>
    </refs>
    <vuln_soft>
      <prod name="aix" vendor="ibm">
        <vers num="5.2"/>
        <vers num="5.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0586" seq="2008-0586" published="2008-02-04" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple buffer overflows in IBM AIX 5.2 and 5.3 allow local users to gain privileges via unspecified vectors related to the (1) lchangevg, (2) ldeletepv, (3) putlvodm, (4) lvaryoffvg, and (5) lvgenminor programs in bos.rte.lvm; and the (6) tellclvmd program in bos.clvm.enh.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://aix.software.ibm.com/aix/efixes/security/lvm_advisory.asc">http://aix.software.ibm.com/aix/efixes/security/lvm_advisory.asc</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IY98331">IY98331</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IY98340">IY98340</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IY99537">IY99537</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ00559">IZ00559</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ10828">IZ10828</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27431">27431</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0261">ADV-2008-0261</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/docview.wss?uid=isg1IY98448">IY98448</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/docview.wss?uid=isg1IY98450">IY98450</ref>
      <ref source="CONFIRM" url="http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4068">http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4068</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39907">aix-lvm-commands-bo(39907)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5704">oval:org.mitre.oval:def:5704</ref>
    </refs>
    <vuln_soft>
      <prod name="aix" vendor="ibm">
        <vers num="5.2"/>
        <vers num="5.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0587" seq="2008-0587" published="2008-02-04" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the uspchrp program in devices.chrp.base.diag in IBM AIX 5.2 and 5.3 allows local users to gain privileges via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ06261">IZ06261</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ06489">IZ06489</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ06621">IZ06621</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27429">27429</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0261">ADV-2008-0261</ref>
      <ref source="CONFIRM" url="http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4072">http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4072</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39910">aix-uspchrp-bo(39910)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5686">oval:org.mitre.oval:def:5686</ref>
    </refs>
    <vuln_soft>
      <prod name="aix" vendor="ibm">
        <vers num="5.2"/>
        <vers num="5.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0588" seq="2008-0588" published="2008-02-04" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the utape program in devices.scsi.tape.diag in IBM AIX 5.2 and 5.3 allows local users to gain privileges via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ06260" patch="1">IZ06260</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ06488" patch="1">IZ06488</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ06620" patch="1">IZ06620</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27430">27430</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0261">ADV-2008-0261</ref>
      <ref source="CONFIRM" url="http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4070">http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4070</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39909">aix-utape-bo(39909)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5572">oval:org.mitre.oval:def:5572</ref>
    </refs>
    <vuln_soft>
      <prod name="aix" vendor="ibm">
        <vers num="5.2"/>
        <vers num="5.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0589" seq="2008-0589" published="2008-02-04" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.9" CVSS_base_score="4.9" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:N/A:N)">
    <desc>
      <descript source="cve">The ps program in bos.rte.control in IBM AIX 5.2, 5.3, and 6.1 allows local users to obtain sensitive information via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019265">1019265</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ11242">IZ11242</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ11243">IZ11243</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ11244">IZ11244</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ12745">IZ12745</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27434">27434</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0261">ADV-2008-0261</ref>
      <ref source="CONFIRM" url="http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4075">http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4075</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39911">aix-ps-information-disclosure(39911)</ref>
    </refs>
    <vuln_soft>
      <prod name="aix" vendor="ibm">
        <vers num="5.2"/>
        <vers num="5.3"/>
        <vers num="6.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0590" seq="2008-0590" published="2008-02-05" modified="2019-08-13" severity="High" CVSS_version="2.0" CVSS_score="9.0" CVSS_base_score="9.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in Ipswitch WS_FTP Server with SSH 6.1.0.0 allows remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via a long opendir command.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3609">3609</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487441/100/0/threaded">20080202 IpSwitch WS_FTPSERVER with SSH remote Buffer Overflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27573">27573</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0400/references">ADV-2008-0400</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5044">5044</ref>
    </refs>
    <vuln_soft>
      <prod name="ipswitch_ws_ftp_server" vendor="progress">
        <vers num="6.1.0.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0591" seq="2008-0591" published="2008-02-08" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Mozilla Firefox before 2.0.0.12 and Thunderbird before 2.0.0.12 does not properly manage a delay timer used in confirmation dialogs, which might allow remote attackers to trick users into confirming an unsafe action, such as remote file execution, by using a timer to change the window focus, aka the "dialog refocus bug" or "ffclick2".</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2007-06/0026.html">20070604 Assorted browser vulnerabilities</ref>
      <ref source="CONFIRM" url="http://browser.netscape.com/releasenotes/">http://browser.netscape.com/releasenotes/</ref>
      <ref source="MISC" url="http://lcamtuf.coredump.cx/ffclick2/">http://lcamtuf.coredump.cx/ffclick2/</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00006.html">SUSE-SA:2008:008</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/2781">2781</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1">238492</ref>
      <ref source="CONFIRM" url="http://support.novell.com/techcenter/psdb/6251b18e050302ebe7fe74294b55c818.html">http://support.novell.com/techcenter/psdb/6251b18e050302ebe7fe74294b55c818.html</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0051">http://wiki.rpath.com/Advisories:rPSA-2008-0051</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0093">http://wiki.rpath.com/Advisories:rPSA-2008-0093</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0093">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0093</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1484">DSA-1484</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1485">DSA-1485</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1489">DSA-1489</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1506">DSA-1506</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml">GLSA-200805-18</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:048">MDVSA-2008:048</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:062">MDVSA-2008:062</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/security/announce/2008/mfsa2008-08.html">http://www.mozilla.org/security/announce/2008/mfsa2008-08.html</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0103.html">RHSA-2008:0103</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0104.html" adv="1">RHSA-2008:0104</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0105.html" adv="1">RHSA-2008:0105</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/470446/100/0/threaded">20070604 Assorted browser vulnerabilities</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487826/100/0/threaded">20080209 rPSA-2008-0051-1 firefox</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488002/100/0/threaded">20080212 FLEA-2008-0001-1 firefox</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488971/100/0/threaded">20080229 rPSA-2008-0093-1 thunderbird</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/24293">24293</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27683">27683</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019339">1019339</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-576-1">USN-576-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0453/references">ADV-2008-0453</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0454/references">ADV-2008-0454</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0627/references">ADV-2008-0627</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1793/references">ADV-2008-1793</ref>
      <ref source="CONFIRM" url="https://bugzilla.mozilla.org/show_bug.cgi?id=376473">https://bugzilla.mozilla.org/show_bug.cgi?id=376473</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-1995">https://issues.rpath.com/browse/RPL-1995</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10900">oval:org.mitre.oval:def:10900</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00274.html">FEDORA-2008-1435</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00309.html">FEDORA-2008-1459</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00381.html">FEDORA-2008-1535</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00905.html">FEDORA-2008-2060</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00946.html">FEDORA-2008-2118</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="2.0.0.11" prev="1"/>
      </prod>
      <prod name="thunderbird" vendor="mozilla">
        <vers num="2.0.0.11" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0592" seq="2008-0592" published="2008-02-08" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8 allows user-assisted remote attackers to cause a denial of service via a plain .txt file with a "Content-Disposition: attachment" and an invalid "Content-Type: plain/text," which prevents Firefox from rendering future plain text files within the browser.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://browser.netscape.com/releasenotes/">http://browser.netscape.com/releasenotes/</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00006.html">SUSE-SA:2008:008</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1">238492</ref>
      <ref source="CONFIRM" url="http://support.novell.com/techcenter/psdb/6251b18e050302ebe7fe74294b55c818.html">http://support.novell.com/techcenter/psdb/6251b18e050302ebe7fe74294b55c818.html</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0051">http://wiki.rpath.com/Advisories:rPSA-2008-0051</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1484">DSA-1484</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1485">DSA-1485</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1489">DSA-1489</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1506">DSA-1506</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml">GLSA-200805-18</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:048">MDVSA-2008:048</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/security/announce/2008/mfsa2008-09.html">http://www.mozilla.org/security/announce/2008/mfsa2008-09.html</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0103.html">RHSA-2008:0103</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0104.html">RHSA-2008:0104</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0105.html">RHSA-2008:0105</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487826/100/0/threaded">20080209 rPSA-2008-0051-1 firefox</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488002/100/0/threaded">20080212 FLEA-2008-0001-1 firefox</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27683">27683</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019340">1019340</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-576-1">USN-576-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0453/references">ADV-2008-0453</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0627/references">ADV-2008-0627</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1793/references">ADV-2008-1793</ref>
      <ref source="CONFIRM" url="https://bugzilla.mozilla.org/show_bug.cgi?id=387258">https://bugzilla.mozilla.org/show_bug.cgi?id=387258</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9972">oval:org.mitre.oval:def:9972</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00274.html">FEDORA-2008-1435</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00309.html">FEDORA-2008-1459</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00381.html">FEDORA-2008-1535</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00905.html">FEDORA-2008-2060</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00946.html">FEDORA-2008-2118</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="2.0.0.11" prev="1"/>
      </prod>
      <prod name="seamonkey" vendor="mozilla">
        <vers num="1.1.7" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0593" seq="2008-0593" published="2008-02-08" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Gecko-based browsers, including Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8, modify the .href property of stylesheet DOM nodes to the final URI of a 302 redirect, which might allow remote attackers to bypass the Same Origin Policy and read sensitive information from the original URL, such as with Single-Signon systems.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://browser.netscape.com/releasenotes/">http://browser.netscape.com/releasenotes/</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00006.html">SUSE-SA:2008:008</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1">238492</ref>
      <ref source="CONFIRM" url="http://support.novell.com/techcenter/psdb/6251b18e050302ebe7fe74294b55c818.html">http://support.novell.com/techcenter/psdb/6251b18e050302ebe7fe74294b55c818.html</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0051">http://wiki.rpath.com/Advisories:rPSA-2008-0051</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1484">DSA-1484</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1485">DSA-1485</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1489">DSA-1489</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1506">DSA-1506</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml">GLSA-200805-18</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:048">MDVSA-2008:048</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/security/announce/2008/mfsa2008-10.html">http://www.mozilla.org/security/announce/2008/mfsa2008-10.html</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0103.html" adv="1">RHSA-2008:0103</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0104.html" adv="1">RHSA-2008:0104</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0105.html" adv="1">RHSA-2008:0105</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487826/100/0/threaded">20080209 rPSA-2008-0051-1 firefox</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27683">27683</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019341">1019341</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-576-1">USN-576-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0453/references" adv="1">ADV-2008-0453</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0627/references" adv="1">ADV-2008-0627</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1793/references" adv="1">ADV-2008-1793</ref>
      <ref source="CONFIRM" url="https://bugzilla.mozilla.org/show_bug.cgi?id=397427">https://bugzilla.mozilla.org/show_bug.cgi?id=397427</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10075">oval:org.mitre.oval:def:10075</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00274.html">FEDORA-2008-1435</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00309.html">FEDORA-2008-1459</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00381.html">FEDORA-2008-1535</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00905.html">FEDORA-2008-2060</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00946.html">FEDORA-2008-2118</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="0.2"/>
        <vers num="0.9.2"/>
        <vers num="1.0.2"/>
        <vers num="1.5.0.2"/>
        <vers num="1.5.0.12"/>
        <vers num="1.5.2"/>
        <vers num="2.0"/>
        <vers num="2.0.0.1"/>
        <vers num="2.0.0.10"/>
        <vers num="2.0.0.11" prev="1"/>
      </prod>
      <prod name="seamonkey" vendor="mozilla">
        <vers num="1.0" edition=":alpha"/>
        <vers num="1.0" edition=":beta"/>
        <vers num="1.0" edition=":dev"/>
        <vers num="1.0" edition="alpha"/>
        <vers num="1.0" edition="beta"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.4"/>
        <vers num="1.0.5"/>
        <vers num="1.0.6"/>
        <vers num="1.0.7"/>
        <vers num="1.0.8"/>
        <vers num="1.0.9"/>
        <vers num="1.0.99"/>
        <vers num="1.1"/>
        <vers num="1.1.1"/>
        <vers num="1.1.2"/>
        <vers num="1.1.10"/>
        <vers num="1.1.11"/>
        <vers num="1.1.12"/>
        <vers num="1.1.13"/>
        <vers num="1.1.14"/>
        <vers num="1.1.15"/>
        <vers num="1.1.16"/>
        <vers num="1.1.17" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0594" seq="2008-0594" published="2008-02-08" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Mozilla Firefox before 2.0.0.12 does not always display a web forgery warning dialog if the entire contents of a web page are in a DIV tag that uses absolute positioning, which makes it easier for remote attackers to conduct phishing attacks.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://browser.netscape.com/releasenotes/">http://browser.netscape.com/releasenotes/</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00006.html">SUSE-SA:2008:008</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1">238492</ref>
      <ref source="CONFIRM" url="http://support.novell.com/techcenter/psdb/6251b18e050302ebe7fe74294b55c818.html">http://support.novell.com/techcenter/psdb/6251b18e050302ebe7fe74294b55c818.html</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0051">http://wiki.rpath.com/Advisories:rPSA-2008-0051</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1484">DSA-1484</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1485">DSA-1485</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1489">DSA-1489</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1506">DSA-1506</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml">GLSA-200805-18</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:048">MDVSA-2008:048</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/security/announce/2008/mfsa2008-11.html">http://www.mozilla.org/security/announce/2008/mfsa2008-11.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487826/100/0/threaded">20080209 rPSA-2008-0051-1 firefox</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488002/100/0/threaded">20080212 FLEA-2008-0001-1 firefox</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27683">27683</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019342">1019342</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-576-1">USN-576-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0453/references">ADV-2008-0453</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0627/references">ADV-2008-0627</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1793/references">ADV-2008-1793</ref>
      <ref source="CONFIRM" url="https://bugzilla.mozilla.org/show_bug.cgi?id=408164">https://bugzilla.mozilla.org/show_bug.cgi?id=408164</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00274.html">FEDORA-2008-1435</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00381.html">FEDORA-2008-1535</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="2.0.0.11" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0595" seq="2008-0595" published="2008-02-29" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">dbus-daemon in D-Bus before 1.0.3, and 1.1.x before 1.1.20, recognizes send_interface attributes in allow directives in the security policy only for fully qualified method calls, which allows local users to bypass intended access restrictions via a method call with a NULL interface.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MLIST" url="http://lists.freedesktop.org/archives/dbus/2008-February/009401.html" patch="1">[dbus] 20080227 [ANNOUNCE] CVE-2008-0595 D-Bus Security Releases - D-Bus 1.0.3 and D-Bus 1.1.20</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html">SUSE-SR:2008:006</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-updates/2012-10/msg00094.html">openSUSE-SU-2012:1418</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019512">1019512</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0099">http://wiki.rpath.com/Advisories:rPSA-2008-0099</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0099">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0099</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1599">DSA-1599</ref>
      <ref source="CONFIRM" url="http://www.j5live.com/2008/02/27/announce-d-bus-1120-conisten-water-released/">http://www.j5live.com/2008/02/27/announce-d-bus-1120-conisten-water-released/</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:054">MDVSA-2008:054</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0159.html">RHSA-2008:0159</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489280/100/0/threaded">20080307 rPSA-2008-0099-1 dbus dbus-glib dbus-qt dbus-x11</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28023" patch="1">28023</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-653-1">USN-653-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0694">ADV-2008-0694</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2282">https://issues.rpath.com/browse/RPL-2282</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9353">oval:org.mitre.oval:def:9353</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00893.html">FEDORA-2008-2043</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00911.html">FEDORA-2008-2070</ref>
    </refs>
    <vuln_soft>
      <prod name="inter-process_communication_system" vendor="d-bus">
        <vers num="0.13"/>
        <vers num="0.20"/>
        <vers num="0.21"/>
        <vers num="0.22"/>
        <vers num="0.23"/>
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.1.4"/>
      </prod>
      <prod name="mandrake_linux" vendor="mandrakesoft">
        <vers num="2007"/>
        <vers num="2007.0_x86_64"/>
        <vers num="2007.1" edition=":x86-64"/>
        <vers num="2008.0" edition=":x86-64"/>
      </prod>
      <prod name="enterprise_linux" vendor="red_hat">
        <vers num="5" edition=":server"/>
      </prod>
      <prod name="enterprise_linux_desktop" vendor="red_hat">
        <vers num="5" edition=":client"/>
      </prod>
      <prod name="enterprise_linux_desktop_workstation" vendor="red_hat">
        <vers num="5" edition=":client"/>
      </prod>
      <prod name="fedora" vendor="redhat">
        <vers num="7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0596" seq="2008-0596" published="2008-02-25" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Memory leak in CUPS before 1.1.22, and possibly other versions, allows remote attackers to cause a denial of service (memory consumption and daemon crash) via a large number of requests to add and remove shared printers.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307562">http://docs.info.apple.com/article.html?artnum=307562</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html">APPLE-SA-2008-03-18</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00000.html">SUSE-SA:2008:012</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2008-084.htm">http://support.avaya.com/elmodocs2/security/ASA-2008-084.htm</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2008-098.htm">http://support.avaya.com/elmodocs2/security/ASA-2008-098.htm</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0091">http://wiki.rpath.com/Advisories:rPSA-2008-0091</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0091">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0091</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:050">MDVSA-2008:050</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0153.html">RHSA-2008:0153</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0161.html">RHSA-2008:0161</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488966/100/0/threaded">20080229 rPSA-2008-0091-1 cups</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27988">27988</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019497">1019497</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0924/references">ADV-2008-0924</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40842">cups-ippbrowse-memoryleak-dos(40842)</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2283">https://issues.rpath.com/browse/RPL-2283</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10857">oval:org.mitre.oval:def:10857</ref>
    </refs>
    <vuln_soft>
      <prod name="cups" vendor="easy_software_products">
        <vers num="1.1.17"/>
        <vers num="1.1.22"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0597" seq="2008-0597" published="2008-02-25" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Use-after-free vulnerability in CUPS before 1.1.22, and possibly other versions, allows remote attackers to cause a denial of service (crash) via crafted IPP packets.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00000.html">SUSE-SA:2008:012</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2008-084.htm">http://support.avaya.com/elmodocs2/security/ASA-2008-084.htm</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2008-098.htm">http://support.avaya.com/elmodocs2/security/ASA-2008-098.htm</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0091">http://wiki.rpath.com/Advisories:rPSA-2008-0091</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0091">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0091</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:050">MDVSA-2008:050</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0153.html">RHSA-2008:0153</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0161.html">RHSA-2008:0161</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488966/100/0/threaded">20080229 rPSA-2008-0091-1 cups</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27988">27988</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019497">1019497</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40845">cups-ippbrowse-useafterfree-dos(40845)</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2283">https://issues.rpath.com/browse/RPL-2283</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9492">oval:org.mitre.oval:def:9492</ref>
    </refs>
    <vuln_soft>
      <prod name="cups" vendor="easy_software_products">
        <vers num="1.1.17"/>
        <vers num="1.1.22"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0598" seq="2008-0598" published="2008-06-30" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.9" CVSS_base_score="4.9" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:N/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the 32-bit and 64-bit emulation in the Linux kernel 2.6.9, 2.6.18, and probably other versions allows local users to read uninitialized memory via unknown vectors involving a crafted binary.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00000.html">SUSE-SA:2008:047</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00001.html">SUSE-SA:2008:048</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00003.html">SUSE-SA:2008:049</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2008-0508.html">RHSA-2008:0508</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1630">DSA-1630</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:220">MDVSA-2008:220</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0519.html">RHSA-2008:0519</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0973.html">RHSA-2008:0973</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2009-0009.html">RHSA-2009:0009</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29942">29942</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020367">1020367</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-625-1">USN-625-1</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=433938">https://bugzilla.redhat.com/show_bug.cgi?id=433938</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43554">linux-kernel-emulation-disclosure(43554)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10721">oval:org.mitre.oval:def:10721</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6201">oval:org.mitre.oval:def:6201</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.6.9"/>
        <vers num="2.6.18"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0599" seq="2008-0599" published="2008-05-05" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The init_request_info function in sapi/cgi/cgi_main.c in PHP before 5.2.6 does not properly consider operator precedence when calculating the length of PATH_TRANSLATED, which might allow remote attackers to execute arbitrary code via a crafted URI.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://cvs.php.net/viewvc.cgi/php-src/sapi/cgi/cgi_main.c?r1=1.267.2.15.2.50.2.12&amp;r2=1.267.2.15.2.50.2.13&amp;diff_format=u">http://cvs.php.net/viewvc.cgi/php-src/sapi/cgi/cgi_main.c?r1=1.267.2.15.2.50.2.12&amp;r2=1.267.2.15.2.50.2.13&amp;diff_format=u</ref>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01476437">HPSBUX02342</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html">APPLE-SA-2008-07-31</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=124654546101607&amp;w=2">SSRT090085</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=125631037611762&amp;w=2">HPSBUX02465</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200811-05.xml">GLSA-200811-05</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0176">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0176</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/147027">VU#147027</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:127">MDVSA-2008:127</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:128">MDVSA-2008:128</ref>
      <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/05/02/2">[oss-security] 20080502 CVE Request (PHP)</ref>
      <ref source="CONFIRM" url="http://www.php.net/ChangeLog-5.php">http://www.php.net/ChangeLog-5.php</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0505.html">RHSA-2008:0505</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492535/100/0/threaded">20080523 rPSA-2008-0176-1 php php-cgi php-imap php-mcrypt php-mysql php-mysqli php-pgsql php-soap php-xsl php5 php5-cgi php5-imap php5-mcrypt php5-mysql php5-mysqli php5-pear php5-pgsql php5-soap php5-xsl</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29009">29009</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019958">1019958</ref>
      <ref source="SLACKWARE" url="http://www.slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.488951">SSA:2008-128-01</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-628-1">USN-628-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1412">ADV-2008-1412</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1810/references">ADV-2008-1810</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2268">ADV-2008-2268</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42137">php-vector-unspecified(42137)</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2503">https://issues.rpath.com/browse/RPL-2503</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5510">oval:org.mitre.oval:def:5510</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00773.html">FEDORA-2008-3864</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00779.html">FEDORA-2008-3606</ref>
    </refs>
    <vuln_soft>
      <prod name="php" vendor="php">
        <vers num="5.0.0" edition="beta1"/>
        <vers num="5.0.0" edition="beta2"/>
        <vers num="5.0.0" edition="beta3"/>
        <vers num="5.0.0" edition="beta4"/>
        <vers num="5.0.0" edition="rc1"/>
        <vers num="5.0.0" edition="rc2"/>
        <vers num="5.0.0" edition="rc3"/>
        <vers num="5.0.1"/>
        <vers num="5.0.2"/>
        <vers num="5.0.3"/>
        <vers num="5.0.4"/>
        <vers num="5.0.5"/>
        <vers num="5.1.0"/>
        <vers num="5.1.1"/>
        <vers num="5.1.2"/>
        <vers num="5.1.3"/>
        <vers num="5.1.4"/>
        <vers num="5.1.5"/>
        <vers num="5.1.6"/>
        <vers num="5.2.0"/>
        <vers num="5.2.1"/>
        <vers num="5.2.2"/>
        <vers num="5.2.3"/>
        <vers num="5.2.4"/>
        <vers num="5.2.5" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0600" seq="2008-0600" published="2008-02-12" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00005.html">SUSE-SA:2008:007</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.html">SUSE-SA:2008:013</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html">SUSE-SA:2008:030</ref>
      <ref source="MLIST" url="http://marc.info/?l=linux-kernel&amp;m=120263652322197&amp;w=2">[linux-kernel] 20080210 Re: [PATCH] kernel 2.6.24.1 still vulnerable to the vmsplice local root exploit</ref>
      <ref source="MLIST" url="http://marc.info/?l=linux-kernel&amp;m=120264520431307&amp;w=2">[linux-kernel] 20080210 Re: [PATCH] kernel 2.6.24.1 still vulnerable to the vmsplice local root exploit</ref>
      <ref source="MLIST" url="http://marc.info/?l=linux-kernel&amp;m=120264773202422&amp;w=2">[linux-kernel] 20080210 Re: [PATCH] kernel 2.6.24.1 still vulnerable to the vmsplice local root exploit</ref>
      <ref source="MLIST" url="http://marc.info/?l=linux-kernel&amp;m=120266328220808&amp;w=2">[linux-kernel] 20080210 Re: [PATCH] kernel 2.6.24.1 still vulnerable to the vmsplice local root exploit</ref>
      <ref source="MLIST" url="http://marc.info/?l=linux-kernel&amp;m=120266353621139&amp;w=2">[linux-kernel] 20080210 Re: [PATCH] kernel 2.6.24.1 still vulnerable to the vmsplice local root exploit</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019393">1019393</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0052">http://wiki.rpath.com/Advisories:rPSA-2008-0052</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0052">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0052</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1494">DSA-1494</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:043">MDVSA-2008:043</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:044">MDVSA-2008:044</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0129.html">RHSA-2008:0129</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488009/100/0/threaded">20080212 rPSA-2008-0052-1 kernel</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27704">27704</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27801">27801</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-577-1">USN-577-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0487/references">ADV-2008-0487</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=432229">https://bugzilla.redhat.com/show_bug.cgi?id=432229</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=432517">https://bugzilla.redhat.com/show_bug.cgi?id=432517</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2237">https://issues.rpath.com/browse/RPL-2237</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11358">oval:org.mitre.oval:def:11358</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5092">5092</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00254.html">FEDORA-2008-1422</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00255.html">FEDORA-2008-1423</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00270.html">FEDORA-2008-1433</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00485.html">FEDORA-2008-1629</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.6.17" edition="rc1"/>
        <vers num="2.6.17" edition="rc2"/>
        <vers num="2.6.17" edition="rc3"/>
        <vers num="2.6.17" edition="rc4"/>
        <vers num="2.6.17" edition="rc5"/>
        <vers num="2.6.17" edition="rc6"/>
        <vers num="2.6.17.1"/>
        <vers num="2.6.17.2"/>
        <vers num="2.6.17.3"/>
        <vers num="2.6.17.4"/>
        <vers num="2.6.17.5"/>
        <vers num="2.6.17.6"/>
        <vers num="2.6.17.7"/>
        <vers num="2.6.17.8"/>
        <vers num="2.6.17.9"/>
        <vers num="2.6.17.10"/>
        <vers num="2.6.17.11"/>
        <vers num="2.6.17.12"/>
        <vers num="2.6.17.13"/>
        <vers num="2.6.17.14"/>
        <vers num="2.6.18" edition="rc1"/>
        <vers num="2.6.18" edition="rc2"/>
        <vers num="2.6.18" edition="rc3"/>
        <vers num="2.6.18" edition="rc4"/>
        <vers num="2.6.18" edition="rc5"/>
        <vers num="2.6.18" edition="rc6"/>
        <vers num="2.6.18" edition="rc7"/>
        <vers num="2.6.18.1"/>
        <vers num="2.6.18.2"/>
        <vers num="2.6.18.3"/>
        <vers num="2.6.18.4"/>
        <vers num="2.6.18.5"/>
        <vers num="2.6.18.6"/>
        <vers num="2.6.18.7"/>
        <vers num="2.6.18.8"/>
        <vers num="2.6.19" edition="rc1"/>
        <vers num="2.6.19" edition="rc2"/>
        <vers num="2.6.19" edition="rc3"/>
        <vers num="2.6.19" edition="rc4"/>
        <vers num="2.6.19.1"/>
        <vers num="2.6.19.2"/>
        <vers num="2.6.19.3"/>
        <vers num="2.6.20" edition="rc2"/>
        <vers num="2.6.20.1"/>
        <vers num="2.6.20.2"/>
        <vers num="2.6.20.3"/>
        <vers num="2.6.20.4"/>
        <vers num="2.6.20.5"/>
        <vers num="2.6.20.6"/>
        <vers num="2.6.20.7"/>
        <vers num="2.6.20.8"/>
        <vers num="2.6.20.9"/>
        <vers num="2.6.20.10"/>
        <vers num="2.6.20.11"/>
        <vers num="2.6.20.12"/>
        <vers num="2.6.20.13"/>
        <vers num="2.6.20.14"/>
        <vers num="2.6.20.15"/>
        <vers num="2.6.21" edition="git1"/>
        <vers num="2.6.21" edition="git2"/>
        <vers num="2.6.21" edition="git3"/>
        <vers num="2.6.21" edition="git4"/>
        <vers num="2.6.21" edition="git5"/>
        <vers num="2.6.21" edition="git6"/>
        <vers num="2.6.21" edition="git7"/>
        <vers num="2.6.21" edition="rc3"/>
        <vers num="2.6.21" edition="rc4"/>
        <vers num="2.6.21" edition="rc5"/>
        <vers num="2.6.21" edition="rc6"/>
        <vers num="2.6.21" edition="rc7"/>
        <vers num="2.6.21.1"/>
        <vers num="2.6.21.2"/>
        <vers num="2.6.21.3"/>
        <vers num="2.6.21.4"/>
        <vers num="2.6.22" edition="rc6"/>
        <vers num="2.6.22.1"/>
        <vers num="2.6.22.3"/>
        <vers num="2.6.22.4"/>
        <vers num="2.6.22.5"/>
        <vers num="2.6.22.6"/>
        <vers num="2.6.22.7"/>
        <vers num="2.6.22.16"/>
        <vers num="2.6.23" edition="rc1"/>
        <vers num="2.6.23" edition="rc2"/>
        <vers num="2.6.23.1"/>
        <vers num="2.6.23.2"/>
        <vers num="2.6.23.3"/>
        <vers num="2.6.23.4"/>
        <vers num="2.6.23.5"/>
        <vers num="2.6.23.6"/>
        <vers num="2.6.23.7"/>
        <vers num="2.6.23.9"/>
        <vers num="2.6.23.14"/>
        <vers num="2.6.24" edition="rc2"/>
        <vers num="2.6.24" edition="rc3"/>
        <vers num="2.6.24.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0601" seq="2008-0601" published="2008-02-06" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in All Club CMS (ACCMS) 0.0.1f and earlier allows remote attackers to execute arbitrary SQL commands via the name parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27624">27624</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5064">5064</ref>
    </refs>
    <vuln_soft>
      <prod name="all_club_cms" vendor="all_club_cms">
        <vers num="0.0.1f" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0602" seq="2008-0602" published="2008-02-06" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in index.php in All Club CMS (ACCMS) 0.0.1f and earlier allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the class_name parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5061">5061</ref>
    </refs>
    <vuln_soft>
      <prod name="all_club_cms" vendor="all_club_cms">
        <vers num="0.0.1f" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0603" seq="2008-0603" published="2008-02-06" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the amazOOP Awesom! (com_awesom) 0.3.2component for Mambo and Joomla! allows remote attackers to execute arbitrary SQL commands via the listid parameter in a viewlist task.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27607">27607</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5058">5058</ref>
    </refs>
    <vuln_soft>
      <prod name="awesom" vendor="amazoop">
        <vers num="0.3.2"/>
      </prod>
      <prod name="com_awesom" vendor="joomla">
        <vers num="0.3.2"/>
      </prod>
      <prod name="com_awesom" vendor="mambo">
        <vers num="0.3.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0604" seq="2008-0604" published="2008-02-06" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The LDAP authentication feature in XLight FTP Server before 2.83, when used with some unspecified LDAP servers, does not check for blank passwords, which allows remote attackers to bypass intended access restrictions.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27602" patch="1">27602</ref>
      <ref source="CONFIRM" url="http://www.xlightftpd.com/whatsnew.htm">http://www.xlightftpd.com/whatsnew.htm</ref>
    </refs>
    <vuln_soft>
      <prod name="xlight_ftp_server" vendor="xlight_ftp_server">
        <vers num="2.82" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0605" seq="2008-0605" published="2008-02-06" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in AstroSoft HelpDesk before 1.95.228 allow remote attackers to inject arbitrary web script or HTML via the (1) txtSearch parameter to operator/article/article_search_results.asp and the (2) Attach_Id parameter to operator/article/article_attachment.asp.  NOTE: for vector 2, the XSS occurs in a forced SQL error message.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3612">3612</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487487/100/0/threaded">20080204 [DSECRG-08-011] Astrosoft HelpDesk Multiple XSS</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488107/100/0/threaded">20080214 [DSECRG-08-011 | FIX INFORMATION] Astrosoft HelpDesk Multiple XSS</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27610">27610</ref>
    </refs>
    <vuln_soft>
      <prod name="astrosoft_helpdesk" vendor="astrosoft">
        <vers num="1.95.227" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0606" seq="2008-0606" published="2008-02-06" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the Shambo2 (com_shambo2) component for Mambo and Joomla! allows remote attackers to execute arbitrary SQL commands via the Itemid parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27609">27609</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40238">shambo2-index-sql-injection(40238)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5059">5059</ref>
    </refs>
    <vuln_soft>
      <prod name="com_shambo2" vendor="joomla">
        <vers num=""/>
      </prod>
      <prod name="com_shambo2" vendor="mambo">
        <vers num=""/>
      </prod>
      <prod name="shambo2" vendor="phil_taylor">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0607" seq="2008-0607" published="2008-02-06" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the Sigsiu Online Business Index 2 (SOBI2, com_sobi2) 2.5.3 component for Joomla! and Mambo allows remote attackers to execute arbitrary SQL commands via the catid parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27617">27617</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5038">5038</ref>
    </refs>
    <vuln_soft>
      <prod name="com_sobi2" vendor="joomla">
        <vers num=""/>
      </prod>
      <prod name="com_sobi2" vendor="mambo">
        <vers num=""/>
      </prod>
      <prod name="sobi2" vendor="sigsiu.net">
        <vers num="2.5.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0608" seq="2008-0608" published="2008-02-06" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The Logging Server (ftplogsrv.exe) 7.9.14.0 and earlier in IPSwitch WS_FTP 6.1 allows remote attackers to cause a denial of service (loss of responsiveness) via a large number of large packets to port 5151/udp, which causes the listening socket to terminate and prevents log commands from being recorded, a different vulnerability than CVE-2007-3823.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/ftplogsrvz-adv.txt">http://aluigi.altervista.org/adv/ftplogsrvz-adv.txt</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487506/100/0/threaded">20080204 Socket termination in FTP Log Server 7.9.14.0</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27612">27612</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0408">ADV-2008-0408</ref>
    </refs>
    <vuln_soft>
      <prod name="ws_ftp" vendor="ipswitch">
        <vers num="6.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0609" seq="2008-0609" published="2008-02-06" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in index.php in DivideConcept VHD Web Pack 2.0 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the page parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3613">3613</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487485/100/0/threaded">20080204 [DSECRG-08-010] VHD Web Pack 2.0 Local File Include</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27621">27621</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5060">5060</ref>
    </refs>
    <vuln_soft>
      <prod name="vhd_web_pack" vendor="divideconcept">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0610" seq="2008-0610" published="2008-02-06" modified="2012-08-13" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the ClientConnection::NegotiateProtocolVersion function in vncviewer/ClientConnection.cpp in vncviewer for UltraVNC 1.0.2 and 1.0.4 before 01252008, when in LISTENING mode or when using the DSM plugin, allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a modified size value.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://forum.ultravnc.info/viewtopic.php?t=11850">http://forum.ultravnc.info/viewtopic.php?t=11850</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=571174&amp;group_id=63887">http://sourceforge.net/project/shownotes.php?release_id=571174&amp;group_id=63887</ref>
      <ref source="CONFIRM" url="http://ultravnc.svn.sourceforge.net/viewvc/ultravnc/UltraVNC%20Project%20Root/UltraVNC/vncviewer/ClientConnection.cpp?sortby=date&amp;r1=169&amp;r2=168&amp;pathrev=169">http://ultravnc.svn.sourceforge.net/viewvc/ultravnc/UltraVNC%20Project%20Root/UltraVNC/vncviewer/ClientConnection.cpp?sortby=date&amp;r1=169&amp;r2=168&amp;pathrev=169</ref>
      <ref source="EXPLOIT-DB" url="http://www.exploit-db.com/exploits/18666">18666</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/721460">VU#721460</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27561" patch="1">27561</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019293">1019293</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0392">ADV-2008-0392</ref>
    </refs>
    <vuln_soft>
      <prod name="ultravnc" vendor="ultravnc">
        <vers num="1.0.2"/>
        <vers num="1.0.4"/>
        <vers num="1.0.4_rc6"/>
        <vers num="1.0.4_rc7"/>
        <vers num="1.0.4_rc8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0611" seq="2008-0611" published="2008-02-06" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in rmgs/images.php in the RMSOFT Gallery System 2.0 module for XOOPS allows remote attackers to execute arbitrary SQL commands via the id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27623">27623</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5062">5062</ref>
    </refs>
    <vuln_soft>
      <prod name="gallery_system" vendor="rmsoft">
        <vers num="2.0"/>
      </prod>
      <prod name="xoops" vendor="xoops">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0612" seq="2008-0612" published="2008-02-06" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in htdocs/install/index.php in XOOPS 2.0.18 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the lang parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3614">3614</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487484/100/0/threaded">20080204 [DSECRG-08-009] xoops 2.0.18 Local File Include</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27622">27622</ref>
      <ref source="CONFIRM" url="http://xoops.svn.sourceforge.net/viewvc/xoops/XoopsCore/branches/2.0.x/2.0.18.1/docs/changelog.txt?r1=1283&amp;r2=1282&amp;pathrev=1283">http://xoops.svn.sourceforge.net/viewvc/xoops/XoopsCore/branches/2.0.x/2.0.18.1/docs/changelog.txt?r1=1283&amp;r2=1282&amp;pathrev=1283</ref>
      <ref source="CONFIRM" url="http://xoops.svn.sourceforge.net/viewvc/xoops?view=rev&amp;revision=1283" patch="1">http://xoops.svn.sourceforge.net/viewvc/xoops?view=rev&amp;revision=1283</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5057">5057</ref>
    </refs>
    <vuln_soft>
      <prod name="xoops" vendor="xoops">
        <vers num="2.0.18"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0613" seq="2008-0613" published="2008-02-06" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Open redirect vulnerability in htdocs/user.php in XOOPS 2.0.18 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the xoops_redirect parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3614">3614</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/tracker/index.php?func=detail&amp;atid=430840&amp;aid=1881236&amp;group_id=41586">http://sourceforge.net/tracker/index.php?func=detail&amp;atid=430840&amp;aid=1881236&amp;group_id=41586</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487484/100/0/threaded">20080204 [DSECRG-08-009] xoops 2.0.18 Local File Include</ref>
      <ref source="CONFIRM" url="http://xoops.svn.sourceforge.net/viewvc/xoops?view=rev&amp;revision=1282" patch="1">http://xoops.svn.sourceforge.net/viewvc/xoops?view=rev&amp;revision=1282</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5057">5057</ref>
    </refs>
    <vuln_soft>
      <prod name="xoops" vendor="xoops">
        <vers num="2.0.18"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0614" seq="2008-0614" published="2008-02-06" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in Photokorn Gallery 1.543 allows remote attackers to execute arbitrary SQL commands via the pic parameter in a showpic action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27627">27627</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5065">5065</ref>
    </refs>
    <vuln_soft>
      <prod name="gallery" vendor="photokorn">
        <vers num="1.543"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0615" seq="2008-0615" published="2008-02-06" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.0" CVSS_base_score="4.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in wp-admin/admin.php in the DMSGuestbook 1.8.0 and 1.7.0 plugin for WordPress allows remote authenticated users to read arbitrary files via a .. (dot dot) in the (1) folder and (2) file parameters.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3615">3615</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487437/100/0/threaded">20080202 Wordpress Plugin dmsguestbook 1.7.0 Multiple Remote Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27575">27575</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5035">5035</ref>
    </refs>
    <vuln_soft>
      <prod name="dmsguestbook" vendor="dmsguestbook">
        <vers num="1.7"/>
        <vers num="1.8"/>
      </prod>
      <prod name="wordpress" vendor="wordpress">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0616" seq="2008-0616" published="2008-02-06" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the administration panel in the DMSGuestbook 1.7.0 plugin for WordPress allows remote authenticated administrators to execute arbitrary SQL commands via unspecified vectors.  NOTE: it is not clear whether this issue crosses privilege boundaries.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3615">3615</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487437/100/0/threaded">20080202 Wordpress Plugin dmsguestbook 1.7.0 Multiple Remote Vulnerabilities</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40196">dmsguestbook-unspecified-sql-injection(40196)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5035">5035</ref>
    </refs>
    <vuln_soft>
      <prod name="dmsguestbook" vendor="dmsguestbook">
        <vers num="1.7"/>
      </prod>
      <prod name="wordpress" vendor="wordpress">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0617" seq="2008-0617" published="2008-02-06" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in the DMSGuestbook 1.7.0 plugin for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) file parameter to wp-admin/admin.php, or the (2) messagefield parameter in the guestbook page, and the (3) title parameter in the messagearea.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3615">3615</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487437/100/0/threaded">20080202 Wordpress Plugin dmsguestbook 1.7.0 Multiple Remote Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27575">27575</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5035">5035</ref>
    </refs>
    <vuln_soft>
      <prod name="dmsguestbook" vendor="daniel_m._schurter">
        <vers num="1.7.0"/>
      </prod>
      <prod name="wordpress" vendor="wordpress">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0618" seq="2008-0618" published="2008-02-06" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in the DMSGuestbook 1.8.0 and 1.7.0 plugin for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) gbname, (2) gbemail, (3) gburl, and (4) gbmsg parameters to unspecified programs.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs/>
    <vuln_soft>
      <prod name="dmsguestbook" vendor="daniel_m._schurter">
        <vers num="1.7.0"/>
        <vers num="1.8.0"/>
      </prod>
      <prod name="wordpress" vendor="wordpress">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0619" seq="2008-0619" published="2008-02-06" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in NeroMediaPlayer.exe in Nero Media Player 1.4.0.35 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (persistent crash) via a long URI in a .M3U file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3616">3616</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487578/100/0/threaded">20080205 NERO Media Player &lt;= 1.4.0.35b Remote Buffer Overflow( .M3U)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27615">27615</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0405">ADV-2008-0405</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5063">5063</ref>
    </refs>
    <vuln_soft>
      <prod name="mediaplayer" vendor="nero">
        <vers num="1.4.0.35" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0620" seq="2008-0620" published="2008-02-06" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to cause a denial of service (crash) via a 0x53 LPD command, which causes the server to terminate.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3619">3619</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487508/100/0/threaded">20080204 Multiple vulnerabilities in SAPlpd 6.28</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487575/100/0/threaded">20080205 Re: Multiple vulnerabilities in SAPlpd 6.28</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27613">27613</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019300">1019300</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0409">ADV-2008-0409</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0438">ADV-2008-0438</ref>
    </refs>
    <vuln_soft>
      <prod name="sapgui" vendor="sap">
        <vers num="7.10"/>
      </prod>
      <prod name="saplpd" vendor="sap">
        <vers num="6.28" prev="1"/>
      </prod>
      <prod name="sapsprint" vendor="sap">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0621" seq="2008-0621" published="2008-02-06" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to execute arbitrary code via long arguments to the (1) 0x01, (2) 0x02, (3) 0x03, (4) 0x04, and (5) 0x05 LPD commands.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3619">3619</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487508/100/0/threaded">20080204 Multiple vulnerabilities in SAPlpd 6.28</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487575/100/0/threaded">20080205 Re: Multiple vulnerabilities in SAPlpd 6.28</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27613">27613</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019300">1019300</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0409">ADV-2008-0409</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0438">ADV-2008-0438</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5079">5079</ref>
    </refs>
    <vuln_soft>
      <prod name="sapgui" vendor="sap">
        <vers num="7.10"/>
      </prod>
      <prod name="saplpd" vendor="sap">
        <vers num="6.28" prev="1"/>
      </prod>
      <prod name="sapsprint" vendor="sap">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0622" seq="2008-0622" published="2008-02-06" modified="2011-03-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in RaidenHTTPD 2.0.19 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to the ulang parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="JVN" url="http://jvn.jp/jp/JVN%2391868305/index.html">JVN#91868305</ref>
      <ref source="CONFIRM" url="http://www.raidenhttpd.com/jp/security.html">http://www.raidenhttpd.com/jp/security.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27628">27628</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0411">ADV-2008-0411</ref>
    </refs>
    <vuln_soft>
      <prod name="raidenhttpd" vendor="raidenhttpd">
        <vers num="2.0.19" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0623" seq="2008-0623" published="2008-02-06" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the YMP Datagrid ActiveX control (datagrid.dll) in Yahoo! Music Jukebox 2.2.2.056 allows remote attackers to execute arbitrary code via a long argument to the AddImage method.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/101676">VU#101676</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27590">27590</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019301">1019301</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0396/references">ADV-2008-0396</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5043">5043</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5046">5046</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5048">5048</ref>
    </refs>
    <vuln_soft>
      <prod name="music_jukebox" vendor="yahoo">
        <vers num="2.2.2.056"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0624" seq="2008-0624" published="2008-02-06" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Buffer overflow in the YMP Datagrid ActiveX control (datagrid.dll) in Yahoo! JukeBox 2.2.2.56 allows remote attackers to execute arbitrary code via a long argument to the AddButton method, a different vulnerability than CVE-2008-0623.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/101676">VU#101676</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27579">27579</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0396/references">ADV-2008-0396</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5051">5051</ref>
    </refs>
    <vuln_soft>
      <prod name="music_jukebox" vendor="yahoo">
        <vers num="2.2.2.56"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0625" seq="2008-0625" published="2008-02-06" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Buffer overflow in the MediaGrid ActiveX control (mediagrid.dll) in Yahoo! Music Jukebox 2.2.2.56 allows remote attackers to execute arbitrary code via a long argument to the AddBitmap method.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/340860">VU#340860</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27578">27578</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019298">1019298</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0396/references">ADV-2008-0396</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5052">5052</ref>
    </refs>
    <vuln_soft>
      <prod name="music_jukebox" vendor="yahoo">
        <vers num="2.2.2.56"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0626" seq="2008-0626" published="2008-02-06" modified="2008-02-07" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2007-6303.  Reason: This candidate is a duplicate of CVE-2007-6303.  Notes: All CVE users should reference CVE-2007-6303 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.</descript>
    </desc>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3624">3624</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2008-0627" seq="2008-0627" published="2008-02-06" modified="2008-02-07" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2007-6304.  Reason: This candidate is a duplicate of CVE-2007-6304.  Notes: All CVE users should reference CVE-2007-6304 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.</descript>
    </desc>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3624">3624</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2008-0628" seq="2008-0628" published="2008-02-06" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="7.8" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:C)">
    <desc>
      <descript source="cve">The XML parsing code in Sun Java Runtime Environment JDK and JRE 6 Update 3 and earlier processes external entity references even when the "external general entities" property is false, which allows remote attackers to conduct XML external entity (XXE) attacks and cause a denial of service or access restricted resources.</descript>
    </desc>
    <loss_types>
      <avail/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BEA" url="http://dev2dev.bea.com/pub/advisory/277">BEA08-201.00</ref>
      <ref source="MISC" url="http://scary.beasts.org/security/CESA-2007-002.html">http://scary.beasts.org/security/CESA-2007-002.html</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200804-28.xml">GLSA-200804-28</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3621">3621</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-66-231246-1">231246</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200804-20.xml">GLSA-200804-20</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200806-11.xml">GLSA-200806-11</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0245.html">RHSA-2008:0245</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487434/100/0/threaded">20080202 Sun JRE / JDK bug introduces XXE possibilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27553">27553</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019292">1019292</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0371">ADV-2008-0371</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1252">ADV-2008-1252</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9847">oval:org.mitre.oval:def:9847</ref>
    </refs>
    <vuln_soft>
      <prod name="jdk" vendor="sun">
        <vers num="1.6"/>
      </prod>
      <prod name="jre" vendor="sun">
        <vers num="1.6.0" prev="1" edition="update3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0629" seq="2008-0629" published="2008-02-06" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Buffer overflow in stream_cddb.c in MPlayer 1.0rc2 and SVN before r25824 allows remote user-assisted attackers to execute arbitrary code via a CDDB database entry containing a long album title.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200803-16.xml">GLSA-200803-16</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1496">DSA-1496</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:045">MDVSA-2008:045</ref>
      <ref source="CONFIRM" url="http://www.mplayerhq.hu/design7/news.html">http://www.mplayerhq.hu/design7/news.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27765">27765</ref>
    </refs>
    <vuln_soft>
      <prod name="mplayer" vendor="mplayer">
        <vers num="1.02rc2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0630" seq="2008-0630" published="2008-02-06" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in url.c in MPlayer 1.0rc2 and SVN before r25823 allows remote attackers to execute arbitrary code via a crafted URL that prevents the IPv6 parsing code from setting a pointer to NULL, which causes the buffer to be reused by the unescape code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200803-16.xml">GLSA-200803-16</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1496">DSA-1496</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:045">MDVSA-2008:045</ref>
      <ref source="CONFIRM" url="http://www.mplayerhq.hu/design7/news.html">http://www.mplayerhq.hu/design7/news.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27766">27766</ref>
    </refs>
    <vuln_soft>
      <prod name="mplayer" vendor="mplayer">
        <vers num="1.02rc2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0631" seq="2008-0631" published="2008-02-06" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple ActiveX controls in MailBee.dll in MailBee Objects 5.5 allow remote attackers to (1) overwrite arbitrary files via the SaveToDisk method, or (2) modify files via the AddStringToFile method.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27481">27481</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40011">mailbee-mailbee-file-overwrite(40011)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4999">4999</ref>
    </refs>
    <vuln_soft>
      <prod name="mailbee_objects" vendor="afterlogic">
        <vers num="5.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0632" seq="2008-0632" published="2008-02-06" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unrestricted file upload vulnerability in cp_upload_image.php in LightBlog 9.5 allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in the blog's root directory.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://omni.netsons.org/blog/?p=11">http://omni.netsons.org/blog/?p=11</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3617">3617</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487398/100/0/threaded">20080201 LightBlog Remote File Upload Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27562">27562</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5033">5033</ref>
    </refs>
    <vuln_soft>
      <prod name="lightblog" vendor="lightblog">
        <vers num="9.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0633" seq="2008-0633" published="2008-02-06" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="6.0" CVSS_base_score="6.0" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="6.8" CVSS_vector="(AV:N/AC:M/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in Anon Proxy Server 0.102 and earlier, when user authentication is enabled, allows remote attackers to cause a denial of service (exception) via a user name with a large number of quotes, which triggers the overflow during escaping.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3618">3618</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487446/100/0/threaded">20080203 Anon Proxy Server &lt;= 0.102 remote buffer overflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27593" patch="1">27593</ref>
      <ref source="CONFIRM" url="https://sourceforge.net/project/shownotes.php?group_id=138780&amp;release_id=571924" patch="1">https://sourceforge.net/project/shownotes.php?group_id=138780&amp;release_id=571924</ref>
    </refs>
    <vuln_soft>
      <prod name="anon_proxy_server" vendor="anon_proxy_server">
        <vers num="0.102" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0634" seq="2008-0634" published="2008-02-06" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in the NamoInstaller.NamoInstall.1 ActiveX control in NamoInstaller.dll 3.0.0.1, as used in Sejoong Namo ActiveSquare6, allows remote attackers to execute arbitrary code via a long argument to the Install method, a different vulnerability than CVE-2008-0551.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40199">namo-activesquare-bo(40199)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5045">5045</ref>
    </refs>
    <vuln_soft>
      <prod name="activesquare" vendor="sejoong_namo">
        <vers num="6"/>
      </prod>
      <prod name="namoinstall.1_activex_control" vendor="sejoong_namo">
        <vers num="3.0.0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0635" seq="2008-0635" published="2008-02-06" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the delivery engine in Openads 2.4.0 through 2.4.2 allows remote attackers to execute arbitrary PHP code via unknown vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3620">3620</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487486/100/0/threaded">20080204 [OPENADS-SA-2008-001] Openads 2.4.2 vulnerability fixed</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27603" patch="1">27603</ref>
    </refs>
    <vuln_soft>
      <prod name="openads" vendor="openads">
        <vers num="2.4"/>
        <vers num="2.4.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0636" seq="2008-0636" published="2008-02-12" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Level Platforms, Inc. (LPI) Managed Workplace Service Center 4.x, 5.x and 6.x allows remote attackers to obtain sensitive information via a direct request to About/SC_About.htm, which provides version and patch information.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3659">3659</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487811/100/0/threaded">20080208 SECURITY ADVISORY - Level Platforms, Inc. Service Center Install Data HTTP Vulnerability</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488201/100/0/threaded">20080214 Re: SECURITY ADVISORY - Level Platforms, Inc. Service Center Install Data HTTP Vulnerability</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/496074/100/0/threaded">20080908 Re: Re: SECURITY ADVISORY - Level Platforms, Inc. Service Center Install Data HTTP Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27702">27702</ref>
    </refs>
    <vuln_soft>
      <prod name="managed_workplace_service_center" vendor="level_platforms">
        <vers num="4"/>
        <vers num="5"/>
        <vers num="6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0638" seq="2008-0638" published="2008-02-21" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in the Veritas Enterprise Administrator (VEA) service (aka vxsvc.exe) in Symantec Veritas Storage Foundation 5.0 allows remote attackers to execute arbitrary code via a packet with a crafted value of a certain size field, which is not checked for consistency with the actual buffer size.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019459">1019459</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488420/100/0/threaded">20080220 ZDI-08-007: Symantec VERITAS Storage Foundation Administrator Service Heap Overflow Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/25778" patch="1">25778</ref>
      <ref source="CONFIRM" url="http://www.symantec.com/avcenter/security/Content/2008.02.20a.html" patch="1">http://www.symantec.com/avcenter/security/Content/2008.02.20a.html</ref>
      <ref source="MISC" url="http://www.zerodayinitiative.com/advisories/ZDI-08-007.html">http://www.zerodayinitiative.com/advisories/ZDI-08-007.html</ref>
    </refs>
    <vuln_soft>
      <prod name="veritas_storage_foundation" vendor="symantec">
        <vers num="5.0" edition=":aix"/>
        <vers num="5.0" edition=":hp_ux"/>
        <vers num="5.0" edition=":linux"/>
        <vers num="5.0" edition=":solaris"/>
        <vers num="5.0" edition=":windows_2000"/>
        <vers num="5.0" edition="32bit:windows_2003"/>
        <vers num="5.0" edition="64bit:windows_2003"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0639" seq="2008-0639" published="2008-02-13" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the EnumPrinters function in the Spooler service (nwspool.dll) in Novell Client 4.91 SP2, SP3, and SP4 for Windows allows remote attackers to execute arbitrary code via a crafted RPC request, aka Novell bug 353138, a different vulnerability than CVE-2006-5854.  NOTE: this issue exists because of an incomplete fix for CVE-2007-6701.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://download.novell.com/Download?buildid=SszG22IIugM~" patch="1">http://download.novell.com/Download?buildid=SszG22IIugM~</ref>
      <ref source="FULLDISC" url="http://marc.info/?l=full-disclosure&amp;m=120276962211348&amp;w=2" patch="1">20080211 ZDI-08-005: Novell Client NWSPOOL.DLL EnumPrinters Stack Overflow Vulnerability</ref>
      <ref source="CONFIRM" url="http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5008300.html">http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5008300.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487980/100/0/threaded">20080211 ZDI-08-005: Novell Client NWSPOOL.DLL EnumPrinters Stack Overflow Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27741" patch="1">27741</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019366">1019366</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0496">ADV-2008-0496</ref>
      <ref source="MISC" url="http://www.zerodayinitiative.com/advisories/ZDI-08-005.html" patch="1">http://www.zerodayinitiative.com/advisories/ZDI-08-005.html</ref>
    </refs>
    <vuln_soft>
      <prod name="client" vendor="novell">
        <vers num="4.91" edition="sp2"/>
        <vers num="4.91" edition="sp3"/>
        <vers num="4.91" edition="sp4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0640" seq="2008-0640" published="2008-02-07" modified="2011-07-25" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Symantec Ghost Solution Suite 1.1 before 1.1 patch 2, 2.0.0, and 2.0.1 does not authenticate connections between the console and the Ghost Management Agent, which allows remote attackers to execute arbitrary commands via unspecified RPC requests in conjunction with ARP spoofing.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27644">27644</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019356">1019356</ref>
      <ref source="CONFIRM" url="http://www.symantec.com/avcenter/security/Content/2008.02.07.html" patch="1">http://www.symantec.com/avcenter/security/Content/2008.02.07.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0474" adv="1">ADV-2008-0474</ref>
    </refs>
    <vuln_soft>
      <prod name="ghost_solutions_suite" vendor="symantec">
        <vers num="1.1"/>
        <vers num="2.0.0"/>
        <vers num="2.0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0642" seq="2008-0642" published="2008-02-14" modified="2011-03-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in files created by Adobe RoboHelp 6 and 7, possibly involving use of a (1) WebHelp5 (WebHelp5Ext) or (2) WildFire (WildFireExt) extension, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2007-1280.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019397">1019397</ref>
      <ref source="CONFIRM" url="http://www.adobe.com/support/security/bulletins/apsb08-05.html">http://www.adobe.com/support/security/bulletins/apsb08-05.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27763" patch="1">27763</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0537">ADV-2008-0537</ref>
    </refs>
    <vuln_soft>
      <prod name="robohelp" vendor="adobe">
        <vers num="6"/>
        <vers num="7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0643" seq="2008-0643" published="2008-03-11" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Adobe ColdFusion MX 7 and ColdFusion 8 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.adobe.com/support/security/bulletins/apsb08-06.html" patch="1">http://www.adobe.com/support/security/bulletins/apsb08-06.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28205" patch="1">28205</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019589">1019589</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0862/references">ADV-2008-0862</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41144">adobe-coldfusion-useragent-xss(41144)</ref>
    </refs>
    <vuln_soft>
      <prod name="coldfusion" vendor="adobe">
        <vers num="7.0"/>
        <vers num="7.0.1"/>
        <vers num="7.0.2"/>
        <vers num="8.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0644" seq="2008-0644" published="2008-03-11" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Adobe ColdFusion MX 7 and ColdFusion 8 allows remote attackers to bypass the cross-site scripting (XSS) protection mechanism for applications via unspecified vectors related to the setEncoding function.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.adobe.com/support/security/bulletins/apsb08-07.html">http://www.adobe.com/support/security/bulletins/apsb08-07.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28205" patch="1">28205</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019590">1019590</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0862/references">ADV-2008-0862</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41145">coldfusion-setencoding-xss(41145)</ref>
    </refs>
    <vuln_soft>
      <prod name="coldfusion" vendor="adobe">
        <vers num="7.0"/>
        <vers num="7.0.1"/>
        <vers num="7.0.2"/>
        <vers num="8.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0645" seq="2008-0645" published="2008-02-07" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple PHP remote file inclusion vulnerabilities in Portail Web Php 2.5.1.1 allow remote attackers to execute arbitrary PHP code via a URL in the site_path parameter to (1) config/conf-activation.php, (2) menu/item.php, and (3) modules/conf_modules.php in admin/system/; and (4) system/login.php.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27616">27616</ref>
    </refs>
    <vuln_soft>
      <prod name="portail_web_php" vendor="portail_web_php">
        <vers num="2.5.1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0646" seq="2008-0646" published="2008-02-07" modified="2011-03-07" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">The bdecode_recursive function in include/libtorrent/bencode.hpp in Rasterbar Software libtorrent before 0.12.1, as used in Deluge before 0.5.8.3 and other products, allows context-dependent attackers to cause a denial of service (stack exhaustion and crash) via a crafted bencoded message.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://deluge-torrent.org/Changelog.php">http://deluge-torrent.org/Changelog.php</ref>
      <ref source="CONFIRM" url="http://libtorrent.svn.sourceforge.net/viewvc/libtorrent/branches/RC_0_12/include/libtorrent/bencode.hpp?r1=956&amp;r2=1968&amp;pathrev=1968">http://libtorrent.svn.sourceforge.net/viewvc/libtorrent/branches/RC_0_12/include/libtorrent/bencode.hpp?r1=956&amp;r2=1968&amp;pathrev=1968</ref>
      <ref source="CONFIRM" url="http://libtorrent.svn.sourceforge.net/viewvc/libtorrent/branches/RC_0_12/include/libtorrent/bencode.hpp?view=log&amp;pathrev=1968#rev1968">http://libtorrent.svn.sourceforge.net/viewvc/libtorrent/branches/RC_0_12/include/libtorrent/bencode.hpp?view=log&amp;pathrev=1968#rev1968</ref>
      <ref source="CONFIRM" url="http://libtorrent.svn.sourceforge.net/viewvc/libtorrent/branches/RC_0_13/include/libtorrent/bencode.hpp?view=log&amp;pathrev=1968">http://libtorrent.svn.sourceforge.net/viewvc/libtorrent/branches/RC_0_13/include/libtorrent/bencode.hpp?view=log&amp;pathrev=1968</ref>
      <ref source="CONFIRM" url="http://libtorrent.svn.sourceforge.net/viewvc/libtorrent/trunk/include/libtorrent/bencode.hpp?view=log&amp;pathrev=1968">http://libtorrent.svn.sourceforge.net/viewvc/libtorrent/trunk/include/libtorrent/bencode.hpp?view=log&amp;pathrev=1968</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27597" patch="1">27597</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0383">ADV-2008-0383</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0384">ADV-2008-0384</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00001.html">FEDORA-2008-1198</ref>
    </refs>
    <vuln_soft>
      <prod name="deluge" vendor="deluge_team">
        <vers num="0.5.8.2" prev="1"/>
      </prod>
      <prod name="libtorrent" vendor="rasterbar_software">
        <vers num="0.12" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0647" seq="2008-0647" published="2008-02-07" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple stack-based buffer overflows in the HanGamePluginCn18.HanGamePluginCn18.1 ActiveX control in HanGamePluginCn18.dll in Ourgame GLWorld 2.6.1.29 (aka Lianzong Game Platform) allow remote attackers to execute arbitrary code via long arguments to the (1) hgs_startGame and (2) hgs_startNotify methods, as exploited in the wild as of February 2008.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27626">27626</ref>
      <ref source="MISC" url="http://www.symantec.com/enterprise/security_response/weblog/2008/02/zeroday_exploit_for_lianzong_g.html">http://www.symantec.com/enterprise/security_response/weblog/2008/02/zeroday_exploit_for_lianzong_g.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0427">ADV-2008-0427</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5153">5153</ref>
    </refs>
    <vuln_soft>
      <prod name="glworld" vendor="ourgame.com">
        <vers num="2.6.1.29"/>
      </prod>
      <prod name="hangameplugincn18_activex_control" vendor="ourgame.com">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0648" seq="2008-0648" published="2008-02-07" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple PHP remote file inclusion vulnerabilities in OpenSiteAdmin 0.9.1.1 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the path parameter to (1) indexFooter.php; and (2) DatabaseManager.php, (3) FieldManager.php, (4) Filter.php, (5) Form.php, (6) FormManager.php, (7) LoginManager.php, and (8) Filters/SingleFilter.php in scripts/classes/.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27640">27640</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5068">5068</ref>
    </refs>
    <vuln_soft>
      <prod name="opensiteadmin" vendor="opensiteadmin">
        <vers num="0.9.1.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0649" seq="2008-0649" published="2008-02-07" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in detail.php in Astanda Directory Project (ADP) 1.2 and 1.3 allows remote attackers to execute arbitrary SQL commands via the link_id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27646">27646</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5071">5071</ref>
    </refs>
    <vuln_soft>
      <prod name="astanda_directory_project" vendor="adp">
        <vers num="1.2"/>
        <vers num="1.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0650" seq="2008-0650" published="2008-02-07" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in login.php in Simple OS CMS 0.1c beta allows remote attackers to execute arbitrary SQL commands via the username field.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27589">27589</ref>
    </refs>
    <vuln_soft>
      <prod name="simple_os_cms" vendor="simple_os_cms">
        <vers num="0.1c_beta"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0651" seq="2008-0651" published="2008-02-07" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in login.php in Pedro Santana Codice CMS allows remote attackers to execute arbitrary SQL commands via the username field.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27592">27592</ref>
    </refs>
    <vuln_soft>
      <prod name="cms" vendor="pedro_santana_codice">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0652" seq="2008-0652" published="2008-02-07" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the Downloads (com_downloads) component for Mambo and Joomla! allows remote attackers to execute arbitrary SQL commands via the filecatid parameter in a selectfolder action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27648">27648</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5073">5073</ref>
    </refs>
    <vuln_soft>
      <prod name="com_downloads" vendor="joomla">
        <vers num=""/>
      </prod>
      <prod name="com_downloads" vendor="mambo">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0653" seq="2008-0653" published="2008-02-07" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the Ynews (com_ynews) 1.0.0 component for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a showYNews action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27649">27649</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5072">5072</ref>
    </refs>
    <vuln_soft>
      <prod name="com_ynews" vendor="joomla">
        <vers num="1.0.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0654" seq="2008-0654" published="2008-02-07" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple directory traversal vulnerabilities in Azucar CMS 1.3 allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the _VIEW (view) parameter to (1) index.php, (2) html/sitio/index.php, or (3) src/sistema/vistas/template/tpl_inicio.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3622">3622</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487595/100/0/threaded">20080205 [DSECRG-08-012] Multiple LFI in Azucar CMS 1.3</ref>
    </refs>
    <vuln_soft>
      <prod name="azucar_cms" vendor="azucar_cms">
        <vers num="1.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0655" seq="2008-0655" published="2008-02-07" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple unspecified vulnerabilities in Adobe Reader and Acrobat before 8.1.2 have unknown impact and attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://blogs.adobe.com/acroread/2008/02/adobe_reader_812_for_linux_and.html">http://blogs.adobe.com/acroread/2008/02/adobe_reader_812_for_linux_and.html</ref>
      <ref source="CONFIRM" url="http://kb.adobe.com/selfservice/viewContent.do?externalId=kb403079&amp;sliceId=1">http://kb.adobe.com/selfservice/viewContent.do?externalId=kb403079&amp;sliceId=1</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00007.html">SUSE-SA:2008:009</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200803-01.xml">GLSA-200803-01</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019346">1019346</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-239286-1">239286</ref>
      <ref source="CONFIRM" url="http://www.adobe.com/support/security/advisories/apsa08-01.html" adv="1">http://www.adobe.com/support/security/advisories/apsa08-01.html</ref>
      <ref source="CONFIRM" url="http://www.adobe.com/support/security/bulletins/apsb08-13.html" adv="1">http://www.adobe.com/support/security/bulletins/apsb08-13.html</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0144.html">RHSA-2008:0144</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27641" patch="1">27641</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-043A.html">TA08-043A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0425">ADV-2008-0425</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1966/references" adv="1">ADV-2008-1966</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10299">oval:org.mitre.oval:def:10299</ref>
    </refs>
    <vuln_soft>
      <prod name="acrobat" vendor="adobe">
        <vers num="3.0"/>
        <vers num="3.1"/>
        <vers num="4.0"/>
        <vers num="4.0.5"/>
        <vers num="4.0.5a"/>
        <vers num="4.0.5c"/>
        <vers num="5.0"/>
        <vers num="5.0.5"/>
        <vers num="5.0.6"/>
        <vers num="5.0.10"/>
        <vers num="6.0"/>
        <vers num="6.0.1"/>
        <vers num="6.0.2"/>
        <vers num="6.0.3"/>
        <vers num="6.0.4"/>
        <vers num="6.0.5"/>
        <vers num="6.0.6"/>
        <vers num="7.0"/>
        <vers num="7.0.1"/>
        <vers num="7.0.2"/>
        <vers num="7.0.3"/>
        <vers num="7.0.4"/>
        <vers num="7.0.5"/>
        <vers num="7.0.6"/>
        <vers num="7.0.7"/>
        <vers num="7.0.8"/>
        <vers num="7.0.9"/>
        <vers num="7.1.0"/>
        <vers num="7.1.1"/>
        <vers num="7.1.2"/>
        <vers num="7.1.3"/>
        <vers num="7.1.4"/>
        <vers num="8.0"/>
        <vers num="8.1"/>
        <vers num="8.1.1" prev="1"/>
      </prod>
      <prod name="acrobat_reader" vendor="adobe">
        <vers num="3.0"/>
        <vers num="3.01"/>
        <vers num="3.02"/>
        <vers num="4.0"/>
        <vers num="4.0.5"/>
        <vers num="4.0.5a"/>
        <vers num="4.0.5c"/>
        <vers num="4.5"/>
        <vers num="5.0"/>
        <vers num="5.0.5"/>
        <vers num="5.0.6"/>
        <vers num="5.0.7"/>
        <vers num="5.0.9"/>
        <vers num="5.0.10"/>
        <vers num="5.0.11"/>
        <vers num="5.1"/>
        <vers num="6.0"/>
        <vers num="6.0.1"/>
        <vers num="6.0.2"/>
        <vers num="6.0.3"/>
        <vers num="6.0.4"/>
        <vers num="6.0.5"/>
        <vers num="6.0.6"/>
        <vers num="7.0"/>
        <vers num="7.0.1"/>
        <vers num="7.0.2"/>
        <vers num="7.0.3"/>
        <vers num="7.0.4"/>
        <vers num="7.0.5"/>
        <vers num="7.0.6"/>
        <vers num="7.0.7"/>
        <vers num="7.0.8"/>
        <vers num="7.0.9"/>
        <vers num="7.1.0"/>
        <vers num="7.1.1"/>
        <vers num="7.1.2"/>
        <vers num="7.1.3"/>
        <vers num="7.1.4"/>
        <vers num="8.0"/>
        <vers num="8.1"/>
        <vers num="8.1.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0656" seq="2008-0656" published="2008-02-07" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unrestricted file upload vulnerability in dmclTrace.jsp in EMC Documentum Administrator 5.3.0.313 and Webtop 5.3.0.317 allows remote attackers to overwrite arbitrary files via the filename attribute.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3626">3626</ref>
      <ref source="MISC" url="http://www.cybsec.com/vuln/CYBSEC-Security_Advisory_Documentum_dmclTrace_Arbitrary_file_overwrite.pdf">http://www.cybsec.com/vuln/CYBSEC-Security_Advisory_Documentum_dmclTrace_Arbitrary_file_overwrite.pdf</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487603/100/0/threaded">20080205 CYBSEC Security Advisory: Arbitrary file overwrite in Documentum Administrator / Documentum Webtop</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27632">27632</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019305">1019305</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0439">ADV-2008-0439</ref>
    </refs>
    <vuln_soft>
      <prod name="documentum_administrator" vendor="emc">
        <vers num="4.2.8"/>
        <vers num="5.2.5"/>
        <vers num="5.2.5_sp2"/>
        <vers num="5.3.0.313"/>
      </prod>
      <prod name="documentum_webtop" vendor="emc">
        <vers num="5.2.5"/>
        <vers num="5.2.5_sp2"/>
        <vers num="5.3.0.317"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0657" seq="2008-0657" published="2008-02-07" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple unspecified vulnerabilities in the Java Runtime Environment in Sun JDK and JRE 6 Update 1 and earlier, and 5.0 Update 13 and earlier, allow context-dependent attackers to gain privileges via an untrusted (1) application or (2) applet, as demonstrated by an application or applet that grants itself privileges to (a) read local files, (b) write to local files, or (c) execute local programs.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BEA" url="http://dev2dev.bea.com/pub/advisory/277">BEA08-201.00</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.html">SUSE-SA:2008:025</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200804-28.xml">GLSA-200804-28</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-231261-1">231261</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200804-20.xml">GLSA-200804-20</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200806-11.xml">GLSA-200806-11</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0123.html">RHSA-2008:0123</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0156.html">RHSA-2008:0156</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0210.html">RHSA-2008:0210</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27650">27650</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019308">1019308</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2008-0010.html">http://www.vmware.com/security/advisories/VMSA-2008-0010.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0429">ADV-2008-0429</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1252">ADV-2008-1252</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1856/references">ADV-2008-1856</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11505">oval:org.mitre.oval:def:11505</ref>
    </refs>
    <vuln_soft>
      <prod name="jdk" vendor="sun">
        <vers num="5.0_update13" prev="1"/>
      </prod>
      <prod name="jre" vendor="sun">
        <vers num="1.5.0" prev="1" edition="update13"/>
        <vers num="1.6.0" prev="1" edition="update1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0658" seq="2008-0658" published="2008-02-13" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.0" CVSS_base_score="4.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">slapd/back-bdb/modrdn.c in the BDB backend for slapd in OpenLDAP 2.3.39 allows remote authenticated users to cause a denial of service (daemon crash) via a modrdn operation with a NOOP (LDAP_X_NO_OPERATION) control, a related issue to CVE-2007-6698.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html">APPLE-SA-2009-11-09-1</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html">SUSE-SR:2008:010</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200803-28.xml">GLSA-200803-28</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3937">http://support.apple.com/kb/HT3937</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0059">http://wiki.rpath.com/Advisories:rPSA-2008-0059</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0059">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0059</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1541">DSA-1541</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:058">MDVSA-2008:058</ref>
      <ref source="CONFIRM" url="http://www.openldap.org/devel/cvsweb.cgi/servers/slapd/back-bdb/modrdn.c.diff?r1=1.197&amp;r2=1.198&amp;f=h">http://www.openldap.org/devel/cvsweb.cgi/servers/slapd/back-bdb/modrdn.c.diff?r1=1.197&amp;r2=1.198&amp;f=h</ref>
      <ref source="CONFIRM" url="http://www.openldap.org/its/index.cgi/Software%20Bugs?id=5358">http://www.openldap.org/its/index.cgi/Software%20Bugs?id=5358</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0110.html">RHSA-2008:0110</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488242/100/200/threaded">20080212 rPSA-2008-0059-1 openldap openldap-clients openldap-servers</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27778">27778</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019481">1019481</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-584-1">USN-584-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0536/references">ADV-2008-0536</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/3184">ADV-2009-3184</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40479">openldap-modrdn-dos(40479)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9470">oval:org.mitre.oval:def:9470</ref>
    </refs>
    <vuln_soft>
      <prod name="openldap" vendor="openldap">
        <vers num="2.3.39"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0659" seq="2008-0659" published="2008-02-07" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in Aurigma Image Uploader ActiveX control (ImageUploader4.ocx) 4.5.70 and earlier, as used in MySpace MySpaceUploader.ocx 1.0.0.4, allows remote attackers to execute arbitrary code via a long Action property.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://blogs.aurigma.com/post/2008/01/Another-security-problem---oh%2c-not-again.aspx">http://blogs.aurigma.com/post/2008/01/Another-security-problem---oh%2c-not-again.aspx</ref>
      <ref source="FULLDISC" url="http://seclists.org/fulldisclosure/2008/Jan/0593.html">20080131 MySpace Uploader ActiveX Control Buffer Overflow</ref>
      <ref source="MISC" url="http://www.computerworld.com/action/article.do?command=viewArticleBasic&amp;articleId=9060483">http://www.computerworld.com/action/article.do?command=viewArticleBasic&amp;articleId=9060483</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/776931">VU#776931</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27533">27533</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0344/references">ADV-2008-0344</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0345/references">ADV-2008-0345</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40118">myspace-myspaceuploader-bo(40118)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5025">5025</ref>
    </refs>
    <vuln_soft>
      <prod name="image_uploader_activex_control" vendor="aurigma">
        <vers num="4.5.70" prev="1"/>
      </prod>
      <prod name="myspaceuploader" vendor="myspace">
        <vers num="1.0.0.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0660" seq="2008-0660" published="2008-02-07" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple stack-based buffer overflows in Aurigma Image Uploader ActiveX control (ImageUploader4.ocx) 4.6.17.0, 4.5.70.0, and 4.5.126.0, and ImageUploader5 5.0.10.0, as used by Facebook PhotoUploader 4.5.57.0, allow remote attackers to execute arbitrary code via long (1) ExtractExif and (2) ExtractIptc properties.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://seclists.org/fulldisclosure/2008/Feb/0023.html">20080203 FaceBook/Aurigma Image/PhotoUploader Buffer Overflow</ref>
      <ref source="MISC" url="http://www.computerworld.com/action/article.do?command=viewArticleBasic&amp;articleId=9060483">http://www.computerworld.com/action/article.do?command=viewArticleBasic&amp;articleId=9060483</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/776931">VU#776931</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27576">27576</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27577">27577</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019297">1019297</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0391/references">ADV-2008-0391</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0394/references">ADV-2008-0394</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5049">5049</ref>
    </refs>
    <vuln_soft>
      <prod name="image_uploader_activex_control" vendor="aurigma">
        <vers num="4.5.70.0"/>
        <vers num="4.5.126.0"/>
        <vers num="4.6.17.0"/>
        <vers num="5.0.10.0"/>
      </prod>
      <prod name="facebook" vendor="facebook">
        <vers num=""/>
      </prod>
      <prod name="photouploader" vendor="facebook">
        <vers num="4.5.57.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0661" seq="2008-0661" published="2008-02-07" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in dBpowerAMP Audio Player Release 2 allows remote attackers to execute arbitrary code via a .M3U file with a long URI. NOTE: this might be the same issue as CVE-2004-1569.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3623">3623</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487605/100/0/threaded">20080205 dBpowerAMP Audio Player Release 2 Remote Buffer Overflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27635">27635</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27639">27639</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5067">5067</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5069">5069</ref>
    </refs>
    <vuln_soft>
      <prod name="dbpoweramp_audio_player" vendor="illustrate">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0662" seq="2008-0662" published="2008-02-07" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The Auto Local Logon feature in Check Point VPN-1 SecuRemote/SecureClient NGX R60 and R56 for Windows caches credentials under the Checkpoint\SecuRemote registry key, which has Everyone/Full Control permissions, which allows local users to gain privileges by reading and reusing the credentials.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MISC" url="http://digihax.com/">http://digihax.com/</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3627">3627</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487735/100/0/threaded">20080207 Checkpoint SecuRemote/Secure Client NGX Auto Local Logon Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27675">27675</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019317">1019317</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0475">ADV-2008-0475</ref>
      <ref source="CONFIRM" url="https://usercenter.checkpoint.com/usercenter/portal/user/anon/page/supportCenter.psml">https://usercenter.checkpoint.com/usercenter/portal/user/anon/page/supportCenter.psml</ref>
    </refs>
    <vuln_soft>
      <prod name="vpn-1_secureclient" vendor="checkpoint">
        <vers num="ngai_r56"/>
        <vers num="ngx_r60"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0663" seq="2008-0663" published="2008-02-07" modified="2011-03-07" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Novell Challenge Response Client (LCM) 2.7.5 and earlier, as used with Novell Client for Windows 4.91 SP4, allows users with physical access to a locked system to obtain contents of the clipboard by pasting the contents into the Challenge Question field.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27631">27631</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019304">1019304</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0423/references">ADV-2008-0423</ref>
      <ref source="CONFIRM" url="https://secure-support.novell.com/KanisaPlatform/Publishing/686/3726376_f.SAL_Public.html">https://secure-support.novell.com/KanisaPlatform/Publishing/686/3726376_f.SAL_Public.html</ref>
    </refs>
    <vuln_soft>
      <prod name="challenge_response_client" vendor="novell">
        <vers num="2.7.5" prev="1"/>
      </prod>
      <prod name="novell_client_for_windows" vendor="novell">
        <vers num="4.91_sp4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0664" seq="2008-0664" published="2008-02-07" modified="2011-03-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">The XML-RPC implementation (xmlrpc.php) in WordPress before 2.3.3, when registration is enabled, allows remote attackers to edit posts of other blog users via unknown vectors.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://wordpress.org/development/2008/02/wordpress-233/" patch="1">http://wordpress.org/development/2008/02/wordpress-233/</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1601">DSA-1601</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27669" patch="1">27669</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019316">1019316</ref>
      <ref source="MISC" url="http://www.village-idiot.org/archives/2008/02/02/wordpress-232-exploit-confirmed/">http://www.village-idiot.org/archives/2008/02/02/wordpress-232-exploit-confirmed/</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0448">ADV-2008-0448</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=431547">https://bugzilla.redhat.com/show_bug.cgi?id=431547</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00349.html">FEDORA-2008-1512</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00416.html">FEDORA-2008-1559</ref>
    </refs>
    <vuln_soft>
      <prod name="wordpress" vendor="wordpress">
        <vers num="0.7"/>
        <vers num="0.71"/>
        <vers num="1.2"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2"/>
        <vers num="1.3.1"/>
        <vers num="1.5"/>
        <vers num="1.5.1"/>
        <vers num="1.5.1.2"/>
        <vers num="1.5.1.3"/>
        <vers num="1.5.2"/>
        <vers num="2.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
        <vers num="2.0.4"/>
        <vers num="2.0.5"/>
        <vers num="2.0.6"/>
        <vers num="2.0.7"/>
        <vers num="2.0.10"/>
        <vers num="2.0.10_rc1"/>
        <vers num="2.0.10_rc2"/>
        <vers num="2.0.11"/>
        <vers num="2.1"/>
        <vers num="2.1.1"/>
        <vers num="2.1.2"/>
        <vers num="2.1.3"/>
        <vers num="2.1.3_rc1"/>
        <vers num="2.1.3_rc2"/>
        <vers num="2.2"/>
        <vers num="2.2.1"/>
        <vers num="2.2.2"/>
        <vers num="2.2.3"/>
        <vers num="2.2_revision5002"/>
        <vers num="2.2_revision5003"/>
        <vers num="2.3"/>
        <vers num="2.3.1"/>
        <vers num="2.3.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0665" seq="2008-0665" published="2008-02-11" modified="2008-09-05" severity="Low" CVSS_version="2.0" CVSS_score="3.6" CVSS_base_score="3.6" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:P)">
    <desc>
      <descript source="cve">wml_backend/p1_ipp/ipp.src in Website META Language (WML) 2.0.11 allows local users to overwrite arbitrary files via a symlink attack on the ipp.$$.tmp temporary file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=463907">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=463907</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200803-23.xml">GLSA-200803-23</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1492">DSA-1492</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:076">MDVSA-2008:076</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27685">27685</ref>
    </refs>
    <vuln_soft>
      <prod name="website_meta_language" vendor="website_meta_language">
        <vers num="2.0.11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0666" seq="2008-0666" published="2008-02-11" modified="2008-09-05" severity="Low" CVSS_version="2.0" CVSS_score="3.6" CVSS_base_score="3.6" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:P)">
    <desc>
      <descript source="cve">Website META Language (WML) 2.0.11 allows local users to overwrite arbitrary files via a symlink attack on (1) the /tmp/pe.tmp.$$ temporary file used by wml_contrib/wmg.cgi and (2) temporary files used by wml_backend/p3_eperl/eperl_sys.c.</descript>
    </desc>
    <loss_types>
      <avail/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=463907">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=463907</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200803-23.xml">GLSA-200803-23</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1492">DSA-1492</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:076">MDVSA-2008:076</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27685">27685</ref>
    </refs>
    <vuln_soft>
      <prod name="website_meta_language" vendor="website_meta_language">
        <vers num="2.0.11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0667" seq="2008-0667" published="2008-02-11" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The DOC.print function in the Adobe JavaScript API, as used by Adobe Acrobat and Reader before 8.1.2, allows remote attackers to configure silent non-interactive printing, and trigger the printing of an arbitrary number of copies of a document.  NOTE: this issue might be subsumed by CVE-2008-0655.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://kb.adobe.com/selfservice/viewContent.do?externalId=kb403079&amp;sliceId=1">http://kb.adobe.com/selfservice/viewContent.do?externalId=kb403079&amp;sliceId=1</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00007.html">SUSE-SA:2008:009</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200803-01.xml">GLSA-200803-01</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3625">3625</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-239286-1">239286</ref>
      <ref source="CONFIRM" url="http://www.adobe.com/support/security/advisories/apsa08-01.html" patch="1">http://www.adobe.com/support/security/advisories/apsa08-01.html</ref>
      <ref source="CONFIRM" url="http://www.adobe.com/support/security/bulletins/apsb08-13.html">http://www.adobe.com/support/security/bulletins/apsb08-13.html</ref>
      <ref source="MISC" url="http://www.fortiguardcenter.com/advisory/FGA-2008-04.html">http://www.fortiguardcenter.com/advisory/FGA-2008-04.html</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0144.html">RHSA-2008:0144</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487760/100/0/threaded">20080208 Adobe Reader/Acrobat Remote PDF Print Silently Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27641" patch="1">27641</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-043A.html">TA08-043A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0425/references">ADV-2008-0425</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1966/references">ADV-2008-1966</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9731">oval:org.mitre.oval:def:9731</ref>
    </refs>
    <vuln_soft>
      <prod name="acrobat_reader" vendor="adobe">
        <vers num="8.1.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0668" seq="2008-0668" published="2008-02-11" modified="2011-03-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The excel_read_HLINK function in plugins/excel/ms-excel-read.c in Gnome Office Gnumeric before 1.8.1 allows user-assisted remote attackers to execute arbitrary code via a crafted XLS file containing XLS HLINK opcodes, possibly because of an integer signedness error that leads to an integer overflow.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.gentoo.org/show_bug.cgi?id=208356">http://bugs.gentoo.org/show_bug.cgi?id=208356</ref>
      <ref source="CONFIRM" url="http://bugzilla.gnome.org/show_bug.cgi?id=505330">http://bugzilla.gnome.org/show_bug.cgi?id=505330</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00001.html">SUSE-SR:2008:016</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200802-05.xml">GLSA-200802-05</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1546">DSA-1546</ref>
      <ref source="CONFIRM" url="http://www.gnome.org/projects/gnumeric/announcements/1.8/gnumeric-1.8.1.shtml" patch="1">http://www.gnome.org/projects/gnumeric/announcements/1.8/gnumeric-1.8.1.shtml</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:056">MDVSA-2008:056</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27536">27536</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-604-1">USN-604-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0462">ADV-2008-0462</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00114.html">FEDORA-2008-1313</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00227.html">FEDORA-2008-1403</ref>
    </refs>
    <vuln_soft>
      <prod name="gnumeric" vendor="gnome">
        <vers num="1.7.91" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0669" seq="2008-0669" published="2008-02-11" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in search.cgi in Sift Unity allows remote attackers to inject arbitrary web script or HTML via the qt parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27684">27684</ref>
    </refs>
    <vuln_soft>
      <prod name="unity" vendor="sift">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0670" seq="2008-0670" published="2008-02-11" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the Noticias (com_noticias) 1.0 component for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a detalhe action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27691">27691</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5081">5081</ref>
    </refs>
    <vuln_soft>
      <prod name="com_noticias" vendor="joomla">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0671" seq="2008-0671" published="2008-02-11" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the add_line_buffer function in TinTin++ 1.97.9 and WinTin++ 1.97.9 allows remote attackers to execute arbitrary code via a long chat message, related to conversion from LF to CRLF.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/rintintin-adv.txt">http://aluigi.altervista.org/adv/rintintin-adv.txt</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-201111-07.xml">GLSA-201111-07</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3632">3632</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487687/100/0/threaded">20080206 Chat vulnerabilities in TinTin++ 1.97.9</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27660">27660</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0449">ADV-2008-0449</ref>
    </refs>
    <vuln_soft>
      <prod name="tintin++" vendor="tintin">
        <vers num="1.97.9"/>
      </prod>
      <prod name="wintin++" vendor="tintin">
        <vers num="1.97.9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0672" seq="2008-0672" published="2008-02-11" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The process_chat_input function in TinTin++ 1.97.9 and WinTin++ 1.97.9 allows remote attackers to cause a denial of service (application crash) via a YES message without a newline character, which triggers a NULL dereference.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/rintintin-adv.txt">http://aluigi.altervista.org/adv/rintintin-adv.txt</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-201111-07.xml">GLSA-201111-07</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3632">3632</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487687/100/0/threaded">20080206 Chat vulnerabilities in TinTin++ 1.97.9</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27660">27660</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0449">ADV-2008-0449</ref>
    </refs>
    <vuln_soft>
      <prod name="tintin++" vendor="tintin">
        <vers num="1.97.9"/>
      </prod>
      <prod name="wintin++" vendor="tintin">
        <vers num="1.97.9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0673" seq="2008-0673" published="2008-02-11" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">TinTin++ 1.97.9 and WinTin++ 1.97.9 open files on the basis of an inbound file-transfer request, before the user has an opportunity to decline the request, which allows remote attackers to truncate arbitrary files in the top level of a home directory.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/rintintin-adv.txt">http://aluigi.altervista.org/adv/rintintin-adv.txt</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-201111-07.xml">GLSA-201111-07</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3632">3632</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487687/100/0/threaded">20080206 Chat vulnerabilities in TinTin++ 1.97.9</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27660">27660</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0449">ADV-2008-0449</ref>
    </refs>
    <vuln_soft>
      <prod name="tintin++" vendor="tintin">
        <vers num="1.97.9"/>
      </prod>
      <prod name="wintin++" vendor="tintin">
        <vers num="1.97.9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0674" seq="2008-0674" published="2008-02-18" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in PCRE before 7.6 allows remote attackers to execute arbitrary code via a regular expression containing a character class with a large number of characters with Unicode code points greater than 255.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://ftp.gnome.org/pub/gnome/sources/glib/2.14/glib-2.14.6.news">http://ftp.gnome.org/pub/gnome/sources/glib/2.14/glib-2.14.6.news</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html">APPLE-SA-2008-07-31</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html">APPLE-SA-2008-10-09</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2009/Aug/msg00001.html">APPLE-SA-2009-08-05-1</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00008.html">SUSE-SR:2008:004</ref>
      <ref source="CONFIRM" url="http://pcre.org/changelog.txt">http://pcre.org/changelog.txt</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200803-24.xml">GLSA-200803-24</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200811-05.xml">GLSA-200811-05</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3216">http://support.apple.com/kb/HT3216</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3757">http://support.apple.com/kb/HT3757</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0086">http://wiki.rpath.com/Advisories:rPSA-2008-0086</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0086">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0086</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0176">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0176</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1499">DSA-1499</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:053">MDVSA-2008:053</ref>
      <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/05/02/2">[oss-security] 20080502 CVE Request (PHP)</ref>
      <ref source="CONFIRM" url="http://www.php.net/ChangeLog-5.php">http://www.php.net/ChangeLog-5.php</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488927/100/0/threaded">20080228 rPSA-2008-0086-1 pcre</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492535/100/0/threaded">20080523 rPSA-2008-0176-1 php php-cgi php-imap php-mcrypt php-mysql php-mysqli php-pgsql php-soap php-xsl php5 php5-cgi php5-imap php5-mcrypt php5-mysql php5-mysqli php5-pear php5-pgsql php5-soap php5-xsl</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27786">27786</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29009">29009</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/31681">31681</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1022674">1022674</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA09-218A.html">TA09-218A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0570">ADV-2008-0570</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0592">ADV-2008-0592</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1412">ADV-2008-1412</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2268">ADV-2008-2268</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2780">ADV-2008-2780</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/2172">ADV-2009-2172</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=431660">https://bugzilla.redhat.com/show_bug.cgi?id=431660</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40505">pcre-characterclass-bo(40505)</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2223">https://issues.rpath.com/browse/RPL-2223</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2503">https://issues.rpath.com/browse/RPL-2503</ref>
      <ref source="UBUNTU" url="https://usn.ubuntu.com/581-1/">USN-581-1</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00371.html">FEDORA-2008-1533</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00632.html">FEDORA-2008-1783</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00181.html">FEDORA-2008-1842</ref>
    </refs>
    <vuln_soft>
      <prod name="pcre" vendor="pcre">
        <vers num="7.5" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0675" seq="2008-0675" published="2008-02-11" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in cms/index.pl in The Everything Development Engine in The Everything Development System Pre-1.0 and earlier allows remote attackers to execute arbitrary SQL commands via the node_id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3631">3631</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487436/100/0/threaded">20080201 The Everything Development System - SQL Injection</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27569">27569</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5037">5037</ref>
    </refs>
    <vuln_soft>
      <prod name="the_everything_development_engine" vendor="the_everything_development_company">
        <vers num="pre-1.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0676" seq="2008-0676" published="2008-02-11" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in search.php in A-Blog 2 allows remote attackers to inject arbitrary web script or HTML via the words parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27594">27594</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5050">5050</ref>
    </refs>
    <vuln_soft>
      <prod name="a-blog" vendor="a-blog">
        <vers num="2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0677" seq="2008-0677" published="2008-02-11" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in blog.php in A-Blog 2 allows remote attackers to execute arbitrary SQL commands via the id parameter in a news action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27594">27594</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5050">5050</ref>
    </refs>
    <vuln_soft>
      <prod name="a-blog" vendor="a-blog">
        <vers num="2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0678" seq="2008-0678" published="2008-02-11" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in BlogPHP 2.0 allows remote attackers to execute arbitrary SQL commands via the id parameter in a page action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27591">27591</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5042">5042</ref>
    </refs>
    <vuln_soft>
      <prod name="blogphp" vendor="blogphp">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0679" seq="2008-0679" published="2008-02-11" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php in BlogPHP 2.0 allows remote attackers to inject arbitrary web script or HTML via the search parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27591">27591</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5042">5042</ref>
    </refs>
    <vuln_soft>
      <prod name="blogphp" vendor="blogphp">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0680" seq="2008-0680" published="2008-02-11" modified="2017-10-03" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">SNMPd in MikroTik RouterOS 3.2 and earlier allows remote attackers to cause a denial of service (daemon crash) via a crafted SNMP SET request.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://hellknights.void.ru/shados/snmp_sploit.c">http://hellknights.void.ru/shados/snmp_sploit.c</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27599">27599</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0399">ADV-2008-0399</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5054">5054</ref>
    </refs>
    <vuln_soft>
      <prod name="routeros" vendor="microtik">
        <vers num="3.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0681" seq="2008-0681" published="2008-02-11" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in PHPShop 0.8.1 allows remote attackers to execute arbitrary SQL commands via the product_id parameter, as demonstrated by a shop/flypage action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3628">3628</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487435/100/0/threaded">20080202 phpShop &lt;= v 0.8.1 Remote SQL injection / Filter Bypass</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27570">27570</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5041">5041</ref>
    </refs>
    <vuln_soft>
      <prod name="phpshop" vendor="phpshop">
        <vers num="0.8.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0682" seq="2008-0682" published="2008-02-11" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in wordspew-rss.php in the Wordspew plugin before 3.72 for Wordpress allows remote attackers to execute arbitrary SQL commands via the id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://pierre.sudarovich.free.fr/index.php/2006/02/28/ajax-shoutbox/">http://pierre.sudarovich.free.fr/index.php/2006/02/28/ajax-shoutbox/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27583">27583</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5039">5039</ref>
    </refs>
    <vuln_soft>
      <prod name="wordspew" vendor="wordpress">
        <vers num="1.6"/>
        <vers num="1.7"/>
        <vers num="1.8"/>
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="2.2"/>
        <vers num="2.3"/>
        <vers num="2.5"/>
        <vers num="2.6"/>
        <vers num="2.7"/>
        <vers num="2.8"/>
        <vers num="2.9"/>
        <vers num="2.31"/>
        <vers num="2.32"/>
        <vers num="2.85"/>
        <vers num="2.91"/>
        <vers num="2.92"/>
        <vers num="2.93"/>
        <vers num="2.94"/>
        <vers num="2.95"/>
        <vers num="3.0"/>
        <vers num="3.1"/>
        <vers num="3.2"/>
        <vers num="3.3"/>
        <vers num="3.6"/>
        <vers num="3.7"/>
        <vers num="3.15"/>
        <vers num="3.16"/>
        <vers num="3.021"/>
        <vers num="3.022"/>
        <vers num="3.31"/>
        <vers num="3.32"/>
        <vers num="3.33"/>
        <vers num="3.34"/>
        <vers num="3.51"/>
        <vers num="3.52"/>
        <vers num="3.71" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0683" seq="2008-0683" published="2008-02-11" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in shiftthis-preview.php in the ShiftThis Newsletter (st_newsletter) plugin for WordPress allows remote attackers to execute arbitrary SQL commands via the newsletter parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27586">27586</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5053">5053</ref>
    </refs>
    <vuln_soft>
      <prod name="st_newsletter_plugin" vendor="wordpress">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0684" seq="2008-0684" published="2008-02-11" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in ViewCat.php in iTechClassifieds 3.0 allows remote attackers to inject arbitrary web script or HTML via the CatID parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=120197273611835&amp;w=2">20080201 ITech Classifieds Multiple Remote  Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27574">27574</ref>
    </refs>
    <vuln_soft>
      <prod name="itechclassifieds" vendor="itechscripts">
        <vers num="3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0685" seq="2008-0685" published="2008-02-11" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in ViewCat.php in iTechClassifieds 3.0 allows remote attackers to execute arbitrary SQL commands via the CatID parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=120197273611835&amp;w=2">20080201 ITech Classifieds Multiple Remote  Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27574">27574</ref>
    </refs>
    <vuln_soft>
      <prod name="itechclassifieds" vendor="itechscripts">
        <vers num="3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0686" seq="2008-0686" published="2008-02-11" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the NeoReferences (com_neoreferences) 1.3.1 and 1.3.3 component for Joomla! allows remote attackers to execute arbitrary SQL commands via the catid parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27564">27564</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40167">neoreferences-index-sql-injection(40167)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5034">5034</ref>
    </refs>
    <vuln_soft>
      <prod name="com_neoreferences" vendor="joomla">
        <vers num="1.3.1"/>
        <vers num="1.3.3"/>
      </prod>
      <prod name="com_neoreferences" vendor="mambo">
        <vers num="1.3.1"/>
        <vers num="1.3.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0687" seq="2008-0687" published="2008-02-11" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in siteadmin/editor_files/includes/load_message.php in the Youtube Clone Script allows remote attackers to inject arbitrary web script or HTML via the lang[please_wait] parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3635">3635</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487432/100/0/threaded">20080201 Youtube Clone Xross Site Scripting (load_message.php)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27598">27598</ref>
    </refs>
    <vuln_soft>
      <prod name="clone_script" vendor="youtube">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0688" seq="2008-0688" published="2008-02-11" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in catalog.php in Smartscript Domain Trader 2.0 allows remote attackers to inject arbitrary web script or HTML via the id parameter in a viewcategory action.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3633">3633</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487433/100/0/threaded">20080202 Domain Trader v2.0 Xss Vulnerable</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27571">27571</ref>
    </refs>
    <vuln_soft>
      <prod name="domain_trader" vendor="smartscript">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0689" seq="2008-0689" published="2008-02-11" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the Marketplace (com_marketplace) 1.1.1 and 1.1.1-pl1 component for Joomla! allows remote attackers to execute arbitrary SQL commands via the catid parameter in a show_category action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27600">27600</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5055">5055</ref>
    </refs>
    <vuln_soft>
      <prod name="com_marketplace" vendor="joomla">
        <vers num="1.1.1"/>
        <vers num="1.1.1-pl1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0690" seq="2008-0690" published="2008-02-11" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the mosDirectory (com_directory) 2.3.2 component for Joomla! allows remote attackers to execute arbitrary SQL commands via the catid parameter in a viewcat action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27585">27585</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5047">5047</ref>
    </refs>
    <vuln_soft>
      <prod name="com_directory" vendor="joomla">
        <vers num="2.3.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0691" seq="2008-0691" published="2008-02-11" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in admin_panel.php in the Simon Elvery WP-Footnotes 2.2 plugin for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) wp_footnotes_current_settings[priority], (2) wp_footnotes_current_settings[style_rules], (3) wp_footnotes_current_settings[pre_footnotes], and (4) wp_footnotes_current_settings[post_footnotes] parameters.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3634">3634</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487430/100/0/threaded">20080201 Wordpress Pluging wp-footnotes 2.2 (admin_panel.php) Multiple Vulnerabilites</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27572">27572</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40218">wpfootnotes-adminpanel-security-bypass(40218)</ref>
    </refs>
    <vuln_soft>
      <prod name="wp-footnotes" vendor="simon_elvery">
        <vers num="2.2"/>
      </prod>
      <prod name="wp-footnotes" vendor="wordpress">
        <vers num="2.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0692" seq="2008-0692" published="2008-02-11" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in bidhistory.php in iTechBids 3 Gold and 5.0 allows remote attackers to execute arbitrary SQL commands via the item_id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27601">27601</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5056">5056</ref>
    </refs>
    <vuln_soft>
      <prod name="itechbids" vendor="itechscripts">
        <vers num="3_gold"/>
        <vers num="5.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0693" seq="2008-0693" published="2008-02-11" modified="2011-03-07" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in PQCore.exe in Print Manager Plus 2008 Client Billing and Authentication 7.0.127.16 allows remote attackers to cause a denial of service (service outage) via a series of long packets to TCP port 48101.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/pqcorez-adv.txt">http://aluigi.altervista.org/adv/pqcorez-adv.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27604">27604</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0407">ADV-2008-0407</ref>
    </refs>
    <vuln_soft>
      <prod name="client_billing_and_authentication" vendor="print_manager_plus">
        <vers num="7.0.127.16"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0694" seq="2008-0694" published="2008-02-11" modified="2011-03-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the HTTP Server in IBM OS/400 V5R3M0 and V5R4M0 allows remote attackers to inject arbitrary web script or HTML via the Expect HTTP header.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27595">27595</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0397">ADV-2008-0397</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/docview.wss?uid=nas22f5a0f082f6821c4862573e10041f7bd">SE31823</ref>
    </refs>
    <vuln_soft>
      <prod name="os_400" vendor="ibm">
        <vers num="v5r3m0"/>
        <vers num="v5r4m0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0695" seq="2008-0695" published="2008-02-11" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in BookmarkX script 2007 allows remote attackers to execute arbitrary SQL commands via the topicid parameter in a showtopic action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5040">5040</ref>
    </refs>
    <vuln_soft>
      <prod name="script" vendor="bookmarkx">
        <vers num="2007"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0696" seq="2008-0696" published="2008-02-11" modified="2011-03-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">IBM DB2 UDB before 8.2 Fixpak 16 does not properly check authorization for the ALTER TABLE statement, which has unknown impact and attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v82/APARLIST.TXT">ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v82/APARLIST.TXT</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0401">ADV-2008-0401</ref>
    </refs>
    <vuln_soft>
      <prod name="db2" vendor="ibm">
        <vers num="8.2_fixpack15"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0697" seq="2008-0697" published="2008-02-11" modified="2011-03-07" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in DB2PD in IBM DB2 UDB before 8.2 Fixpak 16 allows local users to gain root privileges via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v82/APARLIST.TXT">ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v82/APARLIST.TXT</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0401">ADV-2008-0401</ref>
    </refs>
    <vuln_soft>
      <prod name="db2" vendor="ibm">
        <vers num="8.2_fixpack15"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0698" seq="2008-0698" published="2008-02-11" modified="2011-03-07" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the DAS server in IBM DB2 UDB before 8.2 Fixpak 16 has unknown attack vectors, and an impact probably involving "invalid memory access."</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v82/APARLIST.TXT">ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v82/APARLIST.TXT</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27681">27681</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0401">ADV-2008-0401</ref>
    </refs>
    <vuln_soft>
      <prod name="db2" vendor="ibm">
        <vers num="8.2_fixpack15"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0699" seq="2008-0699" published="2008-02-11" modified="2018-11-01" severity="High" CVSS_version="2.0" CVSS_score="9.0" CVSS_base_score="9.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the ADMIN_SP_C procedure (SYSPROC.ADMIN_SP_C) in IBM DB2 UDB before 8.2 Fixpak 16, 9.1 before FP4a, and 9.5 before FP1 allows remote authenticated users to execute arbitrary code via unspecified attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v82/APARLIST.TXT" adv="1">ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v82/APARLIST.TXT</ref>
      <ref source="MISC" url="http://www.appsecinc.com/resources/alerts/db2/2008-02.shtml" adv="1">http://www.appsecinc.com/resources/alerts/db2/2008-02.shtml</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491075/100/0/threaded" adv="1">20080418 Team SHATTER Security Advisory: IBM DB2 UDB Arbitrary code execution in ADMIN_SP_C/ADMIN_SP_C2 procedures</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0401" adv="1">ADV-2008-0401</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/docview.wss?uid=swg1IZ06972" adv="1" patch="1">IZ06972</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/docview.wss?uid=swg1IZ06973" adv="1" patch="1">IZ06973</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/docview.wss?uid=swg1IZ10917" adv="1" patch="1">IZ10917</ref>
    </refs>
    <vuln_soft>
      <prod name="db2" vendor="ibm">
        <vers num="8.2" edition="fp1"/>
        <vers num="8.2" edition="fp10"/>
        <vers num="8.2" edition="fp11"/>
        <vers num="8.2" edition="fp12"/>
        <vers num="8.2" edition="fp13"/>
        <vers num="8.2" edition="fp14"/>
        <vers num="8.2" edition="fp15"/>
        <vers num="8.2" edition="fp16"/>
        <vers num="8.2" edition="fp2"/>
        <vers num="8.2" edition="fp3"/>
        <vers num="8.2" edition="fp4"/>
        <vers num="8.2" edition="fp5"/>
        <vers num="8.2" edition="fp6"/>
        <vers num="8.2" edition="fp7"/>
        <vers num="8.2" edition="fp8"/>
        <vers num="8.2" edition="fp9"/>
        <vers num="9.1" edition="fp1"/>
        <vers num="9.1" edition="fp2"/>
        <vers num="9.1" edition="fp2a"/>
        <vers num="9.1" edition="fp3"/>
        <vers num="9.1" edition="fp3a"/>
        <vers num="9.1" edition="fp4"/>
        <vers num="9.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0700" seq="2008-0700" published="2008-02-11" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in search.php in Crux Software CruxCMS 3.0 allows remote attackers to inject arbitrary web script or HTML via the search parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27588">27588</ref>
    </refs>
    <vuln_soft>
      <prod name="cruxcms" vendor="crux_software">
        <vers num="3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0701" seq="2008-0701" published="2008-02-11" modified="2008-12-17" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">ActivationHandler in Magnolia CE 3.5.x before 3.5.4 does not check permissions during importing, which allows remote attackers to have an unknown impact via activation of a new item, possibly involving addition of arbitrary new content.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://jira.magnolia.info/browse/MAGNOLIA-2021">http://jira.magnolia.info/browse/MAGNOLIA-2021</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=573088">http://sourceforge.net/project/shownotes.php?release_id=573088</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27608">27608</ref>
    </refs>
    <vuln_soft>
      <prod name="ce" vendor="magnolia">
        <vers num="3.5.1"/>
        <vers num="3.5.2"/>
        <vers num="3.5.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0702" seq="2008-0702" published="2008-02-11" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple heap-based buffer overflows in Titan FTP Server 6.03 and 6.0.5.549 allow remote attackers to cause a denial of service (daemon crash or hang) and possibly execute arbitrary code via a long argument to the (1) USER or (2) PASS command, different vectors than CVE-2004-1641.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3639">3639</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487431/100/0/threaded">20080201 Titan FTP Server Remote Heap Overflow (USER/PASS)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27568">27568</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0393">ADV-2008-0393</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5036">5036</ref>
    </refs>
    <vuln_soft>
      <prod name="titan_ftp_server" vendor="south_river_technologies">
        <vers num="6.0.5.549"/>
        <vers num="6.03"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0703" seq="2008-0703" published="2008-02-11" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Multiple directory traversal vulnerabilities in sflog! 0.96 allow remote attackers to read arbitrary files via a .. (dot dot) in the (1) permalink or (2) section parameter to index.php, possibly involving includes/entries.inc.php and other files included by index.php.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3629">3629</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487368/100/0/threaded">20080131 sflog! 0.96 remote file disclosure vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27541">27541</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40115">sflog-blog-index-directory-traversal(40115)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5027">5027</ref>
    </refs>
    <vuln_soft>
      <prod name="sflog" vendor="sflog">
        <vers num="0.96" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0704" seq="2008-0704" published="2008-03-28" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the SSH server in HP OpenVMS TCP/IP Services on OpenVMS on the Alpha platform with 5.4 before ECO 7, and on the Integrity and Alpha platforms with 5.5 before ECO 3 and 5.6 before ECO 2, allows remote attackers to obtain unspecified access via unknown vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28486">28486</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019727">1019727</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1009">ADV-2008-1009</ref>
      <ref source="HP" url="http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01414022">SSRT071479</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41519">openvms-sshserver-unauthorized-access(41519)</ref>
    </refs>
    <vuln_soft>
      <prod name="open_vms_tcp-ip_services" vendor="hp">
        <vers num="5.4" prev="1" edition="eco_6"/>
        <vers num="5.5" prev="1" edition="eco_2"/>
        <vers num="5.6" prev="1" edition="eco_1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0705" seq="2008-0705" published="2017-05-11" modified="2017-05-11" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2008. Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2008-0706" seq="2008-0706" published="2008-03-31" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the BIOS F.26 and earlier for the HP Compaq Notebook PC allows physically proximate attackers to obtain privileged access via unspecified vectors, possibly involving an authentication bypass of the power-on password.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=120672270224094&amp;w=2">HPSBGN02319</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019730">1019730</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28495" patch="1">28495</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1043/references">ADV-2008-1043</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41521">compaq-pcbios-security-bypass(41521)</ref>
    </refs>
    <vuln_soft>
      <prod name="presario_a900" vendor="compaq">
        <vers num=""/>
      </prod>
      <prod name="presario_c700" vendor="compaq">
        <vers num=""/>
      </prod>
      <prod name="g7000" vendor="hp">
        <vers num=""/>
      </prod>
      <prod name="hpqflash_for_hp_notebook_system_bios" vendor="hp">
        <vers num="f.2a"/>
        <vers num="f.2b"/>
        <vers num="f.2e"/>
        <vers num="f.2f"/>
        <vers num="f.18"/>
        <vers num="f.21"/>
        <vers num="f.26"/>
        <vers num="f.28"/>
        <vers num="f.30"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0707" seq="2008-0707" published="2008-03-19" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">HP StorageWorks Library and Tape Tools (LTT) before 4.5 SR1 on HP-UX B.11.11 and B.11.23 allows local users to gain privileges via unspecified vectors.</descript>
      <descript source="nvd">Link 1015143 requires login</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019651" patch="1">1019651</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28314">28314</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0926/references">ADV-2008-0926</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41337">hp-storageworks-unspecified-priv-escalation(41337)</ref>
      <ref source="HP" url="https://www12.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01399648">SSRT080029</ref>
    </refs>
    <vuln_soft>
      <prod name="storageworks_library_and_tape_tools" vendor="hp">
        <vers num="4.5_sr1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0708" seq="2008-0708" published="2008-04-06" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">HP USB 2.0 Floppy Drive Key product options (1) 442084-B21 and (2) 442085-B21 for certain HP ProLiant servers contain the (a) W32.Fakerecy and (b) W32.SillyFDC worms, which might be launched if the server does not have up-to-date detection.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=120732648630458&amp;w=2">SSRT080032</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019785">1019785</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41648">hp-usbfloppydrivekey-weak-security(41648)</ref>
    </refs>
    <vuln_soft>
      <prod name="442084-b21" vendor="hp">
        <vers num=""/>
      </prod>
      <prod name="442085-b21" vendor="hp">
        <vers num=""/>
      </prod>
      <prod name="proliant" vendor="hp">
        <vers num="bl20pg4"/>
        <vers num="bl25pg2"/>
        <vers num="bl45pg2"/>
        <vers num="bl260c"/>
        <vers num="bl460c"/>
        <vers num="bl465c"/>
        <vers num="bl465cg5"/>
        <vers num="bl480c"/>
        <vers num="bl680cg5"/>
        <vers num="bl685c"/>
        <vers num="bl685cg5"/>
        <vers num="dl120g5"/>
        <vers num="dl140g3"/>
        <vers num="dl145g3"/>
        <vers num="dl160g5"/>
        <vers num="dl165g5"/>
        <vers num="dl180"/>
        <vers num="dl180g5"/>
        <vers num="dl185g5"/>
        <vers num="dl320g5"/>
        <vers num="dl365g5"/>
        <vers num="dl380g5"/>
        <vers num="dl385g2"/>
        <vers num="dl385g5"/>
        <vers num="dl580g4"/>
        <vers num="ml110g5"/>
        <vers num="ml115"/>
        <vers num="ml115g5"/>
        <vers num="ml150g3"/>
        <vers num="ml150g5"/>
        <vers num="ml310g4"/>
        <vers num="ml310g5"/>
        <vers num="ml350g5"/>
        <vers num="ml370g5"/>
        <vers num="ml570g4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0709" seq="2008-0709" published="2008-04-07" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.5" CVSS_base_score="5.5" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple unspecified vulnerabilities in HP Select Identity 4.00, 4.01, 4.11, 4.12, 4.13, and 4.20 allow remote authenticated users to access other user accounts via unknown vectors, a different issue than CVE-2008-0214.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01391833">HPSBMA02317</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019746">1019746</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28558">28558</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1072/references">ADV-2008-1072</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41583">hpselectidentity-useraccount-unauth-access(41583)</ref>
    </refs>
    <vuln_soft>
      <prod name="select_identity" vendor="hp">
        <vers num="4.00"/>
        <vers num="4.01"/>
        <vers num="4.11"/>
        <vers num="4.12"/>
        <vers num="4.13"/>
        <vers num="4.20"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0710" seq="2008-0710" published="2017-05-11" modified="2017-05-11" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2008. Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2008-0711" seq="2008-0711" published="2008-04-08" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the embedded management console in HP iLO-2 Management Processors (iLO-2 MP), as used in Integrity Servers rx2660, rx3600, and rx6600, and Integrity Blade Server model bl860c, allows remote attackers to cause a denial of service via unknown vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=120766789901792&amp;w=2">SSRT071455</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3804">3804</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28673">28673</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019795">1019795</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1132/references">ADV-2008-1132</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41696">hp-integrityserver-ilo2mp-console-dos(41696)</ref>
    </refs>
    <vuln_soft>
      <prod name="bl860c" vendor="hp">
        <vers num=""/>
      </prod>
      <prod name="rx2660" vendor="hp">
        <vers num=""/>
      </prod>
      <prod name="rx3600" vendor="hp">
        <vers num=""/>
      </prod>
      <prod name="rx6600" vendor="hp">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0712" seq="2008-0712" published="2008-04-25" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the HP HPeDiag (aka eSupportDiagnostics) ActiveX control in hpediag.dll in HP Software Update 4.000.009.002 and earlier allows remote attackers to execute arbitrary code or obtain sensitive information via unspecified vectors.  NOTE: this might overlap CVE-2007-6513.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=120907060320901&amp;w=2">HPSBGN02333</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28929">28929</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019922">1019922</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1356/references">ADV-2008-1356</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42003">hpsoftware-hpediag-code-execution(42003)</ref>
    </refs>
    <vuln_soft>
      <prod name="software_update" vendor="hp">
        <vers num="4.000.009.002" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0713" seq="2008-0713" published="2008-05-13" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the FTP server for HP-UX B.11.11, B.11.23, and B.11.31 allows remote authenticated users to cause a denial of service (FTP server outage) via unknown attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01446326">SSRT071403</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29160">29160</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020005">1020005</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1475/references">ADV-2008-1475</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42357">hpux-ftp-dos(42357)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5289">oval:org.mitre.oval:def:5289</ref>
    </refs>
    <vuln_soft>
      <prod name="hp-ux" vendor="hp">
        <vers num="11.11"/>
        <vers num="11.23"/>
        <vers num="11.31"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0714" seq="2008-0714" published="2008-02-11" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in users.php in Mihalism Multi Host allows remote attackers to execute arbitrary SQL commands via the username parameter in a lost_password_go action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27651">27651</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40289">mihalism-users-sql-injection(40289)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5074">5074</ref>
    </refs>
    <vuln_soft>
      <prod name="multi_host" vendor="mihalism">
        <vers num="3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0715" seq="2008-0715" published="2008-02-11" modified="2011-03-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in ACDSee Photo Manager 8.1, 9.0, and 10.0 allows user-assisted remote attackers to execute arbitrary code via a malformed XBM file.  NOTE: this might be the same as CVE-2007-6009.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.trendmicro.com/vinfo/secadvisories/default6.asp?VName=Vulnerability+in+AcdSee+Photo+Manager">http://www.trendmicro.com/vinfo/secadvisories/default6.asp?VName=Vulnerability+in+AcdSee+Photo+Manager</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0443">ADV-2008-0443</ref>
    </refs>
    <vuln_soft>
      <prod name="photo_manager" vendor="acdsee">
        <vers num="8.1"/>
        <vers num="9.0"/>
        <vers num="10.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0716" seq="2008-0716" published="2008-02-11" modified="2011-03-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.1" CVSS_vector="(AV:L/AC:L/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The agent in Symantec Altiris Notification Server before 6.0 SP3 R7 allows local users to gain privileges via a "Shatter" style attack.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://securityresponse.symantec.com/avcenter/security/Content/2008.02.06.html" patch="1">http://securityresponse.symantec.com/avcenter/security/Content/2008.02.06.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27645" patch="1">27645</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019313">1019313</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0444">ADV-2008-0444</ref>
    </refs>
    <vuln_soft>
      <prod name="altiris_notification_server" vendor="symantec">
        <vers num="6.0_sp3" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0717" seq="2008-0717" published="2008-02-11" modified="2011-03-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Caching Proxy (CP) 5.1 through 6.1 in IBM WebSphere Edge Server, when CGI mapping rules are enabled, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors that trigger injection into an error response.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27665">27665</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019315">1019315</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0446">ADV-2008-0446</ref>
      <ref source="CONFIRM" url="http://www-1.ibm.com/support/docview.wss?uid=swg21294776">http://www-1.ibm.com/support/docview.wss?uid=swg21294776</ref>
    </refs>
    <vuln_soft>
      <prod name="websphere_edge_server" vendor="ibm">
        <vers num="5.1"/>
        <vers num="5.1.1"/>
        <vers num="6.0"/>
        <vers num="6.0.1"/>
        <vers num="6.0.2"/>
        <vers num="6.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0718" seq="2008-0718" published="2008-02-11" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.7" CVSS_base_score="4.7" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the USB Mouse STREAMS module (usbms) in Sun Solaris 9 and 10, when 64-bit mode is enabled, allows local users to cause a denial of service (panic) via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-201316-1">201316</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27773">27773</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0451">ADV-2008-0451</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5474">oval:org.mitre.oval:def:5474</ref>
    </refs>
    <vuln_soft>
      <prod name="solaris" vendor="sun">
        <vers num="9" edition=":sparc"/>
        <vers num="9" edition=":x86"/>
        <vers num="10" edition=":sparc"/>
        <vers num="10" edition=":x86"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0719" seq="2008-0719" published="2008-02-11" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in customer_testimonials.php in the Customer Testimonials 3 and 3.1 Addon for osCommerce Online Merchant 2.2 allows remote attackers to execute arbitrary SQL commands via the testimonial_id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27664">27664</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5075">5075</ref>
    </refs>
    <vuln_soft>
      <prod name="customer_testimonials" vendor="oscommerce">
        <vers num="3.1"/>
      </prod>
      <prod name="oscommerce" vendor="oscommerce">
        <vers num="2.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0720" seq="2008-0720" published="2008-02-11" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Webmin 1.370 and 1.390 and Usermin 1.300 and 1.320 allows remote attackers to inject arbitrary web script or HTML via the search parameter to webmin_search.cgi (aka the search section), and possibly other components accessed through a "search box" or "open file box." NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://forum.aria-security.net/showthread.php?t=511">http://forum.aria-security.net/showthread.php?t=511</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487656/100/0/threaded">20080206 Tested on Webmin 1.390</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487678/100/0/threaded">20080206 Re: Tested on Webmin 1.390</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27662">27662</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0450">ADV-2008-0450</ref>
    </refs>
    <vuln_soft>
      <prod name="usermin" vendor="webmin">
        <vers num="1.3"/>
        <vers num="1.32"/>
      </prod>
      <prod name="webmin" vendor="webmin">
        <vers num="1.370"/>
        <vers num="1.390"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0721" seq="2008-0721" published="2008-02-11" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the Sermon (com_sermon) 0.2 component for Mambo allows remote attackers to execute arbitrary SQL commands via the gid parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27673">27673</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5076">5076</ref>
    </refs>
    <vuln_soft>
      <prod name="com_sermon" vendor="mambo">
        <vers num="0.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0722" seq="2008-0722" published="2008-02-11" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php in Pagetool 1.0.7 allows remote attackers to inject arbitrary web script or HTML via the search_term parameter in a pagetool_search action.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27653">27653</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4983">4983</ref>
    </refs>
    <vuln_soft>
      <prod name="pagetool" vendor="pagetool">
        <vers num="1.07"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0723" seq="2008-0723" published="2008-02-11" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in mynews.inc.php in MyNews 1.6.4, and other earlier 1.6.x versions, allows remote attackers to inject arbitrary web script or HTML via the hash parameter in an admin action to index.php, a different vulnerability than CVE-2006-2208.1.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://marc.info/?l=full-disclosure&amp;m=120232523420188&amp;w=2">20080206 MyNews 1.6.X HTML/JS Injection Vulnerability</ref>
      <ref source="FULLDISC" url="http://marc.info/?l=full-disclosure&amp;m=120235668406688&amp;w=2">20080207 Re: MyNews 1.6.X HTML/JS Injection Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27652">27652</ref>
    </refs>
    <vuln_soft>
      <prod name="mynews" vendor="planetluc">
        <vers num="1.6.4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0724" seq="2008-0724" published="2008-02-11" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The Everything Development Engine in The Everything Development System Pre-1.0 and earlier stores passwords in cleartext in a database, which makes it easier for context-dependent attackers to obtain access to user accounts.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3631">3631</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487436/100/0/threaded">20080201 The Everything Development System - SQL Injection</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5037">5037</ref>
    </refs>
    <vuln_soft>
      <prod name="the_everything_development_engine" vendor="the_everything_development_company">
        <vers num="pre-1.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0725" seq="2008-0725" published="2008-02-11" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple heap-based buffer overflows in the (1) FTP service and (2) administration service in Titan FTP Server 6.0.5.549 allow remote attackers to cause a denial of service (daemon hang) and possibly execute arbitrary code via a long command.  NOTE: the USER and PASS commands for the FTP service are covered by CVE-2008-0702.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs/>
    <vuln_soft>
      <prod name="ftp_server" vendor="titan">
        <vers num="6.0.5.549"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0726" seq="2008-0726" published="2008-02-12" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Integer overflow in Adobe Reader and Acrobat 8.1.1 and earlier allows remote attackers to execute arbitrary code via crafted arguments to the printSepsWithParams, which triggers memory corruption.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00007.html">SUSE-SA:2008:009</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200803-01.xml">GLSA-200803-01</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-239286-1">239286</ref>
      <ref source="CONFIRM" url="http://www.adobe.com/support/security/advisories/apsa08-01.html" patch="1">http://www.adobe.com/support/security/advisories/apsa08-01.html</ref>
      <ref source="CONFIRM" url="http://www.adobe.com/support/security/bulletins/apsb08-13.html">http://www.adobe.com/support/security/bulletins/apsb08-13.html</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0144.html">RHSA-2008:0144</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488000/100/0/threaded">20080211 ZDI-08-004: Adobe AcrobatReader Javascript for PDF Integer Overflow Vulnerability</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1966/references">ADV-2008-1966</ref>
      <ref source="MISC" url="http://www.zerodayinitiative.com/advisories/ZDI-08-004.html">http://www.zerodayinitiative.com/advisories/ZDI-08-004.html</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10957">oval:org.mitre.oval:def:10957</ref>
    </refs>
    <vuln_soft>
      <prod name="acrobat" vendor="adobe">
        <vers num="8.1.1" prev="1"/>
      </prod>
      <prod name="acrobat_reader" vendor="adobe">
        <vers num="8.1.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0727" seq="2008-0727" published="2008-03-17" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="8.5" CVSS_base_score="8.5" CVSS_impact_subscore="9.2" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:N/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple buffer overflows in oninit.exe in IBM Informix Dynamic Server (IDS) 7.x through 11.x allow (1) remote attackers to execute arbitrary code via a long password and (2) remote authenticated users to execute arbitrary code via a long DBPATH value.</descript>
      <descript source="nvd">All IBM links require software support sign in to view.</descript>
    </desc>
    <loss_types>
      <avail/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3749">3749</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489547/100/0/threaded">20080313 ZDI-08-011: IBM Informix Dynamic Server DBPATH Buffer Overflow Vulnerability</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489548/100/0/threaded">20080313 ZDI-08-012: IBM Informix Dynamic Server Authentication Password Stack Overflow Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28198">28198</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0860">ADV-2008-0860</ref>
      <ref source="MISC" url="http://www.zerodayinitiative.com/advisories/ZDI-08-011/">http://www.zerodayinitiative.com/advisories/ZDI-08-011/</ref>
      <ref source="MISC" url="http://www.zerodayinitiative.com/advisories/ZDI-08-012/">http://www.zerodayinitiative.com/advisories/ZDI-08-012/</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/docview.wss?uid=swg1IC55207">IC55207</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/docview.wss?uid=swg1IC55208">IC55208</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/docview.wss?uid=swg1IC55209">IC55209</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/docview.wss?uid=swg1IC55210">IC55210</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41202">ibm-informix-oninit-dbpath-bo(41202)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41203">ibm-informix-oninit-bo(41203)</ref>
    </refs>
    <vuln_soft>
      <prod name="informix_dynamic_server" vendor="ibm">
        <vers num="7.3"/>
        <vers num="7.31.xd8"/>
        <vers num="7.31.xd9"/>
        <vers num="9.3"/>
        <vers num="9.4"/>
        <vers num="9.40.tc5"/>
        <vers num="9.40.uc1"/>
        <vers num="9.40.uc2"/>
        <vers num="9.40.uc3"/>
        <vers num="9.40.uc5"/>
        <vers num="9.40.xd8"/>
        <vers num="9.40_xc7"/>
        <vers num="10.0"/>
        <vers num="10.0.xc3"/>
        <vers num="10.0.xc4"/>
        <vers num="10.00.xc7w1"/>
        <vers num="11.10.xc2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0728" seq="2008-0728" published="2008-02-12" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The unmew11 function in libclamav/mew.c in libclamav in ClamAV before 0.92.1 has unknown impact and attack vectors that trigger "heap corruption."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.gentoo.org/show_bug.cgi?id=209915">http://bugs.gentoo.org/show_bug.cgi?id=209915</ref>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307562">http://docs.info.apple.com/article.html?artnum=307562</ref>
      <ref source="CONFIRM" url="http://kolab.org/security/kolab-vendor-notice-19.txt">http://kolab.org/security/kolab-vendor-notice-19.txt</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html">APPLE-SA-2008-03-18</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00008.html">SUSE-SR:2008:004</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200802-09.xml">GLSA-200802-09</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=575703" patch="1">http://sourceforge.net/project/shownotes.php?release_id=575703</ref>
      <ref source="CONFIRM" url="http://support.novell.com/techcenter/psdb/512985d2cd3090bfb93dcb7b551179cf.html">http://support.novell.com/techcenter/psdb/512985d2cd3090bfb93dcb7b551179cf.html</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:088">MDVSA-2008:088</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0503" adv="1">ADV-2008-0503</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0606" adv="1">ADV-2008-0606</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0924/references" adv="1">ADV-2008-0924</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40474">clamav-mewc-heap-corruption(40474)</ref>
    </refs>
    <vuln_soft>
      <prod name="clamav" vendor="clamav">
        <vers num="0.01"/>
        <vers num="0.02"/>
        <vers num="0.3"/>
        <vers num="0.05"/>
        <vers num="0.8" edition="rc3"/>
        <vers num="0.9" edition="rc1"/>
        <vers num="0.10"/>
        <vers num="0.12"/>
        <vers num="0.13"/>
        <vers num="0.14" edition="pre"/>
        <vers num="0.15"/>
        <vers num="0.20"/>
        <vers num="0.21"/>
        <vers num="0.22"/>
        <vers num="0.23"/>
        <vers num="0.24"/>
        <vers num="0.51"/>
        <vers num="0.52"/>
        <vers num="0.53"/>
        <vers num="0.54"/>
        <vers num="0.60"/>
        <vers num="0.60p"/>
        <vers num="0.65"/>
        <vers num="0.66"/>
        <vers num="0.67"/>
        <vers num="0.67-1"/>
        <vers num="0.68"/>
        <vers num="0.68.1"/>
        <vers num="0.70" edition="rc"/>
        <vers num="0.71"/>
        <vers num="0.72"/>
        <vers num="0.73"/>
        <vers num="0.74"/>
        <vers num="0.75"/>
        <vers num="0.75.1"/>
        <vers num="0.80" edition="rc"/>
        <vers num="0.80" edition="rc1"/>
        <vers num="0.80" edition="rc2"/>
        <vers num="0.80" edition="rc3"/>
        <vers num="0.80" edition="rc4"/>
        <vers num="0.80_rc"/>
        <vers num="0.81" edition="rc1"/>
        <vers num="0.82"/>
        <vers num="0.83"/>
        <vers num="0.84" edition="rc1"/>
        <vers num="0.84" edition="rc2"/>
        <vers num="0.85"/>
        <vers num="0.85.1"/>
        <vers num="0.86" edition="rc1"/>
        <vers num="0.86.1"/>
        <vers num="0.86.2"/>
        <vers num="0.87"/>
        <vers num="0.87.1"/>
        <vers num="0.88"/>
        <vers num="0.88.1"/>
        <vers num="0.88.2"/>
        <vers num="0.88.3"/>
        <vers num="0.88.4"/>
        <vers num="0.88.5"/>
        <vers num="0.88.6"/>
        <vers num="0.88.7"/>
        <vers num="0.88.7_p0"/>
        <vers num="0.88.7_p1"/>
        <vers num="0.90" edition="rc1"/>
        <vers num="0.90" edition="rc1.1"/>
        <vers num="0.90" edition="rc2"/>
        <vers num="0.90" edition="rc3"/>
        <vers num="0.90.1"/>
        <vers num="0.90.1_p0"/>
        <vers num="0.90.2"/>
        <vers num="0.90.2_p0"/>
        <vers num="0.90.3"/>
        <vers num="0.90.3_p0"/>
        <vers num="0.90.3_p1"/>
        <vers num="0.91" edition="rc1"/>
        <vers num="0.91" edition="rc2"/>
        <vers num="0.91.1"/>
        <vers num="0.91.2"/>
        <vers num="0.91.2_p0"/>
        <vers num="0.92" prev="1"/>
        <vers num="0.92_p0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0729" seq="2008-0729" published="2008-02-12" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.1" CVSS_base_score="7.1" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Mobile Safari on Apple iPhone 1.1.2 and 1.1.3 allows remote attackers to cause a denial of service (memory exhaustion and device crash) via certain JavaScript code that constructs a long string and an array containing long string elements, possibly a related issue to CVE-2006-3677.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3630">3630</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487607/100/0/threaded">20080205 Apple iPhone 1.1.3 remote DoS exploit</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492225/100/0/threaded">20080519 Re: Apple iPhone 1.1.3 remote DoS exploit</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27442">27442</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39998">iphone-mobilesafari-dos(39998)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4978">4978</ref>
    </refs>
    <vuln_soft>
      <prod name="mobile_safari" vendor="apple">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0730" seq="2008-0730" published="2008-02-12" modified="2017-11-21" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The (1) Simplified Chinese, (2) Traditional Chinese, (3) Korean, and (4) Thai language input methods in Sun Solaris 10 create files and directories with weak permissions under (a) .iiim/le and (b) .Xlocale in home directories, which might allow local users to write to, or read from, the home directories of other users.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-201315-1">201315</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27770" adv="1">27770</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0452" adv="1">ADV-2008-0452</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5545" adv="1">oval:org.mitre.oval:def:5545</ref>
    </refs>
    <vuln_soft>
      <prod name="solaris" vendor="sun">
        <vers num="10" edition=":~~~~sparc~:ko"/>
        <vers num="10" edition=":~~~~sparc~:th"/>
        <vers num="10" edition=":~~~~sparc~:zh"/>
        <vers num="10" edition=":~~~~x86~:ko"/>
        <vers num="10" edition=":~~~~x86~:th"/>
        <vers num="10" edition=":~~~~x86~:zh"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0731" seq="2008-0731" published="2008-02-12" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The Linux kernel before 2.6.18.8-0.8 in SUSE openSUSE 10.2 does not properly handle failure of an AppArmor change_hat system call, which might allow attackers to trigger the unconfining of an apparmored task.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00002.html">SUSE-SA:2008:006</ref>
    </refs>
    <vuln_soft>
      <prod name="apparmor" vendor="novell">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0732" seq="2008-0732" published="2008-02-12" modified="2008-09-05" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The init script for Apache Geronimo on SUSE Linux follows symlinks when performing a chown operation, which might allow local users to obtain access to unspecified files or directories.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html" patch="1">SUSE-SR:2008:003</ref>
    </refs>
    <vuln_soft>
      <prod name="geronimo" vendor="apache">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0733" seq="2008-0733" published="2008-02-12" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in CS Team Counter Strike Portals allows remote attackers to execute arbitrary SQL commands via the id parameter, as demonstrated using the downloads page.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487988/100/0/threaded">20080212 Kommentare zum Download script SQL Injection</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27747">27747</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40520">counterstrikeportals-index-sql-injection(40520)</ref>
    </refs>
    <vuln_soft>
      <prod name="counter_strike_portal" vendor="cs_team">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0734" seq="2008-0734" published="2008-02-12" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in class_auth.php in Limbo CMS 1.0.4.2, and possibly earlier versions, allows remote attackers to execute arbitrary SQL commands via the cuid cookie parameter to admin.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27710" patch="1">27710</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40415">limbo-admin-sql-injection(40415)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5088">5088</ref>
    </refs>
    <vuln_soft>
      <prod name="limbo_cms" vendor="limbo_cms">
        <vers num="1.0.4.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0735" seq="2008-0735" published="2008-02-12" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">SQL injection vulnerability in mod/gallery/ajax/gallery_data.php in AuraCMS 2.2 allows remote attackers to execute arbitrary SQL commands via the albums parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27764">27764</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5105">5105</ref>
    </refs>
    <vuln_soft>
      <prod name="auracms" vendor="auracms">
        <vers num="2.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0736" seq="2008-0736" published="2008-02-12" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">admin/SA_shipFedExMeter.asp in CandyPress (CP) 4.1.1.26, and possibly other 4.x and 3.x versions, allows remote attackers to obtain the path via a certain value of the FedExAccount parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3600">3600</ref>
      <ref source="MISC" url="http://www.candypress.com/CPforum/forum_posts.asp?TID=10630&amp;PN=1">http://www.candypress.com/CPforum/forum_posts.asp?TID=10630&amp;PN=1</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487058/100/0/threaded">20080125 [CandyPress] eCommerce suite (SQL Injection + XSS + Path Disclosure)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27454">27454</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0314">ADV-2008-0314</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39941">ecommerce-sashipfedexmeter-path-disclosure(39941)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4988">4988</ref>
    </refs>
    <vuln_soft>
      <prod name="candypress_store" vendor="shoppingtree">
        <vers num="4.1"/>
        <vers num="4.1.1.26"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0737" seq="2008-0737" published="2008-02-12" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in admin/utilities_ConfigHelp.asp in CandyPress (CP) 4.1.1.26, and other 4.x and 3.x versions, allows remote attackers to execute arbitrary SQL commands via the helpfield parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3600">3600</ref>
      <ref source="CONFIRM" url="http://www.candypress.com/CPforum/forum_posts.asp?TID=10630&amp;PN=1">http://www.candypress.com/CPforum/forum_posts.asp?TID=10630&amp;PN=1</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487058/100/0/threaded">20080125 [CandyPress] eCommerce suite (SQL Injection + XSS + Path Disclosure)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27454">27454</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0314">ADV-2008-0314</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4988">4988</ref>
    </refs>
    <vuln_soft>
      <prod name="candypress_store" vendor="shoppingtree">
        <vers num="4.1"/>
        <vers num="4.1.1.26"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0738" seq="2008-0738" published="2008-02-12" modified="2009-08-20" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in CandyPress (CP) 4.1.1.26, and earlier 4.1.x versions, allow remote attackers to execute arbitrary SQL commands via the (1) idcust parameter to (a) ajax_getTiers.asp and (b) ajax_getCust.asp in ajax/, and the (2) tableName parameter to (c) ajax/ajax_tableFields.asp.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.candypress.com/CPforum/forum_posts.asp?TID=10630&amp;PN=1">http://www.candypress.com/CPforum/forum_posts.asp?TID=10630&amp;PN=1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0314">ADV-2008-0314</ref>
    </refs>
    <vuln_soft>
      <prod name="candypress_store" vendor="shoppingtree">
        <vers num="4.1" prev="1"/>
        <vers num="4.1.1.26"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0739" seq="2008-0739" published="2008-02-12" modified="2009-08-20" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in admin/SA_shipFedExMeter.asp in CandyPress (CP) 4.1.1.26, and earlier 4.x and 3.x versions, allows remote attackers to execute arbitrary SQL commands via the FedExAccount parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.candypress.com/CPforum/forum_posts.asp?TID=10630&amp;PN=1">http://www.candypress.com/CPforum/forum_posts.asp?TID=10630&amp;PN=1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0314">ADV-2008-0314</ref>
    </refs>
    <vuln_soft>
      <prod name="candypress_store" vendor="shoppingtree">
        <vers num="4.1" prev="1"/>
        <vers num="4.1.1.26"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0740" seq="2008-0740" published="2008-02-12" modified="2011-03-07" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">IBM WebSphere Application Server (WAS) before 6.0.2 Fix Pack 25 (6.0.2.25) and 6.1 before Fix Pack 15 (6.1.0.15) writes unspecified cleartext information to http_plugin.log, which might allow local users to obtain sensitive information by reading this file.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27400">27400</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0241">ADV-2008-0241</ref>
      <ref source="CONFIRM" url="http://www-1.ibm.com/support/docview.wss?uid=swg27006876" patch="1">http://www-1.ibm.com/support/docview.wss?uid=swg27006876</ref>
      <ref source="CONFIRM" url="http://www-1.ibm.com/support/docview.wss?uid=swg27007951">http://www-1.ibm.com/support/docview.wss?uid=swg27007951</ref>
    </refs>
    <vuln_soft>
      <prod name="websphere_application_server" vendor="ibm">
        <vers num="6.0.2.24" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0741" seq="2008-0741" published="2008-02-12" modified="2011-03-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the PropFilePasswordEncoder utility in IBM WebSphere Application Server (WAS) before 6.0.2 Fix Pack 25 (6.0.2.25) has unknown impact and attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019254">1019254</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27400">27400</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0241">ADV-2008-0241</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/docview.wss?rs=0&amp;dc=DB550&amp;q1=PK52709&amp;uid=swg1PK58871&amp;loc=en_US&amp;cs=utf-8&amp;lang=">PK52709</ref>
      <ref source="CONFIRM" url="http://www-1.ibm.com/support/docview.wss?uid=swg27006876" patch="1">http://www-1.ibm.com/support/docview.wss?uid=swg27006876</ref>
    </refs>
    <vuln_soft>
      <prod name="websphere_application_server" vendor="ibm">
        <vers num="6.0.2.24" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0742" seq="2008-0742" published="2008-02-12" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple directory traversal vulnerabilities in PowerScripts PowerNews 2.5.6 allow remote attackers to read and include arbitrary files via a .. (dot dot) in the (1) subpage parameter in (a) categories.inc.php, (b) news.inc.php, (c) other.inc.php, (d) permissions.inc.php, (e) templates.inc.php, and (f) users.inc.php in pnadmin/; and (2) the page parameter to (g) pnadmin/index.php.  NOTE: vector 2 is only exploitable by administrators.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3647">3647</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487773/100/0/threaded">20080208 [DSECRG-08-014] Multiple LFI in PowerNews (Newsscript) 2.5.6</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27688">27688</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5082">5082</ref>
    </refs>
    <vuln_soft>
      <prod name="powernews" vendor="powerscripts">
        <vers num="2.5.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0743" seq="2008-0743" published="2008-02-12" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in members_help.php in Joovili 2.1 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the hlp parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3640">3640</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487779/100/0/threaded">20080207 Joovili &lt;= v.2.1 (members_help.php) Remote File &amp;#304;nclude Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27693">27693</ref>
    </refs>
    <vuln_soft>
      <prod name="joovili" vendor="joovili">
        <vers num="2.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0744" seq="2008-0744" published="2008-02-12" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in user_login.asp in PreProjects.com Pre Hotels &amp; Resorts Management System allows remote attackers to execute arbitrary SQL commands via the login page.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3644">3644</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487053/100/100/threaded">20080124 Pre Hotel and Resorts reservation portal login bypass</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27450">27450</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39935">prehotel-login-sql-injection(39935)</ref>
    </refs>
    <vuln_soft>
      <prod name="pre_hotels_&amp;_resorts_management_system" vendor="preprojects.com">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0745" seq="2008-0745" published="2008-02-13" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in aides/index.php in DomPHP 0.82 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the page parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27712">27712</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5089">5089</ref>
    </refs>
    <vuln_soft>
      <prod name="domphp" vendor="domphp">
        <vers num="0.82"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0746" seq="2008-0746" published="2008-02-13" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the Gallery (com_gallery) component for Mambo and Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a detail action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="VIM" url="http://www.attrition.org/pipermail/vim/2008-February/001901.html">20080208 Mambo Component com_gallery Remote SQL Injection Vulnerability</ref>
      <ref source="VIM" url="http://www.attrition.org/pipermail/vim/2008-February/001902.html">20080208 Mambo Component com_gallery Remote SQL Injection Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27695">27695</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5084">5084</ref>
    </refs>
    <vuln_soft>
      <prod name="com_gallery" vendor="joomla">
        <vers num=""/>
      </prod>
      <prod name="com_gallery" vendor="mambo">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0747" seq="2008-0747" published="2008-02-13" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in COWON America jetAudio 7.0.5 and earlier allows user-assisted remote attackers to execute arbitrary code via a long URL in a .asx file, a different vulnerability than CVE-2007-5487.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3642">3642</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487806/100/0/threaded">20080208 jetAudio &lt;= 7.0.5 (.ASX) Remote Stack Overflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27698">27698</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0502">ADV-2008-0502</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5085">5085</ref>
    </refs>
    <vuln_soft>
      <prod name="jetaudio_basic" vendor="cowon_america">
        <vers num="7.0.5" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0748" seq="2008-0748" published="2008-02-13" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the Sony AxRUploadServer.AxRUploadControl.1 ActiveX control in AxRUploadServer.dll 1.0.0.38 in SonyISUpload.cab 1.0.0.38 for Sony ImageStation allows remote attackers to execute arbitrary code via a long argument to the SetLogging method.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3648">3648</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487802/100/0/threaded">20080208 Buffer Overflow Vulnerability in AxRUploadServer.dll, Activex Method (SetLogging)</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487805/100/0/threaded">20080208 Re: Buffer Overflow Vulnerability in AxRUploadServer.dll, Activex Method (SetLogging)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27715">27715</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0483">ADV-2008-0483</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5086">5086</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5100">5100</ref>
    </refs>
    <vuln_soft>
      <prod name="axruploadserver_activex_control" vendor="sony">
        <vers num="1.0.0.38"/>
      </prod>
      <prod name="imagestation" vendor="sony">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0749" seq="2008-0749" published="2008-02-13" modified="2009-08-25" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php in Calimero.CMS 3.3 allows remote attackers to inject arbitrary web script or HTML via the id parameter in a calimero_webpage action.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://downloads.securityfocus.com/vulnerabilities/exploits/27690.html">http://downloads.securityfocus.com/vulnerabilities/exploits/27690.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27690">27690</ref>
    </refs>
    <vuln_soft>
      <prod name="calimero.cms" vendor="calimero.cms">
        <vers num="3.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0750" seq="2008-0750" published="2008-02-13" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in philboard_forum.asp in Husrev BlackBoard 2.0.2 allows remote attackers to execute arbitrary SQL commands via the forumid parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3641">3641</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487780/100/200/threaded">20080207 Husrev Forums v2.0.1:PoWerBoard (tr) (id) Remote SQL Injection</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487781/100/0/threaded">20080207 Blackboard (id) Remote SQL Injection</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27714">27714</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40368">blackboard-philboardforum-sql-injection(40368)</ref>
    </refs>
    <vuln_soft>
      <prod name="blackboard" vendor="husrev">
        <vers num="2.0.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0751" seq="2008-0751" published="2008-02-13" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the Freetag before 2.96 plugin for S9Y Serendipity, when using Internet Explorer 6 or 7, allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO to plugin/tag/.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://blog.s9y.org/archives/190-Freetag-plugin-updated-to-prevent-XSS.html">http://blog.s9y.org/archives/190-Freetag-plugin-updated-to-prevent-XSS.html</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2008-February/060122.html" patch="1">20080208 Serendipity Freetag-plugin XSS vulnerability</ref>
      <ref source="MISC" url="http://www.bitsploit.de/uploads/Code/200802080000/" patch="1">http://www.bitsploit.de/uploads/Code/200802080000/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27697" patch="1">27697</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40376">serendipity-freetag-xss(40376)</ref>
    </refs>
    <vuln_soft>
      <prod name="ie" vendor="microsoft">
        <vers num="6"/>
        <vers num="7"/>
      </prod>
      <prod name="serendipity_freetag-plugin" vendor="s9y">
        <vers num="2.95" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0752" seq="2008-0752" published="2008-02-13" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the Neogallery (com_neogallery) 1.1 component for Joomla! allows remote attackers to execute arbitrary SQL commands via the catid parameter in a show action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27692">27692</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40357">neogallery-index-sql-injection(40357)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5083">5083</ref>
    </refs>
    <vuln_soft>
      <prod name="com_neogallery" vendor="joomla">
        <vers num="1.1"/>
      </prod>
      <prod name="com_neogallery" vendor="mambo">
        <vers num="1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0753" seq="2008-0753" published="2008-02-13" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in calendar.php in Virtual War (VWar) 1.5 allows remote attackers to execute arbitrary SQL commands via the month parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3643">3643</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487900/100/0/threaded">20080210 Vwar 1.5.0</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27722">27722</ref>
    </refs>
    <vuln_soft>
      <prod name="virtual_war" vendor="vwar">
        <vers num="1.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0754" seq="2008-0754" published="2008-02-13" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in index.php in the Rapid Recipe (com_rapidrecipe) 1.6.5 component for Joomla! allow remote attackers to execute arbitrary SQL commands via (1) the user_id parameter in a showuser action or (2) the category_id parameter in a viewcategorysrecipes action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3649">3649</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487901/100/0/threaded">20080210 Default Multiple Joomla! Component com_rapidrecipe "user_id=" Remote SQL Inj.</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27724">27724</ref>
    </refs>
    <vuln_soft>
      <prod name="com_rapidrecipe" vendor="joomla">
        <vers num="1.6.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0755" seq="2008-0755" published="2008-02-13" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Format string vulnerability in the ReportSysLogEvent function in the LPD server in cyan soft Opium OPI Server 4.10.1028 and earlier; cyanPrintIP Easy OPI, Professional, and Basic 4.10.1030 and earlier; Workstation 4.10.836 and earlier; and Standard 4.10.940 and earlier; might allow remote attackers to execute arbitrary code via format string specifiers in the queue name in a request.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/cyanuro-adv.txt">http://aluigi.altervista.org/adv/cyanuro-adv.txt</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487955/100/0/threaded">20080211 Format string and DoS in Opium OPI and cyanPrintIP servers 4.10.x</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27728">27728</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27734">27734</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0498">ADV-2008-0498</ref>
    </refs>
    <vuln_soft>
      <prod name="cyanprintip_basic" vendor="cyan_soft">
        <vers num="4.10.1030" prev="1"/>
      </prod>
      <prod name="cyanprintip_easy_opi" vendor="cyan_soft">
        <vers num="4.10.1030" prev="1"/>
      </prod>
      <prod name="cyanprintip_professional" vendor="cyan_soft">
        <vers num="4.10.1030" prev="1"/>
      </prod>
      <prod name="cyanprintip_standard" vendor="cyan_soft">
        <vers num="4.10.940" prev="1"/>
      </prod>
      <prod name="cyanprintip_workstation" vendor="cyan_soft">
        <vers num="4.10.836" prev="1"/>
      </prod>
      <prod name="opium4_opi_server" vendor="cyan_soft">
        <vers num="4.10.1028" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0756" seq="2008-0756" published="2008-02-13" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The LPD server in cyan soft Opium OPI Server 4.10.1028 and earlier; cyanPrintIP Easy OPI, Professional, and Basic 4.10.1030 and earlier; Workstation 4.10.836 and earlier; and Standard 4.10.940 and earlier; allows remote attackers to cause a denial of service (daemon crash) via a connection that begins with (1) a "Send queue state" LPD command 3 or (2) a "Send queue state" LPD command 4.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/cyanuro-adv.txt">http://aluigi.altervista.org/adv/cyanuro-adv.txt</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487955/100/0/threaded">20080211 Format string and DoS in Opium OPI and cyanPrintIP servers 4.10.x</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27728">27728</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27734">27734</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0498">ADV-2008-0498</ref>
    </refs>
    <vuln_soft>
      <prod name="cyanprintip_basic" vendor="cyan_soft">
        <vers num="4.10.1030" prev="1"/>
      </prod>
      <prod name="cyanprintip_easy_opi" vendor="cyan_soft">
        <vers num="4.10.1030" prev="1"/>
      </prod>
      <prod name="cyanprintip_professional" vendor="cyan_soft">
        <vers num="4.10.1030" prev="1"/>
      </prod>
      <prod name="cyanprintip_standard" vendor="cyan_soft">
        <vers num="4.10.940" prev="1"/>
      </prod>
      <prod name="cyanprintip_workstation" vendor="cyan_soft">
        <vers num="4.10.836" prev="1"/>
      </prod>
      <prod name="opium4_opi_server" vendor="cyan_soft">
        <vers num="4.10.1028" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0757" seq="2008-0757" published="2008-02-13" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php in MercuryBoard 1.1.5 allows remote attackers to inject arbitrary web script or HTML via the message parameter (aka the message text area), which leads to an injection in the messenger during private message (PM) preview. NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://forum.aria-security.net/showthread.php?t=522">http://forum.aria-security.net/showthread.php?t=522</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487913/100/0/threaded">20080210 Mercury v1.1.5 Send Message Cross-Site Scripting</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27730">27730</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019371">1019371</ref>
    </refs>
    <vuln_soft>
      <prod name="mercuryboard_message_board" vendor="mercuryboard">
        <vers num="1.1.5" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0758" seq="2008-0758" published="2008-02-13" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Multiple directory traversal vulnerabilities in the Zidget/HTTP embedded HTTP server in ExtremeZ-IP File and Print Server 5.1.2x15 and earlier allow remote attackers to read arbitrary (1) gif, (2) png, (3) jpg, (4) xml, (5) ico, (6) zip, and (7) html files via a "..\" (dot dot backslash) sequence in the filename.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/ezipirla-adv.txt">http://aluigi.altervista.org/adv/ezipirla-adv.txt</ref>
      <ref source="MISC" url="http://aluigi.org/poc/ezipirla.zip">http://aluigi.org/poc/ezipirla.zip</ref>
      <ref source="CONFIRM" url="http://www.grouplogic.com/files/ez/hot/hotFix51.cfm">http://www.grouplogic.com/files/ez/hot/hotFix51.cfm</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487952/100/0/threaded">20080211 Multiple vulnerabilities in EztremeZ-IP File and Printer Server 5.1.2x15</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27718">27718</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0485">ADV-2008-0485</ref>
    </refs>
    <vuln_soft>
      <prod name="extremez-ip_file_server" vendor="group_logic">
        <vers num="5.1.2" prev="1"/>
      </prod>
      <prod name="extremez-ip_print_server" vendor="group_logic">
        <vers num="5.1.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0759" seq="2008-0759" published="2008-02-13" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">ExtremeZ-IP.exe in ExtremeZ-IP File and Print Server 5.1.2x15 and earlier allows remote attackers to cause a denial of service (daemon crash) via an invalid UAM field in a request to the Apple Filing Protocol (AFP) service on TCP port 548.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/ezipirla-adv.txt">http://aluigi.altervista.org/adv/ezipirla-adv.txt</ref>
      <ref source="MISC" url="http://aluigi.org/poc/ezipirla.zip">http://aluigi.org/poc/ezipirla.zip</ref>
      <ref source="CONFIRM" url="http://www.grouplogic.com/files/ez/hot/hotFix51.cfm">http://www.grouplogic.com/files/ez/hot/hotFix51.cfm</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487952/100/0/threaded">20080211 Multiple vulnerabilities in EztremeZ-IP File and Printer Server 5.1.2x15</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27718">27718</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0485">ADV-2008-0485</ref>
    </refs>
    <vuln_soft>
      <prod name="extremez-ip_file_server" vendor="group_logic">
        <vers num="5.1.2" prev="1"/>
      </prod>
      <prod name="extremez-ip_print_server" vendor="group_logic">
        <vers num="5.1.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0760" seq="2008-0760" published="2008-02-13" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in SafeNet Sentinel Protection Server 7.4.1.0 and earlier, and Sentinel Keys Server 1.0.4.0 and earlier, allows remote attackers to read arbitrary files via a ..\ (dot dot backslash) in the URI.  NOTE: this issue reportedly exists because of an incomplete fix for CVE-2007-6483.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/sentinella-adv.txt">http://aluigi.altervista.org/adv/sentinella-adv.txt</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3646">3646</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487954/100/0/threaded">20080211 Directory traversal in SafeNet Sentinel Protection and Key Server 7.4.1.0</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27735">27735</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0499">ADV-2008-0499</ref>
    </refs>
    <vuln_soft>
      <prod name="sentinel_keys_server" vendor="safenet">
        <vers num="1.0.4.0" prev="1"/>
      </prod>
      <prod name="sentinel_protection_server" vendor="safenet">
        <vers num="7.4.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0761" seq="2008-0761" published="2008-02-13" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the Prince Clan Chess Club (com_pcchess) 0.8 and earlier component for Joomla! allows remote attackers to execute arbitrary SQL commands via the user_id parameter in a players action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27761">27761</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40436">pcchessclub-index-sql-injection(40436)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5104">5104</ref>
    </refs>
    <vuln_soft>
      <prod name="com_pcchess" vendor="joomla">
        <vers num="0.8" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0762" seq="2008-0762" published="2008-02-13" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the com_iomezun component for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in an edit action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487989/100/0/threaded">20080212 joomla (k12.tr)(com_iomezun)SQL Injection</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27748">27748</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40447">iomezun-index-sql-injection(40447)</ref>
    </refs>
    <vuln_soft>
      <prod name="com_iomezun" vendor="joomla">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0763" seq="2008-0763" published="2008-02-13" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in NPSpcSVR.exe in Larson Network Print Server (LstNPS) 9.4.2 build 105 and earlier allows remote attackers to execute arbitrary code via a long argument in a LICENSE command on TCP port 3114.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/lstnpsx-adv.txt">http://aluigi.altervista.org/adv/lstnpsx-adv.txt</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487956/100/0/threaded">20080211 Format string and buffer-overflow in Lst Network Print Server 9.4.2 build 105</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27732">27732</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0500">ADV-2008-0500</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40421">networkprintserver-npspcsvr-bo(40421)</ref>
    </refs>
    <vuln_soft>
      <prod name="network_print_server" vendor="larson_software_technology">
        <vers num="9.4.2" prev="1" edition="build_105"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0764" seq="2008-0764" published="2008-02-13" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Format string vulnerability in the logging function in Larson Network Print Server (LstNPS) 9.4.2 build 105 and earlier for Windows might allow remote attackers to execute arbitrary code via format string specifiers in a USEP command on TCP port 3114.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/lstnpsx-adv.txt">http://aluigi.altervista.org/adv/lstnpsx-adv.txt</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487956/100/0/threaded">20080211 Format string and buffer-overflow in Lst Network Print Server 9.4.2 build 105</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27732">27732</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0500">ADV-2008-0500</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40420">networkprintserver-logging-format-string(40420)</ref>
    </refs>
    <vuln_soft>
      <prod name="network_print_server" vendor="larson_software_technology">
        <vers num="9.4.2" prev="1" edition="build_105"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0765" seq="2008-0765" published="2008-02-13" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in artmedic webdesign weblog allow remote attackers to inject arbitrary web script or HTML via the (1) date parameter to artmedic_print.php and the (2) jahrneu parameter to index.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2008-02/0152.html">20080212 artmedic weblog multiple xss vulnerabilities</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488223/100/0/threaded">20080215 artmedic_weblog Cross Site Scriptting Vulnerbility</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488262/100/0/threaded">20080215 Re: artmedic_weblog Cross Site Scriptting Vulnerbility</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27745">27745</ref>
    </refs>
    <vuln_soft>
      <prod name="artmedic_weblog" vendor="artmedic_webdesign">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0766" seq="2008-0766" published="2008-02-13" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in RpmSrvc.exe in Brooks Remote Print Manager (RPM) 4.5.1.11 and earlier (Elite and Select) for Windows allows remote attackers to execute arbitrary code via a long filename in a "Receive data file" LPD command.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/rpmlpdbof-adv.txt">http://aluigi.altervista.org/adv/rpmlpdbof-adv.txt</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488010/100/0/threaded">20080212 Unicode buffer-overflow in RPM Remote Print Manager 4.5.1.11</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27742">27742</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0501">ADV-2008-0501</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40432">rpm-receivedatafile-bo(40432)</ref>
    </refs>
    <vuln_soft>
      <prod name="rpm_remote_print_manager_elite" vendor="brooks_internet_software">
        <vers num="4.5.1.11" prev="1"/>
      </prod>
      <prod name="rpm_remote_print_manager_select" vendor="brooks_internet_software">
        <vers num="4.5.1.11" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0767" seq="2008-0767" published="2008-02-13" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">ExtremeZ-IP.exe in ExtremeZ-IP File and Print Server 5.1.2x15 and earlier does not verify that a certain "number of URLs" field is consistent with the packet length, which allows remote attackers to cause a denial of service (daemon crash) via a large integer in this field in a packet to the Service Location Protocol (SLP) service on UDP port 427, triggering an out-of-bounds read.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/ezipirla-adv.txt">http://aluigi.altervista.org/adv/ezipirla-adv.txt</ref>
      <ref source="MISC" url="http://aluigi.org/poc/ezipirla.zip">http://aluigi.org/poc/ezipirla.zip</ref>
      <ref source="CONFIRM" url="http://www.grouplogic.com/files/ez/hot/hotFix51.cfm">http://www.grouplogic.com/files/ez/hot/hotFix51.cfm</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487952/100/0/threaded">20080211 Multiple vulnerabilities in EztremeZ-IP File and Printer Server 5.1.2x15</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27718">27718</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0485">ADV-2008-0485</ref>
    </refs>
    <vuln_soft>
      <prod name="print_server" vendor="extremez">
        <vers num="5.1.2" prev="1"/>
      </prod>
      <prod name="file_server" vendor="extremez-ip">
        <vers num="5.1.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0768" seq="2008-0768" published="2008-02-13" modified="2019-08-01" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple stack-based and heap-based buffer overflows in the Windows RPC components for IBM Informix Storage Manager (ISM), as used in Informix Dynamic Server (IDS) 10.00.xC8 and earlier and 11.10.xC2 and earlier, allow attackers to execute arbitrary code via crafted XDR requests.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27485" adv="1">27485</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019281" adv="1">1019281</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0317">ADV-2008-0317</ref>
      <ref source="CONFIRM" url="http://www-01.ibm.com/support/docview.wss?uid=swg21294211" adv="1">http://www-01.ibm.com/support/docview.wss?uid=swg21294211</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/search.wss?rs=0&amp;q=IC55040&amp;apar=only" adv="1">IC55040</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/search.wss?rs=0&amp;q=IC55041&amp;apar=only" adv="1">IC55041</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40018" adv="1">ibm-ids-xdr-bo(40018)</ref>
    </refs>
    <vuln_soft>
      <prod name="informix_dynamic_server" vendor="ibm">
        <vers num="10.00"/>
        <vers num="10.0.tc1"/>
        <vers num="10.00.tc3tl"/>
        <vers num="10.0.xc1"/>
        <vers num="10.0.xc3"/>
        <vers num="10.00.xc4"/>
        <vers num="10.00.xc5"/>
        <vers num="10.00.xc6"/>
        <vers num="10.00.xc7"/>
        <vers num="10.00.xc8"/>
        <vers num="11.10"/>
        <vers num="11.10.tb4tl"/>
        <vers num="11.10.xc1"/>
        <vers num="11.10.xc2"/>
      </prod>
      <prod name="informix_storage_manager" vendor="ibm">
        <vers num="-"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0769" seq="2008-0769" published="2008-02-13" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Livelink ECM 9.0.0 through 9.7.0 and possibly earlier does not set the charset, which allows remote attackers to inject arbitrary web script or HTML via UTF-7 encoded input.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059985.html">20080131 Livelink UTF-7 XSS Vulnerability</ref>
      <ref source="MISC" url="http://withdk.com/archives/livelink-utf7-xss-advisory.pdf">http://withdk.com/archives/livelink-utf7-xss-advisory.pdf</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27537">27537</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40123">livelink-utf7-security-bypass(40123)</ref>
    </refs>
    <vuln_soft>
      <prod name="livelink_ecm" vendor="opentext">
        <vers num="9.0"/>
        <vers num="9.1"/>
        <vers num="9.2"/>
        <vers num="9.3"/>
        <vers num="9.4"/>
        <vers num="9.5"/>
        <vers num="9.6"/>
        <vers num="9.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0770" seq="2008-0770" published="2008-02-13" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in arcade.php in ibProArcade 3.3.0 and earlier allows remote attackers to execute arbitrary SQL commands via the g_display_order cookie parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0366">ADV-2008-0366</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5018">5018</ref>
    </refs>
    <vuln_soft>
      <prod name="ibproarcade" vendor="ibproarcade">
        <vers num="3.3.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0771" seq="2008-0771" published="2008-02-13" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in default.asp in Site2Nite allow remote attackers to execute arbitrary SQL commands via the (1) txtUserName and (2) txtPassword parameters.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3650">3650</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486414/100/200/threaded">20080116 [Aria-Security.Net] Real Estate Web SQL Injection</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27330">27330</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39734">realestatewebsite-default-sql-injection(39734)</ref>
    </refs>
    <vuln_soft>
      <prod name="real_estate_web" vendor="site2nite">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0772" seq="2008-0772" published="2008-02-13" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the com_doc component for Joomla! and Mambo allows remote attackers to execute arbitrary SQL commands via the sid parameter in a view task.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27679">27679</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5080">5080</ref>
    </refs>
    <vuln_soft>
      <prod name="com_doc" vendor="joomla">
        <vers num=""/>
      </prod>
      <prod name="com_doc" vendor="mambo">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0773" seq="2008-0773" published="2008-02-13" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in Phil Taylor Comments (com_comments, aka Review Script) 0.5.8.5g and earlier component for Mambo allows remote attackers to execute arbitrary SQL commands via the id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27731">27731</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5094">5094</ref>
    </refs>
    <vuln_soft>
      <prod name="com_comments" vendor="joomla">
        <vers num="0.5.8.5g" prev="1"/>
      </prod>
      <prod name="com_comments" vendor="mambo">
        <vers num="0.5.8.5g" prev="1"/>
      </prod>
      <prod name="comments" vendor="phil_taylor">
        <vers num="0.5.8.5g" prev="1"/>
      </prod>
      <prod name="review_script" vendor="phil_taylor">
        <vers num="0.5.8.5g" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0774" seq="2008-0774" published="2008-02-13" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in search.cgi in Loris Hotel Reservation System 3.01 and possibly earlier allows remote attackers to inject arbitrary web script or HTML via the hotel_name parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27729">27729</ref>
    </refs>
    <vuln_soft>
      <prod name="hotel_reservation_system" vendor="loris">
        <vers num="3.01" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0775" seq="2008-0775" published="2008-02-13" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in sboxDB.php in Simple Machines Forum (SMF) Shoutbox 1.14 through 1.16b allows remote attackers to inject arbitrary web script or HTML via strings to the shoutbox form that start with "&amp;#", contain the desired script, and end with ";".</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3651">3651</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487912/100/0/threaded">20080210 Simple Machines Forum "SMF Shoutbox" Mod Persistent XSS</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489964/100/0/threaded">20080321 Re: Simple Machines Forum "SMF Shoutbox" Mod Persistent XSS</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491357/100/0/threaded">20080422 Re: Simple Machines Forum "SMF Shoutbox" Mod Persistent XSS</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27727">27727</ref>
    </refs>
    <vuln_soft>
      <prod name="smf_shoutbox" vendor="simple_machines">
        <vers num="1.14"/>
        <vers num="1.15"/>
        <vers num="1.16b"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0776" seq="2008-0776" published="2008-02-13" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in detail.php in iTechBids Gold 6.0 allows remote attackers to execute arbitrary SQL commands via the item_id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27717">27717</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5096">5096</ref>
    </refs>
    <vuln_soft>
      <prod name="itechbids" vendor="itechscripts">
        <vers num="6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0777" seq="2008-0777" published="2008-02-14" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="4.9" CVSS_base_score="4.9" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:N/A:N)">
    <desc>
      <descript source="cve">The sendfile system call in FreeBSD 5.5 through 7.0 does not check the access flags of the file descriptor used for sending a file, which allows local users to read the contents of write-only files.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="FREEBSD" url="http://security.freebsd.org/advisories/FreeBSD-SA-08:03.sendfile.asc" patch="1">FreeBSD-SA-08:03</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019416">1019416</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27789" patch="1">27789</ref>
    </refs>
    <vuln_soft>
      <prod name="freebsd" vendor="freebsd">
        <vers num="5.5"/>
        <vers num="6.2"/>
        <vers num="6.3"/>
        <vers num="7.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0778" seq="2008-0778" published="2008-02-14" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple stack-based buffer overflows in an ActiveX control in QTPlugin.ocx for Apple QuickTime 7.4.1 and earlier allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long arguments to the (1) SetBgColor, (2) SetHREF, (3) SetMovieName, (4) SetTarget, and (5) SetMatrix methods.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3652">3652</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488045/100/0/threaded">20080212 QuickTime &lt;= 7.4.1 QTPlugin.ocx Multiple Remote Stack Overflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27769">27769</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40475">apple-quicktime-qtplugin-bo(40475)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5110">5110</ref>
    </refs>
    <vuln_soft>
      <prod name="quicktime" vendor="apple">
        <vers num="7.4.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0779" seq="2008-0779" published="2008-02-14" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The fortimon.sys device driver in Fortinet FortiClient Host Security 3.0 MR5 Patch 3 and earlier does not properly initialize its DeviceExtension, which allows local users to access kernel memory and execute arbitrary code via a crafted request.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://kc.forticare.com/default.asp?id=3618">http://kc.forticare.com/default.asp?id=3618</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3660">3660</ref>
      <ref source="MISC" url="http://www.reversemode.com/index.php?option=com_mamblog&amp;Itemid=15&amp;task=show&amp;action=view&amp;id=47&amp;Itemid=15">http://www.reversemode.com/index.php?option=com_mamblog&amp;Itemid=15&amp;task=show&amp;action=view&amp;id=47&amp;Itemid=15</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488071/100/0/threaded">20080213 [Reversemode Advisory] February Advisories : Microsoft Word 2003 + Fortinet Forticlient</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27776">27776</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019415">1019415</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0541/references" adv="1">ADV-2008-0541</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40512">forticlient-fortimon-privilege-escalation(40512)</ref>
    </refs>
    <vuln_soft>
      <prod name="forticlient_host_security" vendor="fortinet">
        <vers num="3.0" prev="1" edition="mr5_patch_3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0780" seq="2008-0780" published="2008-02-14" modified="2018-10-03" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in MoinMoin 1.5.x through 1.5.8 and 1.6.x before 1.6.1 allows remote attackers to inject arbitrary web script or HTML via the login action.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://hg.moinmo.in/moin/1.5/rev/2f952fa361c7">http://hg.moinmo.in/moin/1.5/rev/2f952fa361c7</ref>
      <ref source="CONFIRM" url="http://hg.moinmo.in/moin/1.6/rev/9f4bdc7ef80d">http://hg.moinmo.in/moin/1.6/rev/9f4bdc7ef80d</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1514">DSA-1514</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200803-27.xml">GLSA-200803-27</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27904">27904</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0569/references">ADV-2008-0569</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=432747">https://bugzilla.redhat.com/show_bug.cgi?id=432747</ref>
      <ref source="UBUNTU" url="https://usn.ubuntu.com/716-1/">USN-716-1</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00726.html">FEDORA-2008-1880</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00752.html">FEDORA-2008-1905</ref>
    </refs>
    <vuln_soft>
      <prod name="moinmoin" vendor="moinmoin">
        <vers num="1.5.0"/>
        <vers num="1.5.1"/>
        <vers num="1.5.2"/>
        <vers num="1.5.3"/>
        <vers num="1.5.3_rc1"/>
        <vers num="1.5.3_rc2"/>
        <vers num="1.5.4"/>
        <vers num="1.5.5"/>
        <vers num="1.5.5_rc1"/>
        <vers num="1.5.5a"/>
        <vers num="1.5.6"/>
        <vers num="1.5.7"/>
        <vers num="1.5.8"/>
        <vers num="1.6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0781" seq="2008-0781" published="2008-02-14" modified="2018-10-03" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in action/AttachFile.py in MoinMoin 1.5.8 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) message, (2) pagename, and (3) target filenames.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://hg.moinmo.in/moin/1.5/rev/db212dfc58ef">http://hg.moinmo.in/moin/1.5/rev/db212dfc58ef</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1514">DSA-1514</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200803-27.xml">GLSA-200803-27</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27904">27904</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0569/references">ADV-2008-0569</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=432748">https://bugzilla.redhat.com/show_bug.cgi?id=432748</ref>
      <ref source="UBUNTU" url="https://usn.ubuntu.com/716-1/">USN-716-1</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00726.html">FEDORA-2008-1880</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00752.html">FEDORA-2008-1905</ref>
    </refs>
    <vuln_soft>
      <prod name="moinmoin" vendor="moinmoin">
        <vers num="0.1"/>
        <vers num="0.2"/>
        <vers num="0.3"/>
        <vers num="0.7"/>
        <vers num="0.8"/>
        <vers num="0.9"/>
        <vers num="0.10"/>
        <vers num="0.11"/>
        <vers num="1.0"/>
        <vers num="1.1"/>
        <vers num="1.2"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2"/>
        <vers num="1.5.0"/>
        <vers num="1.5.1"/>
        <vers num="1.5.2"/>
        <vers num="1.5.3"/>
        <vers num="1.5.3_rc1"/>
        <vers num="1.5.3_rc2"/>
        <vers num="1.5.4"/>
        <vers num="1.5.5"/>
        <vers num="1.5.5_rc1"/>
        <vers num="1.5.5a"/>
        <vers num="1.5.6"/>
        <vers num="1.5.7"/>
        <vers num="1.5.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0782" seq="2008-0782" published="2008-02-14" modified="2018-10-03" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in MoinMoin 1.5.8 and earlier allows remote attackers to overwrite arbitrary files via a .. (dot dot) in the MOIN_ID user ID in a cookie for a userform action.  NOTE: this issue can be leveraged for PHP code execution via the quicklinks parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://hg.moinmo.in/moin/1.5/rev/e69a16b6e630">http://hg.moinmo.in/moin/1.5/rev/e69a16b6e630</ref>
      <ref source="VIM" url="http://www.attrition.org/pipermail/vim/2008-January/001890.html">20080124 MoinMoin 1.5.x MOIND_ID cookie Bug Remote Exploit</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1514">DSA-1514</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200803-27.xml">GLSA-200803-27</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27404">27404</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0569/references">ADV-2008-0569</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39837">moinmoin-readme-file-overwrite(39837)</ref>
      <ref source="UBUNTU" url="https://usn.ubuntu.com/716-1/">USN-716-1</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4957">4957</ref>
    </refs>
    <vuln_soft>
      <prod name="moinmoin" vendor="moinmoin">
        <vers num="0.1"/>
        <vers num="0.2"/>
        <vers num="0.3"/>
        <vers num="0.7"/>
        <vers num="0.8"/>
        <vers num="0.9"/>
        <vers num="0.10"/>
        <vers num="0.11"/>
        <vers num="1.0"/>
        <vers num="1.1"/>
        <vers num="1.2"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2"/>
        <vers num="1.5.0"/>
        <vers num="1.5.1"/>
        <vers num="1.5.2"/>
        <vers num="1.5.3"/>
        <vers num="1.5.3_rc1"/>
        <vers num="1.5.3_rc2"/>
        <vers num="1.5.4"/>
        <vers num="1.5.5"/>
        <vers num="1.5.5_rc1"/>
        <vers num="1.5.5a"/>
        <vers num="1.5.6"/>
        <vers num="1.5.7"/>
        <vers num="1.5.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0783" seq="2008-0783" published="2008-02-14" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in Cacti 0.8.7 before 0.8.7b and 0.8.6 before 0.8.6k allow remote attackers to inject arbitrary web script or HTML via (1) the view_type parameter to graph.php; (2) the filter parameter to graph_view.php; (3) the action parameter to the draw_navigation_text function in lib/functions.php, reachable through index.php (aka the login page) or data_input.php; or (4) the login_username parameter to index.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.cacti.net/view.php?id=1245">http://bugs.cacti.net/view.php?id=1245</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html">SUSE-SR:2008:005</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200803-18.xml">GLSA-200803-18</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3657">3657</ref>
      <ref source="CONFIRM" url="http://www.cacti.net/release_notes_0_8_7b.php" patch="1">http://www.cacti.net/release_notes_0_8_7b.php</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1569">DSA-1569</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:052">MDVSA-2008:052</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488013/100/0/threaded">20080212 cacti -- Multiple security vulnerabilities have been discovered</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488018/100/0/threaded">20080212 Cacti 0.8.7a Multiple Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27749" patch="1">27749</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/34991">34991</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019414">1019414</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0540" adv="1">ADV-2008-0540</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=432758">https://bugzilla.redhat.com/show_bug.cgi?id=432758</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/50575">cacti-datainput-xss(50575)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00570.html">FEDORA-2008-1699</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00593.html">FEDORA-2008-1737</ref>
    </refs>
    <vuln_soft>
      <prod name="cacti" vendor="cacti">
        <vers num="0.6.7"/>
        <vers num="0.8"/>
        <vers num="0.8.1"/>
        <vers num="0.8.2"/>
        <vers num="0.8.2a"/>
        <vers num="0.8.3"/>
        <vers num="0.8.3a"/>
        <vers num="0.8.4"/>
        <vers num="0.8.5"/>
        <vers num="0.8.5a"/>
        <vers num="0.8.6c"/>
        <vers num="0.8.6f"/>
        <vers num="0.8.6i"/>
        <vers num="0.8.6j"/>
        <vers num="0.8.7"/>
        <vers num="0.8.7a"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0784" seq="2008-0784" published="2008-02-14" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">graph.php in Cacti 0.8.7 before 0.8.7b and 0.8.6 before 0.8.6k allows remote attackers to obtain the full path via an invalid local_graph_id parameter and other unspecified vectors.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html">SUSE-SR:2008:005</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200803-18.xml">GLSA-200803-18</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3657">3657</ref>
      <ref source="CONFIRM" url="http://www.cacti.net/release_notes_0_8_7b.php" patch="1">http://www.cacti.net/release_notes_0_8_7b.php</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:052">MDVSA-2008:052</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488013/100/0/threaded">20080212 cacti -- Multiple security vulnerabilities have been discovered</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488018/100/0/threaded">20080212 Cacti 0.8.7a Multiple Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27749" patch="1">27749</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019414">1019414</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0540">ADV-2008-0540</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=432758">https://bugzilla.redhat.com/show_bug.cgi?id=432758</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00570.html">FEDORA-2008-1699</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00593.html">FEDORA-2008-1737</ref>
    </refs>
    <vuln_soft>
      <prod name="cacti" vendor="cacti">
        <vers num="0.6.7"/>
        <vers num="0.8"/>
        <vers num="0.8.1"/>
        <vers num="0.8.2"/>
        <vers num="0.8.2a"/>
        <vers num="0.8.3"/>
        <vers num="0.8.3a"/>
        <vers num="0.8.4"/>
        <vers num="0.8.5"/>
        <vers num="0.8.5a"/>
        <vers num="0.8.6c"/>
        <vers num="0.8.6f"/>
        <vers num="0.8.6i"/>
        <vers num="0.8.6j"/>
        <vers num="0.8.7"/>
        <vers num="0.8.7a"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0785" seq="2008-0785" published="2008-02-14" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in Cacti 0.8.7 before 0.8.7b and 0.8.6 before 0.8.6k allow remote authenticated users to execute arbitrary SQL commands via the (1) graph_list parameter to graph_view.php, (2) leaf_id and id parameters to tree.php, (3) local_graph_id parameter to graph_xport.php, and (4) login_username parameter to index.php/login.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html">SUSE-SR:2008:005</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200803-18.xml">GLSA-200803-18</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3657">3657</ref>
      <ref source="CONFIRM" url="http://www.cacti.net/release_notes_0_8_7b.php" patch="1">http://www.cacti.net/release_notes_0_8_7b.php</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1569">DSA-1569</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:052">MDVSA-2008:052</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488013/100/0/threaded">20080212 cacti -- Multiple security vulnerabilities have been discovered</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488018/100/0/threaded">20080212 Cacti 0.8.7a Multiple Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27749" patch="1">27749</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019414">1019414</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0540">ADV-2008-0540</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=432758">https://bugzilla.redhat.com/show_bug.cgi?id=432758</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00570.html">FEDORA-2008-1699</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00593.html">FEDORA-2008-1737</ref>
    </refs>
    <vuln_soft>
      <prod name="cacti" vendor="cacti">
        <vers num="0.6.7"/>
        <vers num="0.8"/>
        <vers num="0.8.1"/>
        <vers num="0.8.2"/>
        <vers num="0.8.2a"/>
        <vers num="0.8.3"/>
        <vers num="0.8.3a"/>
        <vers num="0.8.4"/>
        <vers num="0.8.5"/>
        <vers num="0.8.5a"/>
        <vers num="0.8.6c"/>
        <vers num="0.8.6f"/>
        <vers num="0.8.6i"/>
        <vers num="0.8.6j"/>
        <vers num="0.8.7"/>
        <vers num="0.8.7a"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0786" seq="2008-0786" published="2008-02-14" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">CRLF injection vulnerability in Cacti 0.8.7 before 0.8.7b and 0.8.6 before 0.8.6k, when running on older PHP interpreters, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html">SUSE-SR:2008:005</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200803-18.xml">GLSA-200803-18</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3657">3657</ref>
      <ref source="CONFIRM" url="http://www.cacti.net/release_notes_0_8_7b.php" patch="1">http://www.cacti.net/release_notes_0_8_7b.php</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:052">MDVSA-2008:052</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488013/100/0/threaded">20080212 cacti -- Multiple security vulnerabilities have been discovered</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488018/100/0/threaded">20080212 Cacti 0.8.7a Multiple Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27749" patch="1">27749</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019414">1019414</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0540">ADV-2008-0540</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=432758">https://bugzilla.redhat.com/show_bug.cgi?id=432758</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00570.html">FEDORA-2008-1699</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00593.html">FEDORA-2008-1737</ref>
    </refs>
    <vuln_soft>
      <prod name="cacti" vendor="cacti">
        <vers num="0.6.7"/>
        <vers num="0.8"/>
        <vers num="0.8.1"/>
        <vers num="0.8.2"/>
        <vers num="0.8.2a"/>
        <vers num="0.8.3"/>
        <vers num="0.8.3a"/>
        <vers num="0.8.4"/>
        <vers num="0.8.5"/>
        <vers num="0.8.5a"/>
        <vers num="0.8.6c"/>
        <vers num="0.8.6f"/>
        <vers num="0.8.6i"/>
        <vers num="0.8.6j"/>
        <vers num="0.8.7"/>
        <vers num="0.8.7a"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0787" seq="2008-0787" published="2008-02-14" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in inc/datahandlers/pm.php in MyBB before 1.2.12 allows remote authenticated users to execute arbitrary SQL commands via the options[disablesmilies] parameter to private.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://community.mybboard.net/showthread.php?tid=27675" patch="1">http://community.mybboard.net/showthread.php?tid=27675</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486763/100/200/threaded">20080121 [waraxe-2008-SA#064] - Sql Injection in MyBB 1.2.11</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27378" patch="1">27378</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019257">1019257</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0238">ADV-2008-0238</ref>
      <ref source="MISC" url="http://www.waraxe.us/advisory-64.html">http://www.waraxe.us/advisory-64.html</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5070">5070</ref>
    </refs>
    <vuln_soft>
      <prod name="mybulletinboard" vendor="mybulletinboard">
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.4"/>
        <vers num="1.0_pr2"/>
        <vers num="1.1"/>
        <vers num="1.1.1"/>
        <vers num="1.1.2"/>
        <vers num="1.1.3"/>
        <vers num="1.1.4"/>
        <vers num="1.1.5"/>
        <vers num="1.1.6"/>
        <vers num="1.1.7"/>
        <vers num="1.1.8"/>
        <vers num="1.2"/>
        <vers num="1.2.3"/>
        <vers num="1.2.5"/>
        <vers num="1.2.10"/>
        <vers num="1.2.11"/>
        <vers num="1.10"/>
        <vers num="rc1"/>
        <vers num="rc2"/>
        <vers num="rc3"/>
        <vers num="rc4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0788" seq="2008-0788" published="2008-02-14" modified="2009-08-20" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple cross-site request forgery (CSRF) vulnerabilities in MyBB 1.2.11 and earlier allow remote attackers to (1) hijack the authentication of moderators or administrators for requests that delete threads via a do_multideletethreads action to moderation.php and (2) hijack the authentication of arbitrary users for requests that delete private messages (PM) via a delete action to private.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://community.mybboard.net/showthread.php?tid=27675" patch="1">http://community.mybboard.net/showthread.php?tid=27675</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3656">3656</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486663">20080118 MyBB 1.2.11 Multiple XSRF Vulnerabilities</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0238" adv="1">ADV-2008-0238</ref>
    </refs>
    <vuln_soft>
      <prod name="mybb" vendor="mybb">
        <vers num="1.2.11" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0789" seq="2008-0789" published="2008-02-14" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in countdown.php in LI-Scripts LI-Countdown allows remote attackers to execute arbitrary SQL commands via the years parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3655">3655</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488017/100/0/threaded">20080212 LI-countdown SQL Injection Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27753">27753</ref>
    </refs>
    <vuln_soft>
      <prod name="li-countdown" vendor="li-scripts">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0790" seq="2008-0790" published="2008-02-14" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in ipdsserver.exe in Intermate WinIPDS 3.3 G52-33-021 allows remote attackers to read arbitrary files via a .. (dot dot) in the URI.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/winipds-adv.txt">http://aluigi.altervista.org/adv/winipds-adv.txt</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3658">3658</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488015/100/0/threaded">20080212 Directory traversal and DoS in WinIPDS G52-33-021</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489499/100/0/threaded">20080313 Re: Directory traversal and DoS in WinIPDS G52-33-021</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27757">27757</ref>
    </refs>
    <vuln_soft>
      <prod name="winipds" vendor="intermate">
        <vers num="3.3revg52-33-021"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0791" seq="2008-0791" published="2008-02-14" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">ipdsserver.exe in Intermate WinIPDS 3.3 G52-33-021 allows remote attackers to cause a denial of service (CPU consumption) via short packets on TCP port 5001 with the 3, 5, 7, 13, 14, or 15 packet types.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/winipds-adv.txt">http://aluigi.altervista.org/adv/winipds-adv.txt</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3658">3658</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488015/100/0/threaded">20080212 Directory traversal and DoS in WinIPDS G52-33-021</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489499/100/0/threaded">20080313 Re: Directory traversal and DoS in WinIPDS G52-33-021</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27757">27757</ref>
    </refs>
    <vuln_soft>
      <prod name="winipds" vendor="intermate">
        <vers num="3.3revg52-33-021"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0792" seq="2008-0792" published="2008-02-14" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.8" CVSS_base_score="5.8" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple F-Secure anti-virus products, including Internet Security 2006 through 2008, Anti-Virus 2006 through 2008, F-Secure Protection Service, and others, allow remote attackers to bypass malware detection via a crafted CAB archive.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.f-secure.com/security/fsc-2008-1.shtml" patch="1">http://www.f-secure.com/security/fsc-2008-1.shtml</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019405">1019405</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019412">1019412</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019413">1019413</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0544/references" adv="1">ADV-2008-0544</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40480">fsecure-cab-rar-security-bypass(40480)</ref>
    </refs>
    <vuln_soft>
      <prod name="f-secure_anti-virus" vendor="f-secure">
        <vers num="2006"/>
        <vers num="2007" edition="second_edition"/>
        <vers num="2008"/>
      </prod>
      <prod name="f-secure_anti-virus_client_security" vendor="f-secure">
        <vers num="6.03"/>
        <vers num="6.04"/>
        <vers num="7.01"/>
        <vers num="7.10"/>
      </prod>
      <prod name="f-secure_anti-virus_for_linux" vendor="f-secure">
        <vers num="4.65"/>
      </prod>
      <prod name="f-secure_anti-virus_for_workstations" vendor="f-secure">
        <vers num="5.44"/>
        <vers num="7.00"/>
        <vers num="7.10"/>
      </prod>
      <prod name="f-secure_anti-virus_linux_client_security" vendor="f-secure">
        <vers num="5.52"/>
        <vers num="5.53"/>
      </prod>
      <prod name="f-secure_internet_security" vendor="f-secure">
        <vers num="2006"/>
        <vers num="2007" edition="second_edition"/>
        <vers num="2008"/>
      </prod>
      <prod name="f-secure_protection_service_for_business" vendor="f-secure">
        <vers num="3.00" prev="1"/>
      </prod>
      <prod name="f-secure_protection_service_for_consumers" vendor="f-secure">
        <vers num="7.00" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0793" seq="2008-0793" published="2008-02-14" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in search.asp in Tendenci CMS allow remote attackers to inject arbitrary web script or HTML via the (1) category, (2) searchtext, (3) jobcategoryid, (4) contactcompany, and unspecified other parameters.  NOTE: some of these details are obtained from third party information.  NOTE: it is not clear whether this affects Tendenci Enterprise Edition in addition to the product's deployment on Tendenci's own server farm. If only the latter was affected, then this issue should not be included in CVE.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://blog.tendenci.com/2008/02/cross-site-scri.html">http://blog.tendenci.com/2008/02/cross-site-scri.html</ref>
      <ref source="MISC" url="http://holisticinfosec.blogspot.com/2008/02/fastest-fix-in-west-vendors-excellent.html">http://holisticinfosec.blogspot.com/2008/02/fastest-fix-in-west-vendors-excellent.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27782">27782</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40477">tendencicms-search-xss(40477)</ref>
    </refs>
    <vuln_soft>
      <prod name="cms" vendor="tendenci">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0794" seq="2008-0794" published="2008-02-14" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in user/header.php in Affiliate Market 0.1 BETA allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the language parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27777">27777</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40472">affiliatemarket-header-file-include(40472)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5108">5108</ref>
    </refs>
    <vuln_soft>
      <prod name="affiliate_market" vendor="affiliate_market">
        <vers num="0.1_beta"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0795" seq="2008-0795" published="2008-02-15" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the MGFi XfaQ (com_xfaq) 1.2 component for Mambo and Joomla! allows remote attackers to execute arbitrary SQL commands via the aid parameter in an answer action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27784">27784</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40494">xfaq-index-sql-injection(40494)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5109">5109</ref>
    </refs>
    <vuln_soft>
      <prod name="joomla" vendor="joomla">
        <vers num="1.0"/>
      </prod>
      <prod name="mambo" vendor="mambo">
        <vers num="4.5"/>
      </prod>
      <prod name="xfaq" vendor="mgfi">
        <vers num="1.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0796" seq="2008-0796" published="2008-02-15" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in threads.php in Nuboard 0.5 allows remote attackers to execute arbitrary SQL commands via the ssid parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5115">5115</ref>
    </refs>
    <vuln_soft>
      <prod name="nuboard" vendor="nuboard">
        <vers num="0.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0797" seq="2008-0797" published="2008-02-15" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in lib/download.php in iTheora 1.0 rc1 allows remote attackers to read arbitrary files via directory traversal sequences in the url parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://en.wikipedia.org/wiki/Talk:Itheora">http://en.wikipedia.org/wiki/Talk:Itheora</ref>
      <ref source="CONFIRM" url="http://menguy.aymeric.free.fr/theora/news.php" patch="1">http://menguy.aymeric.free.fr/theora/news.php</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27788" patch="1">27788</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40506">itheora-download-directory-traversal(40506)</ref>
    </refs>
    <vuln_soft>
      <prod name="itheora" vendor="itheora">
        <vers num="1.0" edition="rc1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0798" seq="2008-0798" published="2008-02-15" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Multiple directory traversal vulnerabilities in artmedic webdesign weblog 1.0, when magic_quotes_gpc is disabled, allow remote attackers to read arbitrary files via a .. (dot dot) in the (1) ta parameter to artmedic_index.php, reached through index.php; and the (2) date parameter to artmedic_print.php.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488115/100/100/threaded">20080213 artmedic weblog multiple local file inclusion vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27797">27797</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40522">artmedicweblog-artmedicprint-file-include(40522)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5116">5116</ref>
    </refs>
    <vuln_soft>
      <prod name="artmedic_weblog" vendor="artmedic_webdesign">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0799" seq="2008-0799" published="2008-02-15" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the Quiz (com_quiz) 0.81 and earlier component for Mambo and Joomla! allows remote attackers to execute arbitrary SQL commands via the tid parameter in a user_tst_shw action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27808">27808</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5119">5119</ref>
    </refs>
    <vuln_soft>
      <prod name="com_quiz" vendor="joomla">
        <vers num="0.81" prev="1"/>
      </prod>
      <prod name="com_quiz" vendor="mambo">
        <vers num="0.81" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0800" seq="2008-0800" published="2008-02-15" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the McQuiz (com_mcquiz) 0.9 Final component for Joomla! allows remote attackers to execute arbitrary SQL commands via the tid parameter in a user_tst_shw action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27809">27809</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5118">5118</ref>
    </refs>
    <vuln_soft>
      <prod name="com_mcquiz" vendor="joomla">
        <vers num="0.9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0801" seq="2008-0801" published="2008-02-15" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the PAXXGallery (com_paxxgallery) 0.2 component for Mambo and Joomla! allow remote attackers to execute arbitrary SQL commands via (1) the iid parameter in a view action, and possibly (2) the userid parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27811">27811</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40497">paxxgallery-index-sql-injection(40497)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5117">5117</ref>
    </refs>
    <vuln_soft>
      <prod name="com_paxxgallery" vendor="paxxgallery">
        <vers num="0.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0802" seq="2008-0802" published="2008-02-15" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the MediaSlide (com_mediaslide) 0.5 component for Joomla! allows remote attackers to execute arbitrary SQL commands via the albumnum parameter in a contact action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27805">27805</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40517">mediaslide-index-sql-injection(40517)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5120">5120</ref>
    </refs>
    <vuln_soft>
      <prod name="com_mediaslide" vendor="joomla">
        <vers num=""/>
      </prod>
      <prod name="com_mediaslide" vendor="mediaslide">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0803" seq="2008-0803" published="2008-02-15" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple PHP remote file inclusion vulnerabilities in LookStrike Lan Manager 0.9 allow remote attackers to execute arbitrary PHP code via a URL in the sys_conf[path][real] parameter to (1) modules\class\Table.php; (2) db_admins.php, (3) db_alert.php, (4) db_double.php, (5) db_games.php, (6) db_matches.php, (7) db_match_teams.php, (8) db_news.php, (9) db_platform.php, (10) db_players.php, (11) db_server_group.php, (12) db_server_ip.php, (13) db_teams.php, (14) db_team_players.php, (15) db_tournaments.php, (16) db_tournament_teams.php, and (17) db_trees.php in modules\class\db\; and (18) Match.php, (19) MatchTeam.php, (20) Rule.php, (21) RuleBuilder.php, (22) RulePool.php, (23) RuleSingle.php, (24) RuleTree.php, (25) Tournament.php, (26) TournamentTeam.php, (27) Tree.php, and (28) TreeSingle.php in modules\class\tournament\.  NOTE: this can also be leveraged to include and execute arbitrary local files via directory traversal sequences.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40519">lookstrikelanmanager-sysconf-file-include(40519)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5121">5121</ref>
    </refs>
    <vuln_soft>
      <prod name="lan_manager" vendor="lookstrike">
        <vers num="0.9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0804" seq="2008-0804" published="2008-02-18" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in usrgetform.html in Thecus N5200Pro NAS Server allows remote attackers to execute arbitrary PHP code via a URL in the name parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27865">27865</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5150">5150</ref>
    </refs>
    <vuln_soft>
      <prod name="n5200pro_nas_server_control_panel" vendor="thecus">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0805" seq="2008-0805" published="2008-02-18" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unrestricted file upload vulnerability in image.php in PHPizabi 0.848b C1 HFP1 allows remote attackers to execute arbitrary code by uploading a file with an executable extension from the event page, then accessing it via a direct request to the file in system/cache/pictures.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27847">27847</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0585">ADV-2008-0585</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5136">5136</ref>
    </refs>
    <vuln_soft>
      <prod name="medias_phpizabi" vendor="reality">
        <vers num="0.848b"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0806" seq="2008-0806" published="2008-02-18" modified="2008-09-05" severity="Low" CVSS_version="2.0" CVSS_score="3.6" CVSS_base_score="3.6" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">wyrd 1.4.3b allows local users to overwrite arbitrary files via a symlink attack on the wyrd-tmp.[USERID] temporary file.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=466382">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=466382</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27848">27848</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=433719">https://bugzilla.redhat.com/show_bug.cgi?id=433719</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00825.html">FEDORA-2008-1963</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00841.html">FEDORA-2008-1986</ref>
    </refs>
    <vuln_soft>
      <prod name="wyrd" vendor="paul_pelzl">
        <vers num="1.4.3b_3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0807" seq="2008-0807" published="2008-02-18" modified="2011-03-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.9" CVSS_base_score="4.9" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="6.8" CVSS_vector="(AV:N/AC:M/Au:S/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">lib/Driver/sql.php in Turba 2 (turba2) Contact Manager H3 2.1.x before 2.1.7 and 2.2.x before 2.2-RC3, as used in products such as Horde Groupware before 1.0.4 and Horde Groupware Webmail Edition before 1.0.5, does not properly check access rights, which allows remote authenticated users to modify address data via a modified object_id parameter to edit.php, as demonstrated by modifying a personal address book entry when there is write access to a shared address book.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464058">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464058</ref>
      <ref source="MLIST" url="http://lists.horde.org/archives/announce/2008/000378.html" patch="1">[announce] 20080215 Turba H3 (2.1.7) (final)</ref>
      <ref source="MLIST" url="http://lists.horde.org/archives/announce/2008/000379.html" patch="1">[announce] 20080215 Turba H3 (2.2-RC3)</ref>
      <ref source="MLIST" url="http://lists.horde.org/archives/announce/2008/000380.html" patch="1">[announce] 20080215 Horde Groupware 1.0.4 (final)</ref>
      <ref source="MLIST" url="http://lists.horde.org/archives/announce/2008/000381.html" patch="1">[announce] 20080215 Horde Groupware Webmail Edition 1.0.5 (final)</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1507">DSA-1507</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27844" patch="1">27844</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019433">1019433</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0593/references">ADV-2008-0593</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=432027">https://bugzilla.redhat.com/show_bug.cgi?id=432027</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00888.html">FEDORA-2008-2040</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00927.html">FEDORA-2008-2087</ref>
    </refs>
    <vuln_soft>
      <prod name="groupware" vendor="horde">
        <vers num="1.0.3"/>
      </prod>
      <prod name="groupware_webmail_edition" vendor="horde">
        <vers num="1.0.4"/>
      </prod>
      <prod name="turba_contact_manager" vendor="horde">
        <vers num="2.1.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0808" seq="2008-0808" published="2008-02-18" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the meta plugin in Ikiwiki before 1.1.47 allows remote attackers to inject arbitrary web script or HTML via meta tags.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=465110">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=465110</ref>
      <ref source="CONFIRM" url="http://ikiwiki.info/security/#index30h2">http://ikiwiki.info/security/#index30h2</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1523">DSA-1523</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27760">27760</ref>
    </refs>
    <vuln_soft>
      <prod name="ikiwiki" vendor="ikiwiki">
        <vers num="1.33.3"/>
        <vers num="1.46" prev="1"/>
        <vers num="2.31"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0809" seq="2008-0809" published="2008-02-18" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the htmlscrubber in Ikiwiki before 1.1.46 allows remote attackers to inject arbitrary web script or HTML via title contents.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://ikiwiki.info/security/#index27h2">http://ikiwiki.info/security/#index27h2</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1523">DSA-1523</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27760">27760</ref>
    </refs>
    <vuln_soft>
      <prod name="ikiwiki" vendor="ikiwiki">
        <vers num="1.45" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0810" seq="2008-0810" published="2008-02-18" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the com_scheduling module for Joomla! and Mambo allows remote attackers to execute arbitrary SQL commands via the id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3662">3662</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488269/100/0/threaded">20080216 joomla SQL Injection( com_scheduling)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27830">27830</ref>
    </refs>
    <vuln_soft>
      <prod name="com_scheduling_component" vendor="joomla">
        <vers num=""/>
      </prod>
      <prod name="com_scheduling_component" vendor="mambo">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0811" seq="2008-0811" published="2008-02-18" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in AuraCMS 1.62 allow remote attackers to execute arbitrary SQL commands via (1) the kid parameter to (a) mod/dl.php or (b) mod/links.php, and (2) the query parameter to search.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27841">27841</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019430">1019430</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5130">5130</ref>
    </refs>
    <vuln_soft>
      <prod name="auracms" vendor="auracms">
        <vers num="1.62"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0812" seq="2008-0812" published="2008-02-18" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in DMS/index.php in BanPro DMS 1.0 allows remote attackers to include and execute arbitrary files via a .. (dot dot) in the action parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3666">3666</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488271/100/0/threaded">20080216 banpro-dms 1.0 local file inclusion vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27831">27831</ref>
    </refs>
    <vuln_soft>
      <prod name="net_banpro_dms" vendor="banpro">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0813" seq="2008-0813" published="2008-02-18" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in Download.php in XPWeb 3.0.1, 3.3.2, and possibly other versions, allows remote attackers to read arbitrary files via a .. (dot dot) in the url parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27838">27838</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0584">ADV-2008-0584</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5137">5137</ref>
    </refs>
    <vuln_soft>
      <prod name="xpweb" vendor="xpweb">
        <vers num="3.0.1"/>
        <vers num="3.3.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0814" seq="2008-0814" published="2008-02-18" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in download.php in Tracking Requirements &amp; Use Cases (TRUC) 0.11.0 allows remote attackers to read arbitrary files via a .. (dot dot) in the upload_filename parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27839">27839</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5129">5129</ref>
    </refs>
    <vuln_soft>
      <prod name="truc" vendor="truc">
        <vers num="0.11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0815" seq="2008-0815" published="2008-02-18" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the com_mezun component for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in an edit task.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3663">3663</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487992/100/100/threaded">20080212 joomll(k12.tr)(com_mezun)SQL Injection</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27755">27755</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40448">mezun-index-sql-injection(40448)</ref>
    </refs>
    <vuln_soft>
      <prod name="com_mezun" vendor="egitimhost">
        <vers num=""/>
      </prod>
      <prod name="com_mezun" vendor="joomla">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0816" seq="2008-0816" published="2008-02-18" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the com_sg component for Joomla! and Mambo allows remote attackers to execute arbitrary SQL commands via the pid parameter in an order task.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3664">3664</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488272/100/0/threaded">20080215 joomla SQL Injection(com_sg)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27821">27821</ref>
    </refs>
    <vuln_soft>
      <prod name="com_sg" vendor="com_sg">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0817" seq="2008-0817" published="2008-02-18" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the com_filebase component for Joomla! and Mambo allows remote attackers to execute arbitrary SQL commands via the filecatid parameter in a selectfolder action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3665">3665</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488268/100/0/threaded">20080215 joomla SQL Injection(com_filebase)</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488284/100/0/threaded">20080216 joomla SQL Injection(com_filebase)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27829">27829</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40616">filebase-index-sql-injection(40616)</ref>
    </refs>
    <vuln_soft>
      <prod name="com_filebase_component" vendor="joomla">
        <vers num=""/>
      </prod>
      <prod name="com_filebase_component" vendor="mambo">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0818" seq="2008-0818" published="2008-02-19" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple directory traversal vulnerabilities in freePHPgallery 0.6 allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the lang cookie to (1) comment.php, (2) index.php, and (3) show.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/forum/forum.php?forum_id=785794">http://sourceforge.net/forum/forum.php?forum_id=785794</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27806">27806</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0589">ADV-2008-0589</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5124">5124</ref>
    </refs>
    <vuln_soft>
      <prod name="freephpgallery" vendor="freephpgallery">
        <vers num="0.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0819" seq="2008-0819" published="2008-02-19" modified="2018-10-15" severity="Low" CVSS_version="2.0" CVSS_score="3.6" CVSS_base_score="3.6" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in index.php in PlutoStatus Locator 1.0 pre alpha allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the page parameter.</descript>
      <descript source="nvd">The security focus bid link states that this is a local file include vulnerability.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3667">3667</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488141/100/0/threaded">20080214 PlutoStatus Locator v1.0pre (alpha) local file inclusion vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27802">27802</ref>
    </refs>
    <vuln_soft>
      <prod name="plutostatus_locator" vendor="plutostatus">
        <vers num="1.0pre_alpha"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0820" seq="2008-0820" published="2008-02-19" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">** DISPUTED **  Cross-site scripting (XSS) vulnerability in index.php in Etomite 0.6.1.4 Final allows remote attackers to inject arbitrary web script or HTML via $_SERVER['PHP_INFO'].  NOTE: the vendor disputes this issue in a followup, stating that the affected variable is $_SERVER['PHP_SELF'], and "This is not an Etomite specific exploit and I would like the report rescinded."</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3669">3669</ref>
      <ref source="MISC" url="http://www.etomite.com/forums/index.php?showtopic=7647">http://www.etomite.com/forums/index.php?showtopic=7647</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488122/100/0/threaded">20080214 etomite xss</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488304/100/100/threaded">20080218 Re: etomite xss</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27794">27794</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40525">etomite-index-xss(40525)</ref>
    </refs>
    <vuln_soft>
      <prod name="etomite" vendor="etomite">
        <vers num="0.6.1.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0821" seq="2008-0821" published="2008-02-19" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in admin/traffic/knowledge_searchm.php in OSI Codes Inc. PHP Live! 3.2.2 allows remote attackers to execute arbitrary SQL commands via the questid parameter in an expand_question action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27807">27807</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5125">5125</ref>
    </refs>
    <vuln_soft>
      <prod name="phplive" vendor="osi_codes_inc.">
        <vers num="3.2.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0822" seq="2008-0822" published="2008-02-19" modified="2018-10-15" severity="Low" CVSS_version="2.0" CVSS_score="3.6" CVSS_base_score="3.6" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in index.php in Scribe 0.2 allows remote attackers to read arbitrary local files via a .. (dot dot) in the page parameter.</descript>
      <descript source="nvd">Security focus bid link notes that this is a local file include vulnerability.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3668">3668</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488140/100/0/threaded">20080214 scribe 0.2 local file inclusion vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27803">27803</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5123">5123</ref>
    </refs>
    <vuln_soft>
      <prod name="scribe" vendor="scribe">
        <vers num="0.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0823" seq="2008-0823" published="2008-02-19" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Header Image Module before 5.x-1.1 for Drupal allows remote attackers to access the administration pages via unknown attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://drupal.org/node/221359" patch="1">http://drupal.org/node/221359</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27787" patch="1">27787</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0571">ADV-2008-0571</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40510">drupal-headerimage-security-bypass(40510)</ref>
    </refs>
    <vuln_soft>
      <prod name="header_image" vendor="drupal">
        <vers num="5.x-1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0824" seq="2008-0824" published="2008-02-19" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the php2phps function in Claroline before 1.8.9 has unknown impact and attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=575934" patch="1">http://sourceforge.net/project/shownotes.php?release_id=575934</ref>
    </refs>
    <vuln_soft>
      <prod name="caroline" vendor="caroline">
        <vers num="1.5" prev="1"/>
        <vers num="1.6.0" prev="1"/>
        <vers num="1.6.1" prev="1"/>
        <vers num="1.6.2" prev="1"/>
        <vers num="1.6.3" prev="1"/>
        <vers num="1.7" prev="1"/>
        <vers num="1.7.9" prev="1"/>
        <vers num="1.8" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0825" seq="2008-0825" published="2008-02-19" modified="2011-03-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in Claroline before 1.8.9 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=575934">http://sourceforge.net/project/shownotes.php?release_id=575934</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27846">27846</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0596">ADV-2008-0596</ref>
    </refs>
    <vuln_soft>
      <prod name="caroline" vendor="caroline">
        <vers num="1.5" prev="1"/>
        <vers num="1.6.0" prev="1"/>
        <vers num="1.6.1" prev="1"/>
        <vers num="1.6.2" prev="1"/>
        <vers num="1.6.3" prev="1"/>
        <vers num="1.7" prev="1"/>
        <vers num="1.7.9" prev="1"/>
        <vers num="1.8" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0826" seq="2008-0826" published="2008-02-19" modified="2011-03-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Claroline before 1.8.9 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=575934">http://sourceforge.net/project/shownotes.php?release_id=575934</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27846">27846</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0596">ADV-2008-0596</ref>
    </refs>
    <vuln_soft>
      <prod name="caroline" vendor="caroline">
        <vers num="1.5" prev="1"/>
        <vers num="1.6.0" prev="1"/>
        <vers num="1.6.1" prev="1"/>
        <vers num="1.6.2" prev="1"/>
        <vers num="1.6.3" prev="1"/>
        <vers num="1.7" prev="1"/>
        <vers num="1.7.9" prev="1"/>
        <vers num="1.8" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0827" seq="2008-0827" published="2008-02-19" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the Books module of PHP-Nuke allows remote attackers to execute arbitrary SQL commands via the cid parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27863">27863</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40857">books-cid-sql-injection(40857)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5147">5147</ref>
    </refs>
    <vuln_soft>
      <prod name="book" vendor="phpnuke">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0828" seq="2008-0828" published="2008-02-19" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in ATutor 1.5.5 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) attributes such as style and onmouseover in (a) forum post or (b) mail; or (2) the website field of the profile.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3670">3670</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488293/100/0/threaded">20080217 ATutor &lt;= 1.5.5 Cross Site Scripting</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27855" patch="1">27855</ref>
    </refs>
    <vuln_soft>
      <prod name="atutor" vendor="atutor">
        <vers num="0.9.6"/>
        <vers num="0.9.7"/>
        <vers num="1.0"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2"/>
        <vers num="1.3"/>
        <vers num="1.3.1"/>
        <vers num="1.3.2"/>
        <vers num="1.3.3"/>
        <vers num="1.4"/>
        <vers num="1.4.1"/>
        <vers num="1.4.2"/>
        <vers num="1.4.3"/>
        <vers num="1.5.1" edition="pl1"/>
        <vers num="1.5.1" edition="pl2"/>
        <vers num="1.5.2"/>
        <vers num="1.5.3" edition="rc2"/>
        <vers num="1.5.3.1"/>
        <vers num="1.5.3.2"/>
        <vers num="1.5.4"/>
        <vers num="1.5.5" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0829" seq="2008-0829" published="2008-02-19" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in jooget.php in the Joomlapixel Jooget! (com_jooget) 2.6.8 component for Joomla! and Mambo allows remote attackers to execute arbitrary SQL commands via the id parameter in a detail task.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://forum.joomlaitalia.com/index.php?topic=388.0">http://forum.joomlaitalia.com/index.php?topic=388.0</ref>
      <ref source="CONFIRM" url="http://members.joomlapixel.eu/download/componenti/patch-jooget-2.6.8-sql-injection/details.html">http://members.joomlapixel.eu/download/componenti/patch-jooget-2.6.8-sql-injection/details.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27836">27836</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5132">5132</ref>
    </refs>
    <vuln_soft>
      <prod name="joomla" vendor="joomla">
        <vers num=""/>
      </prod>
      <prod name="jooget" vendor="joomlapixel">
        <vers num="2.6.8"/>
      </prod>
      <prod name="mambo" vendor="mambo">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0830" seq="2008-0830" published="2008-02-19" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The Digital Photo Access Protocol (DPAP) server for iPhoto 4.0.3 allows remote attackers to cause a denial of service (crash) via a malformed dpap: URI, a different vulnerability than CVE-2008-0043.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27867">27867</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019488">1019488</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5151">5151</ref>
    </refs>
    <vuln_soft>
      <prod name="iphoto" vendor="apple">
        <vers num="4.0.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0831" seq="2008-0831" published="2008-02-20" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in the Rapid Recipe (com_rapidrecipe) 1.6.5 and earlier component for Joomla! allow remote attackers to execute arbitrary SQL commands via the (1) user_id or (2) category_id parameter.  NOTE: this might overlap CVE-2008-0754.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5103">5103</ref>
    </refs>
    <vuln_soft>
      <prod name="rapid_recipe" vendor="joomla">
        <vers num="1.6.5" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0832" seq="2008-0832" published="2008-02-20" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the Kemas Antonius com_quran 1.1 and earlier component for Mambo and Joomla! allows remote attackers to execute arbitrary SQL commands via the surano parameter in a viewayat action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2008-02/0399.html">20080223 php-nuke Quran SQL Injection(surano)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27842">27842</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40573">quran-index-sql-injection(40573)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5128">5128</ref>
    </refs>
    <vuln_soft>
      <prod name="kemas_antonius_com_quran" vendor="joomla">
        <vers num="1.1" prev="1"/>
      </prod>
      <prod name="kemas_antonius_com_quran" vendor="mambo">
        <vers num="1.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0833" seq="2008-0833" published="2008-02-20" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the com_galeria component for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a detail action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488285">20080216 joomla SQL Injection(com_galeria)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27833">27833</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5134">5134</ref>
    </refs>
    <vuln_soft>
      <prod name="com_galeria" vendor="joomla">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0834" seq="2008-0834" published="2008-02-20" modified="2011-03-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Lotus Quickr for i5/OS before 8.0.0.2 Hotfix 11, when anonymous access is disabled on HTTP ports, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27840" patch="1">27840</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019431">1019431</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0590">ADV-2008-0590</ref>
      <ref source="CONFIRM" url="http://www-1.ibm.com/support/docview.wss?uid=swg24016411" patch="1">http://www-1.ibm.com/support/docview.wss?uid=swg24016411</ref>
    </refs>
    <vuln_soft>
      <prod name="lotus_quickr" vendor="ibm">
        <vers num="8.0"/>
        <vers num="8.0.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0835" seq="2008-0835" published="2008-02-20" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in indexen.php in Simple CMS 1.0.3 and earlier allows remote attackers to execute arbitrary SQL commands via the area parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488288/100/0/threaded">20080217 Simple CMS &lt;= 1.0.3 (indexen.php area) Remote SQL Injection Exploit</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27843">27843</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5131">5131</ref>
    </refs>
    <vuln_soft>
      <prod name="simple_cms" vendor="simple_cms">
        <vers num="1.0.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0836" seq="2008-0836" published="2008-02-20" modified="2011-03-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.9" CVSS_base_score="4.9" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the vuidmice STREAMS modules in Sun Solaris 9 and 10 on x86 architectures allows local users to cause a denial of service (panic) via unspecified vectors that trigger a NULL pointer dereference in the vuid3ps2 module, a different issue than CVE-2007-5319.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-200635-1" patch="1">200635</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019429">1019429</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0582">ADV-2008-0582</ref>
    </refs>
    <vuln_soft>
      <prod name="solaris" vendor="sun">
        <vers num="9" edition=":x86"/>
        <vers num="10" edition=":x86"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0837" seq="2008-0837" published="2008-02-20" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the log feature in the John Godley Search Unleashed 0.2.10 plugin for WordPress allows remote attackers to inject arbitrary web script or HTML via the s parameter, which is not properly handled when the administrator views the log file.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3674">3674</ref>
      <ref source="CONFIRM" url="http://urbangiraffe.com/tracker/issues/show/60">http://urbangiraffe.com/tracker/issues/show/60</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488109/100/0/threaded">20080213 Search Unleashed 0.2.10 JavaScript injection (Wordpress plugin)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27791">27791</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40513">searchunleashed-log-xss(40513)</ref>
    </refs>
    <vuln_soft>
      <prod name="search_unleashed" vendor="john_godley">
        <vers num="0.2.10"/>
      </prod>
      <prod name="search_unleashed_plugin" vendor="wordpress">
        <vers num="0.2.10"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0838" seq="2008-0838" published="2008-02-20" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in the web administration interface in Sophos ES1000 and ES4000 Email Security Appliance 2.1.0.0 allow remote attackers to inject arbitrary web script or HTML via the (1) error and (2) go parameters to the login page.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3673">3673</ref>
      <ref source="MISC" url="http://www.infigo.hr/en/in_focus/advisories/INFIGO-2008-02-13">http://www.infigo.hr/en/in_focus/advisories/INFIGO-2008-02-13</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488206/100/0/threaded">20080215 [INFIGO-2008-02-13]: SOPHOS Email Security Appliance Cross Site Scripting Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27813">27813</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019427">1019427</ref>
      <ref source="CONFIRM" url="http://www.sophos.com/support/knowledgebase/article/34733.html">http://www.sophos.com/support/knowledgebase/article/34733.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0574">ADV-2008-0574</ref>
    </refs>
    <vuln_soft>
      <prod name="es1000" vendor="sophos">
        <vers num="2.1.0.0"/>
      </prod>
      <prod name="es4000" vendor="sophos">
        <vers num="2.1.0.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0839" seq="2008-0839" published="2008-02-20" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in refer.php in the astatsPRO (com_astatspro) 1.0 component for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27850">27850</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40611">astatspro-refer-sql-injection(40611)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5138">5138</ref>
    </refs>
    <vuln_soft>
      <prod name="astatspro" vendor="astats">
        <vers num="1.0"/>
      </prod>
      <prod name="com_astatspro" vendor="joomla">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0840" seq="2008-0840" published="2008-02-20" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.4" CVSS_base_score="4.4" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in view_member.php in Public Warehouse LightBlog 9.6 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the username parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488283/100/0/threaded">20080217 lightblog 9.6 local file inclusion vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27837">27837</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0621">ADV-2008-0621</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5140">5140</ref>
    </refs>
    <vuln_soft>
      <prod name="lightblog" vendor="publicwarehouse">
        <vers num="9.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0841" seq="2008-0841" published="2008-02-20" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the Giorgio Nordo Ricette (com_ricette) 1.0 component for Joomla! and Mambo allows remote attackers to execute arbitrary SQL commands via the id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27834">27834</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5133">5133</ref>
    </refs>
    <vuln_soft>
      <prod name="com_ricette_component" vendor="joomla">
        <vers num="1.0"/>
      </prod>
      <prod name="com_ricette_component" vendor="mambo">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0842" seq="2008-0842" published="2008-02-20" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the Classifier (com_clasifier) component for Joomla! allows remote attackers to execute arbitrary SQL commands via the cat_id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27917">27917</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0620">ADV-2008-0620</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40629">clasifier-index-sql-injection(40629)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5146">5146</ref>
    </refs>
    <vuln_soft>
      <prod name="com_clasifier" vendor="joomla">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0843" seq="2008-0843" published="2008-02-20" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">StatCounteX 3.0 and 3.1 allows remote attackers to obtain sensitive information and edit configuration scripts via a direct request to admin.asp.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://packetstormsecurity.org/1002-exploits/statcountex-disclose.txt">http://packetstormsecurity.org/1002-exploits/statcountex-disclose.txt</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3675">3675</ref>
      <ref source="EXPLOIT-DB" url="http://www.exploit-db.com/exploits/11434">11434</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488200/100/0/threaded">20080214 StatCounteX 3.0 &amp; 3.1 Admin Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27814">27814</ref>
    </refs>
    <vuln_soft>
      <prod name="statcountex" vendor="statcountex">
        <vers num="3.0"/>
        <vers num="3.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0844" seq="2008-0844" published="2008-02-20" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the PccookBook (com_pccookbook) component for Joomla! allows remote attackers to execute arbitrary SQL commands via the user_id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27864">27864</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40620">pccookbook-index-sql-injection(40620)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5145">5145</ref>
    </refs>
    <vuln_soft>
      <prod name="com_pccookbook" vendor="joomla">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0845" seq="2008-0845" published="2008-02-20" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in wp-people-popup.php in Dean Logan WP-People plugin 1.6.1 for WordPress allows remote attackers to execute arbitrary SQL commands via the person parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3672">3672</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488282/100/0/threaded">20080216 Wordpress Plugin (wp-people) SQL Injection</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27858">27858</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40860">wppeople-wppeoplepopup-sql-injection(40860)</ref>
    </refs>
    <vuln_soft>
      <prod name="dean_logan_wp-people_plugin" vendor="wordpress">
        <vers num="1.6.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0846" seq="2008-0846" published="2008-02-20" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the com_profile component for Joomla! allows remote attackers to execute arbitrary SQL commands via the oid parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=120335361520072&amp;w=2">20080216 joomla SQL Injection(com_profile)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27851">27851</ref>
    </refs>
    <vuln_soft>
      <prod name="com_profile" vendor="joomla">
        <vers num=""/>
      </prod>
      <prod name="com_profile" vendor="mambo">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0847" seq="2008-0847" published="2008-02-20" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in print.php in the myTopics module for XOOPS allows remote attackers to execute arbitrary SQL commands via the articleid parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488315/100/0/threaded">20080218 XOOPS Module myTopics-print SQL Injection(articleid)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27861">27861</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40627">mytopics-print-sql-injection(40627)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5148">5148</ref>
    </refs>
    <vuln_soft>
      <prod name="mytopics" vendor="xoops">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0848" seq="2008-0848" published="2008-02-20" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in lostsheep.php in Crafty Syntax Live Help (CSLH) before 2.14.16, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.  NOTE: the versions claimed by the original researcher are probably incorrect.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3688">3688</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=580994">http://sourceforge.net/project/shownotes.php?release_id=580994</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488286/100/0/threaded">20080218 Crafty Syntax Xss Vulnerability</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489016/100/0/threaded">20080302 Re: Crafty Syntax Xss Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27859">27859</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40636">cslh-lostsheep-xss(40636)</ref>
    </refs>
    <vuln_soft>
      <prod name="crafty_syntax_live_help" vendor="crafty_syntax_live_help">
        <vers num="2.4.15" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0849" seq="2008-0849" published="2008-02-20" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the Downloads (com_downloads) component for Mambo and Joomla! allows remote attackers to execute arbitrary SQL commands via the cat parameter in a selectcat function, a different vector than CVE-2008-0652.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3676">3676</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488291/100/0/threaded">20080216 joomla SQL Injection (cat)(com_downloads)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27860">27860</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40621">downloads-indexphp-sql-injection(40621)</ref>
    </refs>
    <vuln_soft>
      <prod name="com_downloads" vendor="joomla">
        <vers num=""/>
      </prod>
      <prod name="com_downloads" vendor="mambo">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0850" seq="2008-0850" published="2008-02-20" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in Dokeos 1.8.4 allow remote attackers to execute arbitrary SQL commands via the (1) id parameter to whoisonline.php, (2) tracking_list_coaches_column parameter to main/mySpace/index.php, (3) tutor_name parameter to main/create_course/add_course.php, the (4) Referer HTTP header to index.php, and the (5) X-Fowarded-For HTTP header to main/admin/class_list.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://projects.dokeos.com/index.php?do=details&amp;task_id=2218">http://projects.dokeos.com/index.php?do=details&amp;task_id=2218</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3687">3687</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488314/100/0/threaded">20080219 [DSECRG-08-015] Multiple Security Vulnerabilities in Dokeos 1.8.4</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27792">27792</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019425">1019425</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0587">ADV-2008-0587</ref>
    </refs>
    <vuln_soft>
      <prod name="dokeos" vendor="dokeos">
        <vers num="1.8.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0851" seq="2008-0851" published="2008-02-20" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in Dokeos 1.8.4 allow remote attackers to inject arbitrary web script or HTML via the (1) username parameter to inscription.php, (2) courseCode parameter to main/calendar/myagenda.php, (3) category parameter to main/admin/course_category.php, (4) message parameter to main/admin/session_list.php in a show_message action, and (5) an avatar image to main/auth/profile.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://projects.dokeos.com/index.php?do=details&amp;task_id=2218">http://projects.dokeos.com/index.php?do=details&amp;task_id=2218</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3687">3687</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488314/100/0/threaded">20080219 [DSECRG-08-015] Multiple Security Vulnerabilities in Dokeos 1.8.4</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27792">27792</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019425">1019425</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0587">ADV-2008-0587</ref>
    </refs>
    <vuln_soft>
      <prod name="e-learning_system" vendor="dokeos">
        <vers num="1.8.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0852" seq="2008-0852" published="2008-02-20" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">freeSSHd 1.2 and earlier allows remote attackers to cause a denial of service (crash) via a SSH2_MSG_NEWKEYS packet to TCP port 22, which triggers a NULL pointer dereference.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/freesshdnull-adv.txt">http://aluigi.altervista.org/adv/freesshdnull-adv.txt</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488363/100/0/threaded">20080219 NULL pointer crash in freeSSHd 1.20</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27845">27845</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0591">ADV-2008-0591</ref>
    </refs>
    <vuln_soft>
      <prod name="freesshd" vendor="freesshd">
        <vers num="1.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0853" seq="2008-0853" published="2008-02-20" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the com_detail component for Joomla! and Mambo allows remote attackers to execute arbitrary SQL commands via the id parameter to index.php.  NOTE: this issue might be site-specific.  If so, it should not be included in CVE.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3677">3677</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488278/100/0/threaded">20080216 joomla SQL Injection(com_detail)</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488325/100/0/threaded">20080218 joomla SQL Injection(com_detail)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27853">27853</ref>
    </refs>
    <vuln_soft>
      <prod name="com_detail" vendor="joomla">
        <vers num=""/>
      </prod>
      <prod name="com_detail" vendor="mambo">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0854" seq="2008-0854" published="2008-02-20" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the com_salesrep component for Joomla! and Mambo allows remote attackers to execute arbitrary SQL commands via the rid parameter in a showrep action to index.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3678">3678</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488267/100/0/threaded">20080215 joomla SQL Injection(com_salesrep)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27827">27827</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40619">salesrep-index-sql-injection(40619)</ref>
    </refs>
    <vuln_soft>
      <prod name="com_salesrep" vendor="joomla">
        <vers num=""/>
      </prod>
      <prod name="com_salesrep" vendor="mambo">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0855" seq="2008-0855" published="2008-02-20" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the Facile Forms (com_facileforms) component for Joomla! and Mambo allows remote attackers to execute arbitrary SQL commands via the catid parameter to index.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3679">3679</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488335/100/0/threaded">20080218 joomla SQL Injection(com_facileforms)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27880">27880</ref>
    </refs>
    <vuln_soft>
      <prod name="com_facileforms" vendor="joomla">
        <vers num=""/>
      </prod>
      <prod name="com_facileforms" vendor="mambo">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0856" seq="2008-0856" published="2008-02-20" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in e-Vision CMS 2.02 allow remote attackers to execute arbitrary SQL commands via the id parameter to (1) iframe.php and (2) print.php.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27816">27816</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40859">evisioncms-iframe-print-sql-injection(40859)</ref>
    </refs>
    <vuln_soft>
      <prod name="e-vision_cms" vendor="e-vision">
        <vers num="2.02"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0857" seq="2008-0857" published="2008-02-20" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in WoltLab Burning Board 3.0.3 PL 1 allows remote attackers to execute arbitrary SQL commands via the sortOrder parameter to the PMList page.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3680">3680</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488345/100/0/threaded">20080219 WoltLab Burning Board 3.0.3 PL1 SQL-Injection Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27885">27885</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5164">5164</ref>
    </refs>
    <vuln_soft>
      <prod name="burning_board" vendor="woltlab">
        <vers num="3.0.3_pl1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0858" seq="2008-0858" published="2008-02-20" modified="2011-03-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in the Visnetic anti-virus plugin in Kerio MailServer before 6.5.0 might allow remote attackers to execute arbitrary code via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.kerio.com/kms_history.html">http://www.kerio.com/kms_history.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27868">27868</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019428">1019428</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0594">ADV-2008-0594</ref>
    </refs>
    <vuln_soft>
      <prod name="kerio_mailserver" vendor="kerio">
        <vers num="6.4.2" prev="1"/>
      </prod>
      <prod name="visnetic_antivirus_plug-in_for_mail_server" vendor="visnetic">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0859" seq="2008-0859" published="2008-02-20" modified="2011-03-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Kerio MailServer before 6.5.0 allows remote attackers to cause a denial of service (crash) via unspecified vectors related to decoding of uuencoded input, which triggers memory corruption.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.kerio.com/kms_history.html">http://www.kerio.com/kms_history.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27868">27868</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019428">1019428</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0594">ADV-2008-0594</ref>
    </refs>
    <vuln_soft>
      <prod name="kerio_mailserver" vendor="kerio">
        <vers num="5.0"/>
        <vers num="5.1"/>
        <vers num="5.1.1"/>
        <vers num="5.6.3"/>
        <vers num="5.6.4"/>
        <vers num="5.6.5"/>
        <vers num="5.7.0"/>
        <vers num="5.7.1"/>
        <vers num="5.7.2"/>
        <vers num="5.7.3"/>
        <vers num="5.7.4"/>
        <vers num="5.7.5"/>
        <vers num="5.7.6"/>
        <vers num="5.7.7"/>
        <vers num="5.7.8"/>
        <vers num="5.7.9"/>
        <vers num="5.7.10"/>
        <vers num="6.0"/>
        <vers num="6.0.1"/>
        <vers num="6.0.2"/>
        <vers num="6.0.3"/>
        <vers num="6.0.4"/>
        <vers num="6.0.9"/>
        <vers num="6.0.10"/>
        <vers num="6.1.3"/>
        <vers num="6.2.2"/>
        <vers num="6.3.1"/>
        <vers num="6.4.0"/>
        <vers num="6.4.1"/>
        <vers num="6.4.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0860" seq="2008-0860" published="2008-02-20" modified="2011-03-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the AVG plugin in Kerio MailServer before 6.5.0 has unspecified impact via unknown remote attack vectors related to null DACLs.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.kerio.com/kms_history.html">http://www.kerio.com/kms_history.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27868">27868</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019428">1019428</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0594">ADV-2008-0594</ref>
    </refs>
    <vuln_soft>
      <prod name="avg_plugin" vendor="kerio">
        <vers num=""/>
      </prod>
      <prod name="kerio_mailserver" vendor="kerio">
        <vers num="6.4.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0861" seq="2008-0861" published="2008-02-20" modified="2011-03-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in leg/Main.nsf in IBM Lotus Quickplace 7.0 allows remote attackers to inject arbitrary web script or HTML via an h_SearchString sub-parameter in the PreSetFields parameter of an EditDocument action.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.securiteam.com/securitynews/5AP0B2KNFM.html">http://www.securiteam.com/securitynews/5AP0B2KNFM.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27871">27871</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019432">1019432</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0841/references">ADV-2008-0841</ref>
    </refs>
    <vuln_soft>
      <prod name="lotus_quickplace" vendor="ibm">
        <vers num="7.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0862" seq="2008-0862" published="2008-02-20" modified="2011-03-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">IBM Lotus Notes 6.0, 6.5, 7.0, and 8.0 signs an unsigned applet when a user forwards an email message to another user, which allows user-assisted remote attackers to bypass Execution Control List (ECL) protection.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0600/references">ADV-2008-0600</ref>
      <ref source="CONFIRM" url="http://www-1.ibm.com/support/docview.wss?uid=swg21257250">http://www-1.ibm.com/support/docview.wss?uid=swg21257250</ref>
    </refs>
    <vuln_soft>
      <prod name="lotus_notes" vendor="ibm">
        <vers num="6.0"/>
        <vers num="6.5"/>
        <vers num="7.0"/>
        <vers num="8.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0863" seq="2008-0863" published="2008-02-20" modified="2011-03-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">BEA WebLogic Server and WebLogic Express 9.0 and 9.1 exposes the web service's WSDL and security policies, which allows remote attackers to obtain sensitive information and potentially launch further attacks.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BEA" url="http://dev2dev.bea.com/pub/advisory/260" patch="1">BEA08-187.00</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019455">1019455</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0612/references">ADV-2008-0612</ref>
    </refs>
    <vuln_soft>
      <prod name="weblogic_server" vendor="bea">
        <vers num="9.0" edition=":express"/>
        <vers num="9.1" edition=":express"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0864" seq="2008-0864" published="2008-02-20" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Admin Tools in BEA WebLogic Portal 8.1 SP3 through SP6 can inadvertently remove entitlements for pages when an administrator edits the page definition label, which might allow remote attackers to bypass intended access restrictions.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BEA" url="http://dev2dev.bea.com/pub/advisory/256">BEA08-183.00</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019454">1019454</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0613">ADV-2008-0613</ref>
    </refs>
    <vuln_soft>
      <prod name="weblogic_portal" vendor="bea_systems">
        <vers num="8.1_sp6"/>
      </prod>
      <prod name="weblogic_portal" vendor="oracle">
        <vers num="8.1" edition="sp3"/>
        <vers num="8.1" edition="sp4"/>
        <vers num="8.1" edition="sp5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0865" seq="2008-0865" published="2008-02-20" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in BEA WebLogic Portal 8.1 through SP6 allows remote attackers to bypass entitlements for instances of a floatable WLP portlet via unknown vectors.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BEA" url="http://dev2dev.bea.com/pub/advisory/257">BEA08-184.00</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019451">1019451</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0613">ADV-2008-0613</ref>
    </refs>
    <vuln_soft>
      <prod name="weblogic_portal" vendor="bea_systems">
        <vers num="8.1_sp6"/>
      </prod>
      <prod name="weblogic_portal" vendor="oracle">
        <vers num="8.1" edition="sp1"/>
        <vers num="8.1" edition="sp2"/>
        <vers num="8.1" edition="sp3"/>
        <vers num="8.1" edition="sp4"/>
        <vers num="8.1" edition="sp5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0866" seq="2008-0866" published="2008-02-20" modified="2011-03-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in BEA WebLogic Workshop allow remote attackers to inject arbitrary web script or HTML via an invalid action URI, which is not properly handled by NetUI page flows.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BEA" url="http://dev2dev.bea.com/pub/advisory/258">BEA08-185.00</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019441">1019441</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0611">ADV-2008-0611</ref>
    </refs>
    <vuln_soft>
      <prod name="weblogic_workshop" vendor="bea">
        <vers num="8.1" edition="sp2"/>
        <vers num="8.1" edition="sp3"/>
        <vers num="8.1" edition="sp4"/>
        <vers num="8.1" edition="sp5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0867" seq="2008-0867" published="2008-02-20" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in portal/server.pt in BEA AquaLogic Interaction 6.1 through MP1 and Plumtree Foundation 6.0 through SP1 allows remote attackers to inject arbitrary web script or HTML via the name parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BEA" url="http://dev2dev.bea.com/pub/advisory/259">BEA08-186.00</ref>
      <ref source="MISC" url="http://www.procheckup.com/Vulnerability_PR06-12.php">http://www.procheckup.com/Vulnerability_PR06-12.php</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488346/100/100/threaded">20080219 PR06-12: XSS on BEA Plumtree Foundation and AquaLogic Interaction portals</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019440">1019440</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0610">ADV-2008-0610</ref>
    </refs>
    <vuln_soft>
      <prod name="aqualogic_interaction" vendor="bea_systems">
        <vers num="6.1" edition="mp1"/>
      </prod>
      <prod name="plumtree_foundation" vendor="bea_systems">
        <vers num="6.0" edition="sp1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0868" seq="2008-0868" published="2008-02-20" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Groupspace in BEA WebLogic Portal 10.0 and 9.2 through Maintenance Pack 1 allows remote authenticated users to inject arbitrary web script or HTML via unknown vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BEA" url="http://dev2dev.bea.com/pub/advisory/261">BEA08-188.00</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019452">1019452</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0613">ADV-2008-0613</ref>
    </refs>
    <vuln_soft>
      <prod name="weblogic_portal" vendor="bea_systems">
        <vers num="10.0"/>
      </prod>
      <prod name="weblogic_portal" vendor="oracle">
        <vers num="9.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0869" seq="2008-0869" published="2008-02-20" modified="2011-03-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in BEA WebLogic Workshop 8.1 through SP6 and Workshop for WebLogic 9.0 through 10.0 allows remote attackers to inject arbitrary web script or HTML via a "framework defined request parameter" when using WebLogic Workshop or Apache Beehive NetUI framework with page flows.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BEA" url="http://dev2dev.bea.com/pub/advisory/263">BEA08-189.00</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019438">1019438</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0611">ADV-2008-0611</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0612/references">ADV-2008-0612</ref>
    </refs>
    <vuln_soft>
      <prod name="weblogic_server" vendor="bea">
        <vers num="9.0"/>
        <vers num="9.1"/>
        <vers num="9.2"/>
      </prod>
      <prod name="weblogic_workshop" vendor="bea">
        <vers num="8.1" edition="sp2"/>
        <vers num="8.1" edition="sp3"/>
        <vers num="8.1" edition="sp4"/>
        <vers num="8.1" edition="sp5"/>
        <vers num="8.1" edition="sp6"/>
      </prod>
      <prod name="weblogic" vendor="bea_systems">
        <vers num="10.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0870" seq="2008-0870" published="2008-02-20" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">BEA WebLogic Portal 10.0 and 9.2 through Maintenance Pack 2, under certain circumstances, can redirect a user from the https:// URI for the Portal Administration Console to an http URI, which allows remote attackers to sniff the session.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BEA" url="http://dev2dev.bea.com/pub/advisory/264" patch="1">BEA08-190.00</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019442">1019442</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0613">ADV-2008-0613</ref>
    </refs>
    <vuln_soft>
      <prod name="weblogic_portal" vendor="bea_systems">
        <vers num="9.2" edition="mp1"/>
        <vers num="9.2" edition="mp2"/>
        <vers num="10.0"/>
      </prod>
      <prod name="weblogic_portal" vendor="oracle">
        <vers num="9.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0871" seq="2008-0871" published="2008-02-21" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple stack-based buffer overflows in Now SMS/MMS Gateway 2007.06.27 and earlier allow remote attackers to execute arbitrary code via a (1) long password in an Authorization header to the HTTP service or a (2) large packet to the SMPP service.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/nowsmsz-adv.txt">http://aluigi.altervista.org/adv/nowsmsz-adv.txt</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488365/100/100/threaded">20080219 Multiple buffer-overflow in NowSMS v2007.06.27</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27896">27896</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0615">ADV-2008-0615</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5695">5695</ref>
    </refs>
    <vuln_soft>
      <prod name="sms_mms_gateway" vendor="now">
        <vers num="2007.06.27" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0872" seq="2008-0872" published="2008-02-21" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in SmarterTools SmarterMail Enterprise 4.3 allows remote attackers to inject arbitrary web script or HTML via a STYLE attribute of an element in the Subject field of an e-mail message.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://es.geocities.com/jplopezy/SmarterMailXSS.txt">http://es.geocities.com/jplopezy/SmarterMailXSS.txt</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3686">3686</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488313/100/0/threaded">20080219 SmarterMail Enterprise 4.3 - malformed mail XSS</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27878">27878</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019461">1019461</ref>
    </refs>
    <vuln_soft>
      <prod name="smartermail_enterprise" vendor="smartertools">
        <vers num="4.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0873" seq="2008-0873" published="2008-02-21" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the jlmZone Classifieds module for XOOPS allows remote attackers to execute arbitrary SQL commands via the cid parameter in an Adsview action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3681">3681</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488357/100/0/threaded">20080219 XOOPS Module classifieds SQL Injection(cid)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27895">27895</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5158">5158</ref>
    </refs>
    <vuln_soft>
      <prod name="classifieds" vendor="jlmzone">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0874" seq="2008-0874" published="2008-02-21" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the eEmpregos module for XOOPS allows remote attackers to execute arbitrary SQL commands via the cid parameter in a view action.</descript>
      <descript source="nvd">Additional information was found while analyzing this vulnerability.

http://www.securityfocus.com/bid/27905</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3682">3682</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488358/100/0/threaded">20080219 XOOPS Module eEmpregos SQL Injection(cid)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27905">27905</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5157">5157</ref>
    </refs>
    <vuln_soft>
      <prod name="eempregos_module" vendor="xoops">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0875" seq="2008-0875" published="2008-02-21" modified="2011-03-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Hitachi EUR Print Manager, and related Client and Local Server products, 05-06 through 05-06-/B and 05-08 allows remote attackers to cause a denial of service (service hang or termination) via unspecified vectors related to "unexpected data."</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.hitachi-support.com/security_e/vuls_e/HS08-001_e/index-e.html">http://www.hitachi-support.com/security_e/vuls_e/HS08-001_e/index-e.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27899">27899</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0616">ADV-2008-0616</ref>
    </refs>
    <vuln_soft>
      <prod name="eur_print_manager" vendor="hitachi">
        <vers num="05-06"/>
        <vers num="05-06-_b"/>
        <vers num="05-08"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0876" seq="2008-0876" published="2008-02-21" modified="2011-03-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the SEWB3 messaging service in Hitachi SEWB3/PLATFORM and SEWB3/MI-PLATFORM 01-00 through 02-14-/A allows remote attackers to cause a denial of service (service outage) via "invalid data."</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.hitachi-support.com/security_e/vuls_e/HS08-002_e/index-e.html">http://www.hitachi-support.com/security_e/vuls_e/HS08-002_e/index-e.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27900">27900</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0617">ADV-2008-0617</ref>
    </refs>
    <vuln_soft>
      <prod name="sewb3_mi-platform" vendor="hitachi">
        <vers num="01-00" edition=":hi-ux_we2%283050_risc%29"/>
        <vers num="01-00" edition=":hi-ux_we2%283050_sisc%29"/>
        <vers num="01-00" edition=":hi-ux_we2%283050rx%29"/>
        <vers num="01-00" edition=":hp-ux%289.x%29"/>
        <vers num="01-04" edition=":solaris"/>
        <vers num="01-06-_a" edition=":hi-ux_we2%283050_risc%29"/>
        <vers num="01-06-_a" edition=":hi-ux_we2%283050_sisc%29"/>
        <vers num="01-07" edition=":hi-ux_we2%283050rx%29"/>
        <vers num="01-10" edition=":aix"/>
        <vers num="01-10-_a" edition=":hp-ux%289.x%29"/>
        <vers num="01-11" edition=":hp-ux%2810.x%29"/>
        <vers num="01-16-_b" edition=":hi-ux_we2%283050rx%29"/>
        <vers num="01-16-_b" edition=":hp-ux%2810.x%29"/>
        <vers num="01-16-_c" edition=":hp-ux%2811.x%29"/>
        <vers num="01-16-_f" edition=":hi-ux_we2%283050rx%29"/>
        <vers num="01-16-_f" edition=":hp-ux%2811.x%29"/>
        <vers num="01-17" edition=":hp-ux%2811.x%29"/>
        <vers num="01-17-_f" edition=":hp-ux%2811.x%29"/>
        <vers num="02-13" edition=":aix"/>
        <vers num="02-14-_a" edition=":solaris"/>
      </prod>
      <prod name="sewb3_platform" vendor="hitachi">
        <vers num="01-00" edition=":hi-ux_we2%283050_risc%29"/>
        <vers num="01-00" edition=":hi-ux_we2%283050_sisc%29"/>
        <vers num="01-00" edition=":hi-ux_we2%283050rx%29"/>
        <vers num="01-00" edition=":hp-ux%289.x%29"/>
        <vers num="01-04" edition=":solaris"/>
        <vers num="01-06" edition=":hi-ux_we2%283050rx%29"/>
        <vers num="01-06-_a" edition=":hi-ux_we2%283050_risc%29"/>
        <vers num="01-06-_a" edition=":hi-ux_we2%283050_sisc%29"/>
        <vers num="01-10" edition=":aix"/>
        <vers num="01-10-_a" edition=":hp-ux%289.x%29"/>
        <vers num="01-11" edition=":hp-ux%2810.x%29"/>
        <vers num="01-16-_b" edition=":hi-ux_we2%283050rx%29"/>
        <vers num="01-16-_b" edition=":hp-ux%2810.x%29"/>
        <vers num="01-16-_c" edition=":hp-ux%2811.x%29"/>
        <vers num="01-16-_f" edition=":hi-ux_we2%283050rx%29"/>
        <vers num="01-16-_f" edition=":hp-ux%2811.x%29"/>
        <vers num="01-17" edition=":hp-ux%2811.x%29"/>
        <vers num="01-17-_f" edition=":hp-ux%2811.x%29"/>
        <vers num="02-13" edition=":aix"/>
        <vers num="02-14-_a" edition=":solaris"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0877" seq="2008-0877" published="2008-02-21" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in Jinzora Media Jukebox 2.7.5 allow remote attackers to inject arbitrary web script or HTML via the (1) frontend, (2) set_frontend, (3) jz_path, (4) theme, and (5) set_theme parameters to (a) index.php; the frontend, theme, and (6) language parameters to (b) ajax_request.php; the jz_path parameter to (c) slim.php; the frontend, theme, and jz_path parameters to (d) popup.php; the (13) PATH_INFO to index.php and (e) slim.php; and the (14) query parameter in a playlistedit action and (15) siteNewsData parameter in a sitenews action to (f) popup.php.</descript>
      <descript source="nvd">During analysis additional information was found for this vulnerability.

http://www.securityfocus.com/bid/27876/info</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3683">3683</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488326/100/0/threaded">20080219 [DSECRG-08-016] Jinzora 2.7.5 Multiple XSS</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27876">27876</ref>
    </refs>
    <vuln_soft>
      <prod name="media_jukebox" vendor="jinzora">
        <vers num="2.7.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0878" seq="2008-0878" published="2008-02-21" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the MyAnnonces 1.7 and earlier module for RunCMS allows remote attackers to execute arbitrary SQL commands via the cid parameter in a view action.</descript>
      <descript source="nvd">Additional information is available at the following securityfocus bid link: http://www.securityfocus.com/bid/27902/info</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27902">27902</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0619">ADV-2008-0619</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40861">myannonces-index-sql-injection(40861)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5156">5156</ref>
    </refs>
    <vuln_soft>
      <prod name="myannonces" vendor="runcms">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0879" seq="2008-0879" published="2008-02-21" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in modules.php in the Web_Links module for PHP-Nuke allows remote attackers to execute arbitrary SQL commands via the cid parameter in a viewlink action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://packetstormsecurity.com/files/126697/PHP-Nuke-Web-Links-SQL-Injection.html">http://packetstormsecurity.com/files/126697/PHP-Nuke-Web-Links-SQL-Injection.html</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3684">3684</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488356/100/0/threaded">20080219 PHP-Nuke Module Web_Links SQL Injection(cid)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27894">27894</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/67463">67463</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40862">weblinks-cid-sql-injection(40862)</ref>
    </refs>
    <vuln_soft>
      <prod name="web_links_module" vendor="phpnuke">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0880" seq="2008-0880" published="2008-02-21" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in modules.php in the EasyContent module for PHP-Nuke allows remote attackers to execute arbitrary SQL commands via the page_id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27897">27897</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5155">5155</ref>
    </refs>
    <vuln_soft>
      <prod name="easycontent_module" vendor="phpnuke">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0881" seq="2008-0881" published="2008-02-21" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in modules.php in the Okul 1.0 module for PHP-Nuke allows remote attackers to execute arbitrary SQL commands via the okulid parameter in an okullar action.</descript>
      <descript source="nvd">More information is available at the following securityfocus bid link: http://www.securityfocus.com/bid/27909/info</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27909">27909</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5159">5159</ref>
    </refs>
    <vuln_soft>
      <prod name="okul_module" vendor="phpnuke">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0882" seq="2008-0882" published="2008-02-21" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Double free vulnerability in the process_browse_data function in CUPS 1.3.5 allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via crafted UDP Browse packets to the cupsd port (631/udp), related to an unspecified manipulation of a remote printer.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307562">http://docs.info.apple.com/article.html?artnum=307562</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html">APPLE-SA-2008-03-18</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00000.html">SUSE-SA:2008:012</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200804-01.xml">GLSA-200804-01</ref>
      <ref source="CONFIRM" url="http://www.cups.org/str.php?L2656">http://www.cups.org/str.php?L2656</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1530">DSA-1530</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:050">MDVSA-2008:050</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:051">MDVSA-2008:051</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0157.html">RHSA-2008:0157</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27906">27906</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019473">1019473</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-598-1">USN-598-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0623">ADV-2008-0623</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0924/references">ADV-2008-0924</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=433758">https://bugzilla.redhat.com/show_bug.cgi?id=433758</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9625">oval:org.mitre.oval:def:9625</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00792.html">FEDORA-2008-1901</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00832.html">FEDORA-2008-1976</ref>
    </refs>
    <vuln_soft>
      <prod name="cups" vendor="cups">
        <vers num="1.3.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0883" seq="2008-0883" published="2008-03-05" modified="2017-08-07" severity="Low" CVSS_version="2.0" CVSS_score="3.7" CVSS_base_score="3.7" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="1.9" CVSS_vector="(AV:L/AC:H/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">acroread in Adobe Acrobat Reader 8.1.2 allows local users to overwrite arbitrary files via a symlink attack on temporary files related to SSL certificate handling.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html">SUSE-SR:2008:005</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-240106-1">240106</ref>
      <ref source="CONFIRM" url="http://support.novell.com/techcenter/psdb/d8c48c63359fc807624182696d3d149c.html" patch="1">http://support.novell.com/techcenter/psdb/d8c48c63359fc807624182696d3d149c.html</ref>
      <ref source="CONFIRM" url="http://www.adobe.com/support/security/advisories/apsa08-02.html">http://www.adobe.com/support/security/advisories/apsa08-02.html</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200803-26.xml">GLSA-200803-26</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0641.html">RHSA-2008:0641</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28091">28091</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019539">1019539</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0765/references">ADV-2008-0765</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2289">ADV-2008-2289</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40987">adobe-reader-acroread-symlink(40987)</ref>
    </refs>
    <vuln_soft>
      <prod name="acrobat_reader" vendor="adobe">
        <vers num="8.1.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0884" seq="2008-0884" published="2008-04-03" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.9" CVSS_base_score="6.9" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The Replace function in the capp-lspp-config script in the (1) lspp-eal4-config-ibm and (2) capp-lspp-eal4-config-hp packages before 0.65-2 in Red Hat Enterprise Linux (RHEL) 5 uses lstat instead of stat to determine the /etc/pam.d/system-auth file permissions, leading to a change to world-writable permissions for the /etc/pam.d/system-auth-ac file, which allows local users to gain privileges by modifying this file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2008-0193.html">RHSA-2008:0193</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019740">1019740</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28557">28557</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=435442">https://bugzilla.redhat.com/show_bug.cgi?id=435442</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41584">redhat-lsppeal4config-insecure-permissions(41584)</ref>
    </refs>
    <vuln_soft>
      <prod name="enterprise_linux" vendor="red_hat">
        <vers num="5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0886" seq="2008-0886" published="2008-02-29" modified="2008-09-10" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2008-0882.  Reason: This candidate is a duplicate of CVE-2008-0882.  Notes: All CVE users should reference CVE-2008-0882 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2008-0887" seq="2008-0887" published="2008-04-06" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.7" CVSS_base_score="4.7" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">gnome-screensaver before 2.22.1, when a remote authentication server is enabled, crashes upon an unlock attempt during a network outage, which allows physically proximate attackers to gain access to the locked session, a related issue to CVE-2007-1859.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html">SUSE-SR:2008:014</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2008-0197.html">RHSA-2008:0197</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200804-12.xml">GLSA-200804-12</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019749">1019749</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:132">MDVSA-2008:132</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0218.html">RHSA-2008:0218</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28575">28575</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/USN-669-1">USN-669-1</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=435773">https://bugzilla.redhat.com/show_bug.cgi?id=435773</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10813">oval:org.mitre.oval:def:10813</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00163.html">FEDORA-2008-2967</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00206.html">FEDORA-2008-3017</ref>
    </refs>
    <vuln_soft>
      <prod name="screensaver" vendor="gnome">
        <vers num="2.20.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0888" seq="2008-0888" published="2008-03-17" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The NEEDBITS macro in the inflate_dynamic function in inflate.c for unzip can be invoked using invalid buffers, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors that trigger a free of uninitialized or previously-freed data.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html">APPLE-SA-2010-03-29-1</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00008.html">SUSE-SR:2008:007</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200804-06.xml">GLSA-200804-06</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT4077">http://support.apple.com/kb/HT4077</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0116">http://wiki.rpath.com/Advisories:rPSA-2008-0116</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0116">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0116</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1522">DSA-1522</ref>
      <ref source="CONFIRM" url="http://www.ipcop.org/index.php?name=News&amp;file=article&amp;sid=40">http://www.ipcop.org/index.php?name=News&amp;file=article&amp;sid=40</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:068">MDVSA-2008:068</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0196.html" adv="1">RHSA-2008:0196</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489967/100/0/threaded">20080321 rPSA-2008-0116-1 unzip</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493080/100/0/threaded">20080604 VMSA-2008-0009 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Fusion, VMware Server, VMware VIX API, VMware ESX, VMware ESXi resolve critical security issues</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28288">28288</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019634">1019634</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-589-1">USN-589-1</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2008-0009.html">http://www.vmware.com/security/advisories/VMSA-2008-0009.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0913/references" adv="1">ADV-2008-0913</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1744" adv="1">ADV-2008-1744</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41246">unzip-inflatedynamic-code-execution(41246)</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2317">https://issues.rpath.com/browse/RPL-2317</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9733">oval:org.mitre.oval:def:9733</ref>
    </refs>
    <vuln_soft>
      <prod name="unzip" vendor="info-zip">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0889" seq="2008-0889" published="2008-03-19" modified="2008-09-05" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Red Hat Directory Server 8.0, when running on Red Hat Enterprise Linux, uses insecure permissions for the redhat-idm-console script, which allows local users to execute arbitrary code by modifying the script.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0191.html" patch="1">RHSA-2008:0191</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28327">28327</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019677">1019677</ref>
    </refs>
    <vuln_soft>
      <prod name="directory_server" vendor="redhat">
        <vers num="8.0" edition="el4"/>
        <vers num="8.0" edition="el5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0890" seq="2008-0890" published="2008-03-11" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Red Hat Directory Server 7.1 before SP4 uses insecure permissions for certain directories, which allows local users to modify JAR files and execute arbitrary code via unknown vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0173.html">RHSA-2008:0173</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28204">28204</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019577">1019577</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41152">rhds-jars-insecure-permissions(41152)</ref>
    </refs>
    <vuln_soft>
      <prod name="directory_server" vendor="redhat">
        <vers num="7.1" prev="1" edition="sp3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0891" seq="2008-0891" published="2008-05-29" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Double free vulnerability in OpenSSL 0.9.8f and 0.9.8g, when the TLS server name extensions are enabled, allows remote attackers to cause a denial of service (crash) via a malformed Client Hello packet.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://cert.fi/haavoittuvuudet/2008/advisory-openssl.html">http://cert.fi/haavoittuvuudet/2008/advisory-openssl.html</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200806-08.xml">GLSA-200806-08</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.562004">SSA:2008-210-08</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=615606">http://sourceforge.net/project/shownotes.php?release_id=615606</ref>
      <ref source="MISC" url="http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&amp;id=738400">http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&amp;id=738400</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/661475">VU#661475</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:107">MDVSA-2008:107</ref>
      <ref source="CONFIRM" url="http://www.openssl.org/news/secadv_20080528.txt">http://www.openssl.org/news/secadv_20080528.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29405" patch="1">29405</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020121">1020121</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-620-1">USN-620-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1680">ADV-2008-1680</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1937/references">ADV-2008-1937</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42666">openssl-servername-dos(42666)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg01029.html">FEDORA-2008-4723</ref>
    </refs>
    <vuln_soft>
      <prod name="openssl" vendor="openssl">
        <vers num="0.9.8f"/>
        <vers num="0.9.8g"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0892" seq="2008-0892" published="2008-04-16" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="9.0" CVSS_base_score="9.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The replication monitor CGI script (repl-monitor-cgi.pl) in Red Hat Administration Server, as used by Red Hat Directory Server 8.0 EL4 and EL5, allows remote attackers to execute arbitrary commands.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01433676">HPSBUX02324</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0199.html">RHSA-2008:0199</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0201.html">RHSA-2008:0201</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28802">28802</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019856">1019856</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1449/references">ADV-2008-1449</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=437301">https://bugzilla.redhat.com/show_bug.cgi?id=437301</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41840">rhds-replmonitor-command-execution(41840)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00380.html">FEDORA-2008-3214</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00386.html">FEDORA-2008-3220</ref>
    </refs>
    <vuln_soft>
      <prod name="directory_server" vendor="redhat">
        <vers num="7.1"/>
      </prod>
      <prod name="directory_server" vendor="red_hat">
        <vers num="8" edition="el4"/>
        <vers num="8" edition="el5"/>
      </prod>
      <prod name="fedora_directory_server" vendor="redhat">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0893" seq="2008-0893" published="2008-04-16" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Red Hat Administration Server, as used by Red Hat Directory Server 8.0 EL4 and EL5, does not properly restrict access to CGI scripts, which allows remote attackers to perform administrative actions.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0201.html" patch="1">RHSA-2008:0201</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28802">28802</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019857">1019857</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=437320">https://bugzilla.redhat.com/show_bug.cgi?id=437320</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41843">rhds-cgiscripts-security-bypass(41843)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00380.html">FEDORA-2008-3214</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00386.html">FEDORA-2008-3220</ref>
    </refs>
    <vuln_soft>
      <prod name="directory_server" vendor="redhat">
        <vers num="8.0" edition="el4"/>
        <vers num="8.0" edition="el5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0894" seq="2008-0894" published="2008-02-21" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Apple Safari might allow remote attackers to obtain potentially sensitive memory contents or cause a denial of service (crash) via a crafted (1) bitmap (BMP) or (2) GIF file, a related issue to CVE-2008-0420.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3685">3685</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488264/100/0/threaded">20080216 [HISPASEC] FireFox 2.0.0.11 and Opera 9.50 beta Remote Memory Information Leak, FireFox 2.0.0.11 Remote Denial of Service</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27947">27947</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019487">1019487</ref>
      <ref source="MISC" url="https://bugzilla.mozilla.org/show_bug.cgi?id=408076">https://bugzilla.mozilla.org/show_bug.cgi?id=408076</ref>
    </refs>
    <vuln_soft>
      <prod name="safari" vendor="apple">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0895" seq="2008-0895" published="2008-02-22" modified="2011-03-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">BEA WebLogic Server and WebLogic Express 6.1 through 10.0 allows remote attackers to bypass authentication for application servlets via crafted request headers.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BEA" url="http://dev2dev.bea.com/pub/advisory/265" patch="1">BEA08-191.00</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019443">1019443</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0612/references">ADV-2008-0612</ref>
    </refs>
    <vuln_soft>
      <prod name="weblogic_server" vendor="bea">
        <vers num="6.1" edition="sp1"/>
        <vers num="6.1" edition="sp2"/>
        <vers num="6.1" edition="sp3"/>
        <vers num="6.1" edition="sp4"/>
        <vers num="6.1" edition="sp5"/>
        <vers num="6.1" edition="sp6"/>
        <vers num="6.1" edition="sp7"/>
        <vers num="7.0" edition="sp1"/>
        <vers num="7.0" edition="sp2"/>
        <vers num="7.0" edition="sp3"/>
        <vers num="7.0" edition="sp4"/>
        <vers num="7.0" edition="sp5"/>
        <vers num="7.0" edition="sp6"/>
        <vers num="7.0" edition="sp7"/>
        <vers num="8.1" edition="sp1"/>
        <vers num="8.1" edition="sp2"/>
        <vers num="8.1" edition="sp3"/>
        <vers num="8.1" edition="sp4"/>
        <vers num="8.1" edition="sp5"/>
        <vers num="8.1" edition="sp6"/>
        <vers num="9.0"/>
        <vers num="9.1"/>
        <vers num="9.2"/>
        <vers num="10.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0896" seq="2008-0896" published="2008-02-22" modified="2011-03-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.9" CVSS_base_score="4.9" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="6.8" CVSS_vector="(AV:N/AC:M/Au:S/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">BEA WebLogic Portal 10.0 and 9.2 through MP1, when an administrator deletes a single instance of a content portlet, removes entitlement policies for other content portlets, which allows attackers to bypass intended access restrictions.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BEA" url="http://dev2dev.bea.com/pub/advisory/266" patch="1">BEA08-192.00</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019453">1019453</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0613">ADV-2008-0613</ref>
    </refs>
    <vuln_soft>
      <prod name="weblogic_portal" vendor="bea_systems">
        <vers num="9.2" edition="mp1"/>
        <vers num="10.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0897" seq="2008-0897" published="2008-02-22" modified="2011-03-07" severity="High" CVSS_version="2.0" CVSS_score="7.9" CVSS_base_score="7.9" CVSS_impact_subscore="9.2" CVSS_exploit_subscore="6.8" CVSS_vector="(AV:N/AC:M/Au:S/C:C/I:C/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in BEA WebLogic Server 9.0 through 10.0 allows remote authenticated users without "receive" permissions to bypass intended access restrictions and receive messages from a standalone JMS Topic or secured Distributed Topic member destination, related to durable subscriptions.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BEA" url="http://dev2dev.bea.com/pub/advisory/267" patch="1">BEA08-193.00</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019444">1019444</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0612/references">ADV-2008-0612</ref>
    </refs>
    <vuln_soft>
      <prod name="weblogic_server" vendor="bea">
        <vers num="9.0"/>
        <vers num="9.1"/>
        <vers num="9.2" edition="mp1"/>
        <vers num="10.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0898" seq="2008-0898" published="2008-02-22" modified="2011-03-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.8" CVSS_base_score="5.8" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">The distributed queue feature in JMS in BEA WebLogic Server 9.0 through 10.0, in certain configurations, does not properly handle when a client cannot send a message to a member of a distributed queue, which allows remote authenticated users to bypass intended access restrictions for protected distributed queues.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BEA" url="http://dev2dev.bea.com/pub/advisory/268" patch="1">BEA08-194.00</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019447">1019447</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0612/references">ADV-2008-0612</ref>
    </refs>
    <vuln_soft>
      <prod name="weblogic_server" vendor="bea">
        <vers num="9.0" edition="ga"/>
        <vers num="9.0" edition="sp1"/>
        <vers num="9.0" edition="sp2"/>
        <vers num="9.0" edition="sp3"/>
        <vers num="9.0" edition="sp4"/>
        <vers num="9.0" edition="sp5"/>
        <vers num="9.1" edition="ga"/>
        <vers num="9.2" edition="mp1"/>
        <vers num="9.2" edition="mp2"/>
        <vers num="10.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0899" seq="2008-0899" published="2008-02-22" modified="2011-03-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the Administration Console in BEA WebLogic Server and Express 9.0 through 10.0 allows remote attackers to inject arbitrary web script or HTML via URLs that are not properly handled by the Unexpected Exception Page.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BEA" url="http://dev2dev.bea.com/pub/advisory/269" patch="1">BEA08-195.00</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019448">1019448</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0612/references">ADV-2008-0612</ref>
    </refs>
    <vuln_soft>
      <prod name="weblogic_server" vendor="bea">
        <vers num="9.0"/>
        <vers num="9.1"/>
        <vers num="9.2" edition="mp1"/>
        <vers num="10.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0900" seq="2008-0900" published="2008-02-22" modified="2011-03-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.0" CVSS_base_score="6.0" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="6.8" CVSS_vector="(AV:N/AC:M/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Session fixation vulnerability in BEA WebLogic Server and Express 8.1 SP4 through SP6, 9.2 through MP1, and 10.0 allows remote authenticated users to hijack web sessions via unknown vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BEA" url="http://dev2dev.bea.com/pub/advisory/270" patch="1">BEA08-196.00</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019439">1019439</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0612/references">ADV-2008-0612</ref>
    </refs>
    <vuln_soft>
      <prod name="weblogic_server" vendor="bea">
        <vers num="8.1" edition="sp4:express"/>
        <vers num="8.1" edition="sp5:express"/>
        <vers num="8.1" edition="sp6:express"/>
        <vers num="9.2" edition="mp1"/>
        <vers num="10.0"/>
      </prod>
      <prod name="weblogic_express" vendor="bea_systems">
        <vers num="9.2" edition="mp1"/>
        <vers num="10.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0901" seq="2008-0901" published="2008-02-22" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.1" CVSS_base_score="7.1" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:N/A:N)">
    <desc>
      <descript source="cve">BEA WebLogic Server and Express 7.0 through 10.0 allows remote attackers to conduct brute force password guessing attacks, even when account lockout has been activated, via crafted URLs that indicate whether a guessed password is successful or not.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BEA" url="http://dev2dev.bea.com/pub/advisory/271" patch="1">BEA08-197.00</ref>
      <ref source="MISC" url="http://www.s21sec.com/avisos/s21sec-040-en.txt">http://www.s21sec.com/avisos/s21sec-040-en.txt</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488686/100/0/threaded">20080225 S21SEC-040-en: Infinite invalid authentication attempts possible in BEA WebLogic Server</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019449">1019449</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0612/references">ADV-2008-0612</ref>
    </refs>
    <vuln_soft>
      <prod name="weblogic_server" vendor="bea">
        <vers num="7.0" edition="sp1"/>
        <vers num="7.0" edition="sp2"/>
        <vers num="7.0" edition="sp3"/>
        <vers num="7.0" edition="sp4"/>
        <vers num="7.0" edition="sp5"/>
        <vers num="7.0" edition="sp6"/>
        <vers num="7.0" edition="sp7"/>
        <vers num="8.1" edition="sp1"/>
        <vers num="8.1" edition="sp2"/>
        <vers num="8.1" edition="sp3"/>
        <vers num="8.1" edition="sp4"/>
        <vers num="8.1" edition="sp5"/>
        <vers num="8.1" edition="sp6"/>
        <vers num="9.0"/>
        <vers num="9.1"/>
        <vers num="9.2" edition="mp1"/>
        <vers num="9.2" edition="mp2"/>
        <vers num="10.0"/>
      </prod>
      <prod name="weblogic_server" vendor="bea_systems">
        <vers num="10.0_mp1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0902" seq="2008-0902" published="2008-02-22" modified="2011-03-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in BEA WebLogic Server and Express 6.1 through 10.0 MP1 allow remote attackers to inject arbitrary web script or HTML via unspecified samples.  NOTE: this might be the same issue as CVE-2007-2694.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BEA" url="http://dev2dev.bea.com/pub/advisory/273" patch="1">BEA08-80.04</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0612/references">ADV-2008-0612</ref>
    </refs>
    <vuln_soft>
      <prod name="weblogic_server" vendor="bea">
        <vers num="6.1" edition="sp1"/>
        <vers num="6.1" edition="sp2"/>
        <vers num="6.1" edition="sp3"/>
        <vers num="6.1" edition="sp4"/>
        <vers num="6.1" edition="sp5"/>
        <vers num="6.1" edition="sp6"/>
        <vers num="6.1" edition="sp7"/>
        <vers num="7.0" edition="sp1"/>
        <vers num="7.0" edition="sp2"/>
        <vers num="7.0" edition="sp3"/>
        <vers num="7.0" edition="sp4"/>
        <vers num="7.0" edition="sp5"/>
        <vers num="7.0" edition="sp6"/>
        <vers num="7.0" edition="sp7"/>
        <vers num="8.1" edition="sp1"/>
        <vers num="8.1" edition="sp2"/>
        <vers num="8.1" edition="sp3"/>
        <vers num="8.1" edition="sp4"/>
        <vers num="8.1" edition="sp5"/>
        <vers num="8.1" edition="sp6"/>
        <vers num="9.0" edition="ga"/>
        <vers num="9.1" edition="ga"/>
        <vers num="10.0"/>
      </prod>
      <prod name="weblogic_server" vendor="bea_systems">
        <vers num="10.0_mp1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0903" seq="2008-0903" published="2008-02-22" modified="2011-03-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the BEA WebLogic Server and Express proxy plugin, as distributed before November 2007 and before 9.2 MP3 and 10.0 MP2, allows remote attackers to cause a denial of service (web server crash) via a crafted URL.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BEA" url="http://dev2dev.bea.com/pub/advisory/275" patch="1">BEA08-199.00</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019450">1019450</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0608/references">ADV-2008-0608</ref>
    </refs>
    <vuln_soft>
      <prod name="weblogic_express" vendor="bea_systems">
        <vers num="10.0" prev="1" edition="mp2"/>
      </prod>
      <prod name="weblogic_server" vendor="bea_systems">
        <vers num="10.0" prev="1" edition="mp2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0904" seq="2008-0904" published="2008-02-22" modified="2011-03-07" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:N/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the download servlet in BEA Plumtree Collaboration 4.1 through SP2 and AquaLogic Interaction 4.2 through MP1 allows remote attackers to read arbitrary files via a crafted URL.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BEA" url="http://dev2dev.bea.com/pub/advisory/276" patch="1">BEA08-200.00</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019437">1019437</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0607/references">ADV-2008-0607</ref>
    </refs>
    <vuln_soft>
      <prod name="aqualogic_interaction" vendor="bea_systems">
        <vers num="4.2"/>
        <vers num="4.2_mp1"/>
      </prod>
      <prod name="plumtree_collaboration" vendor="bea_systems">
        <vers num="4.1"/>
        <vers num="4.1_sp1"/>
        <vers num="4.1_sp2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0905" seq="2008-0905" published="2008-02-22" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in globsy_edit.php in Globsy 1.0 allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27910">27910</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5162">5162</ref>
    </refs>
    <vuln_soft>
      <prod name="globsy" vendor="meo">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0906" seq="2008-0906" published="2008-02-22" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the Docum module in PHP-Nuke allows remote attackers to execute arbitrary SQL commands via the artid parameter in a viewarticle operation.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27912">27912</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40720">docum-modules-sql-injection(40720)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5161">5161</ref>
    </refs>
    <vuln_soft>
      <prod name="php-nuke_module_docum" vendor="php-nuke">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0907" seq="2008-0907" published="2008-02-22" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the Inhalt module for PHP-Nuke allows remote attackers to execute arbitrary SQL commands via the cid parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27886">27886</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5163">5163</ref>
    </refs>
    <vuln_soft>
      <prod name="inhalt_module" vendor="php-nuke">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0908" seq="2008-0908" published="2008-02-22" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in browse.asp in Schoolwires Academic Portal allows remote attackers to execute arbitrary SQL commands via the c parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27903">27903</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40687">schoolwires-browse-sql-injection(40687)</ref>
    </refs>
    <vuln_soft>
      <prod name="academic_portal" vendor="schoolwires">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0909" seq="2008-0909" published="2008-02-22" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in browse.asp in Schoolwires Academic Portal allows remote attackers to inject arbitrary web script or HTML via the c parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27903">27903</ref>
    </refs>
    <vuln_soft>
      <prod name="academic_portal" vendor="schoolwires">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0910" seq="2008-0910" published="2008-02-22" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple F-Secure anti-virus products, including Internet Security 2006 through 2008, Anti-Virus 2006 through 2008, F-Secure Protection Service, and others, allow remote attackers to bypass malware detection via a crafted RAR archive.  NOTE: this might be related to CVE-2008-0792.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.f-secure.com/security/fsc-2008-1.shtml" patch="1">http://www.f-secure.com/security/fsc-2008-1.shtml</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019405">1019405</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019412">1019412</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019413">1019413</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0544/references">ADV-2008-0544</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40480">fsecure-cab-rar-security-bypass(40480)</ref>
    </refs>
    <vuln_soft>
      <prod name="f-secure_anti-virus" vendor="f-secure">
        <vers num="2006"/>
        <vers num="2007" edition="second_edition"/>
        <vers num="2008"/>
      </prod>
      <prod name="f-secure_anti-virus_client_security" vendor="f-secure">
        <vers num="6.03"/>
        <vers num="6.04"/>
        <vers num="7.01"/>
        <vers num="7.10"/>
      </prod>
      <prod name="f-secure_anti-virus_for_linux" vendor="f-secure">
        <vers num="4.65"/>
      </prod>
      <prod name="f-secure_anti-virus_for_workstations" vendor="f-secure">
        <vers num="5.44"/>
        <vers num="7.00"/>
        <vers num="7.10"/>
      </prod>
      <prod name="f-secure_anti-virus_linux_client_security" vendor="f-secure">
        <vers num="5.52"/>
        <vers num="5.53"/>
      </prod>
      <prod name="f-secure_internet_security" vendor="f-secure">
        <vers num="2006"/>
        <vers num="2007" edition="second_edition"/>
        <vers num="2008"/>
      </prod>
      <prod name="f-secure_protection_service_for_business" vendor="f-secure">
        <vers num="3.00" prev="1"/>
      </prod>
      <prod name="f-secure_protection_service_for_consumers" vendor="f-secure">
        <vers num="7.00" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0911" seq="2008-0911" published="2008-02-22" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in productdetails.php in iScripts MultiCart 2.0 allows remote authenticated users to execute arbitrary SQL commands via the productid parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27916">27916</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5166">5166</ref>
    </refs>
    <vuln_soft>
      <prod name="multicart" vendor="iscripts">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0912" seq="2008-0912" published="2008-02-22" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple heap-based buffer overflows in mlsrv10.exe in Sybase MobiLink 10.0.1.3629 and earlier, as used by SQL Anywhere Developer Edition 10.0.1.3415 and probably other products, allow remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a long (1) username, (2) version, or (3) remote ID.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/mobilinkhof-adv.txt">http://aluigi.altervista.org/adv/mobilinkhof-adv.txt</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3691">3691</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488409/100/0/threaded">20080220 Heap overflow in Sybase MobiLink 10.0.1.3629</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490259/100/0/threaded">20080328 Re: Heap overflow in Sybase MobiLink 10.0.1.3629</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27914">27914</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019469">1019469</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0626">ADV-2008-0626</ref>
    </refs>
    <vuln_soft>
      <prod name="mobilink" vendor="sybase">
        <vers num="10.0.1.3629" prev="1"/>
      </prod>
      <prod name="sql_anywhere" vendor="sybase">
        <vers num="10.0.1.3415" edition=":developer_edition"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0913" seq="2008-0913" published="2008-02-22" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Invision Power Board (IPB or IP.Board) 2.3.4 allows remote attackers to inject arbitrary web script or HTML via crafted BBCodes in an unspecified context.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://forums.invisionpower.com/index.php?showtopic=269961" patch="1">http://forums.invisionpower.com/index.php?showtopic=269961</ref>
    </refs>
    <vuln_soft>
      <prod name="invision_power_board" vendor="invision_power_services">
        <vers num="2.3.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0914" seq="2008-0914" published="2008-02-22" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in the Mediation server in IPdiva SSL VPN Server 2.2 before 2.2.8.84 and 2.3 before 2.3.2.14 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2008-February/060315.html">20080214 DOINGSOFT-2008-02-11-002 IP Diva VPN SSL many XSS attacks</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3690">3690</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488143/100/100/threaded">20080214 DOINGSOFT-2008-02-11-002 IP Diva VPN SSL many XSS attacks</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488204/100/0/threaded">20080214 Re: DOINGSOFT-2008-02-11-002 IP Diva VPN SSL many XSS attacks</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27800">27800</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40545">ipdivaserver-unspecified-xss(40545)</ref>
    </refs>
    <vuln_soft>
      <prod name="ipdiva" vendor="ipdiva">
        <vers num="2.2"/>
        <vers num="2.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0915" seq="2008-0915" published="2008-02-22" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">The Mediation server in IPdiva SSL VPN Server 2.2 before 2.2.8.84 and 2.3 before 2.3.2.14 stores the number of remaining allowed login attempts in a cookie, which makes it easier for remote attackers to conduct brute force attacks by manipulating this cookie's value.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2008-February/060314.html">20080214 DOINGSOFT-2008-02-11 - IPDiva VPN SSL Brute force attack</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3692">3692</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488133/100/100/threaded">20080214 DOINGSOFT-2008-02-11 - IPDiva VPN SSL Brute force attack</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27800">27800</ref>
    </refs>
    <vuln_soft>
      <prod name="ipdiva" vendor="ipdiva">
        <vers num="2.2.8" prev="1"/>
        <vers num="2.3.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0916" seq="2008-0916" published="2008-02-22" modified="2017-10-18" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the Highwood Design hwdVideoShare (com_hwdvideoshare) 1.1.3 Alpha component for Joomla!  allows remote attackers to execute arbitrary SQL commands via the cat_id parameter in a viewcategory action to index.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27907">27907</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40711">hwdvideoshare-index-sql-injection(40711)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5160">5160</ref>
    </refs>
    <vuln_soft>
      <prod name="hwdvideoshare" vendor="highwood_design">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0917" seq="2008-0917" published="2008-02-22" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Tor World Tor Search 1.1 and earlier, I-Navigator 4.0, Mobile Frontier 2.1 and earlier, Diary.cgi (aka Quotes of the Day) 1.5 and earlier, Tor News 1.21 and earlier, Simple BBS 1.3 and earlier, Interactive BBS 1.3 and earlier, Tor Board 1.1 and earlier, Simple Vote 1.1 and earlier, and Com Vote 1.2 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://download.torworld.com/bug/20080221.html">http://download.torworld.com/bug/20080221.html</ref>
      <ref source="JVN" url="http://jvn.jp/jp/JVN%2354593414/index.html">JVN#54593414</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27919">27919</ref>
    </refs>
    <vuln_soft>
      <prod name="com_vote" vendor="tor_world">
        <vers num="1.2"/>
      </prod>
      <prod name="i-navigator" vendor="tor_world">
        <vers num="4.0"/>
      </prod>
      <prod name="interactive_bbs" vendor="tor_world">
        <vers num="1.3"/>
      </prod>
      <prod name="mobile_frontier" vendor="tor_world">
        <vers num="2.1"/>
      </prod>
      <prod name="quotes_of_the_day" vendor="tor_world">
        <vers num="1.5"/>
      </prod>
      <prod name="simple_bbs" vendor="tor_world">
        <vers num="1.3"/>
      </prod>
      <prod name="simple_vote" vendor="tor_world">
        <vers num="1.1"/>
      </prod>
      <prod name="tor_board" vendor="tor_world">
        <vers num="1.1"/>
      </prod>
      <prod name="tor_news" vendor="tor_world">
        <vers num="1.21"/>
      </prod>
      <prod name="tor_search" vendor="tor_world">
        <vers num="1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0918" seq="2008-0918" published="2008-02-22" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in includes/count_dl_or_link.inc.php in the astatsPRO (com_astatspro) 1.0.1 component for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter to getfile.php, a different vector than CVE-2008-0839. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40852">astatspro-countdlorlink-sql-injection(40852)</ref>
    </refs>
    <vuln_soft>
      <prod name="astatspro" vendor="astats">
        <vers num="1.0.1"/>
      </prod>
      <prod name="com_astatspro" vendor="joomla">
        <vers num="1.0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0919" seq="2008-0919" published="2008-02-22" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in session/login.php in Open Source Security Information Management (OSSIM) 0.9.9 rc5 and earlier allows remote attackers to inject arbitrary web script or HTML via the dest parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3689">3689</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488450/100/0/threaded">20080221 SQL-injection, XSS in OSSIM (Open Source Security Information Management)</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488617/100/0/threaded">20080222 Re: SQL-injection, XSS in OSSIM (Open Source Security Information Management)</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488697/100/0/threaded">20080225 Re: Re: SQL-injection, XSS in OSSIM (Open Source Security Information Management)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27929" patch="1">27929</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5171">5171</ref>
    </refs>
    <vuln_soft>
      <prod name="os-sim" vendor="open_source_security_information_management">
        <vers num="0.1alpha"/>
        <vers num="0.2alpha"/>
        <vers num="0.3.1alpha"/>
        <vers num="0.3alpha"/>
        <vers num="0.5.1"/>
        <vers num="0.5.2"/>
        <vers num="0.6"/>
        <vers num="0.6.2"/>
        <vers num="0.6.3"/>
        <vers num="0.7"/>
        <vers num="0.7.1"/>
        <vers num="0.8"/>
        <vers num="0.9"/>
        <vers num="0.9.1"/>
        <vers num="0.9.2"/>
        <vers num="0.9.3"/>
        <vers num="0.9.4"/>
        <vers num="0.9.5"/>
        <vers num="0.9.6"/>
        <vers num="0.9.7"/>
        <vers num="0.9.8"/>
        <vers num="0.9.9_rc1"/>
        <vers num="0.9.9_rc2"/>
        <vers num="0.9.9_rc3"/>
        <vers num="0.9.9_rc4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0920" seq="2008-0920" published="2008-02-22" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in port/modifyportform.php in Open Source Security Information Management (OSSIM) 0.9.9 rc5 allows remote authenticated users to execute arbitrary SQL commands via the portname parameter, which is not properly handled by a validation regular expression.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3689">3689</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488450/100/0/threaded">20080221 SQL-injection, XSS in OSSIM (Open Source Security Information Management)</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488617/100/0/threaded">20080222 Re: SQL-injection, XSS in OSSIM (Open Source Security Information Management)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27927">27927</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5171">5171</ref>
    </refs>
    <vuln_soft>
      <prod name="os-sim" vendor="open_source_security_information_management">
        <vers num="0.9.9" prev="1" edition="rc5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0921" seq="2008-0921" published="2008-02-22" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in news.php in beContent 0.3.1 allows remote attackers to execute arbitrary SQL commands via the id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27928">27928</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5170">5170</ref>
    </refs>
    <vuln_soft>
      <prod name="becontent" vendor="becontent">
        <vers num="0.3.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0922" seq="2008-0922" published="2008-02-22" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the Manuales 0.1 module for PHP-Nuke allows remote attackers to execute arbitrary SQL commands via the cid parameter in a viewdownload action to modules.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27933">27933</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5168">5168</ref>
    </refs>
    <vuln_soft>
      <prod name="manuales" vendor="php-nuke">
        <vers num="0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0923" seq="2008-0923" published="2008-02-25" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="6.9" CVSS_base_score="6.9" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in the Shared Folders feature for VMWare ACE 1.0.2 and 2.0.2, Player 1.0.4 and 2.0.2, and Workstation 5.5.4 and 6.0.2 allows guest OS users to read and write arbitrary files on the host OS via a multibyte string that produces a wide character string containing .. (dot dot) sequences, which bypasses the protection mechanism, as demonstrated using a "%c0%2e%c0%2e" string.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&amp;cmd=displayKC&amp;externalId=1004034">http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&amp;cmd=displayKC&amp;externalId=1004034</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2008-February/060457.html">20080225 CORE-2007-0930 Path Traversal vulnerability in VMware's shared folders implementation</ref>
      <ref source="MLIST" url="http://lists.vmware.com/pipermail/security-announce/2008/000008.html">[security-announce] 20080317 VMSA-2008-0005 Updated VMware Workstation, VMware Player, VMware Server, VMware ACE, and VMware Fusion resolve critical security issues</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3700">3700</ref>
      <ref source="MISC" url="http://www.coresecurity.com/?action=item&amp;id=2129">http://www.coresecurity.com/?action=item&amp;id=2129</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488725/100/0/threaded">20080225 CORE-2007-0930 Path Traversal vulnerability in VMware's shared folders implementation</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489739/100/0/threaded">20080318 VMSA-2008-0005 Updated VMware Workstation, VMware Player, VMware Server, VMware ACE, and VMware Fusion resolve critical security issues</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27944">27944</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28276">28276</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019493">1019493</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2008-0005.html">http://www.vmware.com/security/advisories/VMSA-2008-0005.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html">http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/support/player/doc/releasenotes_player.html">http://www.vmware.com/support/player/doc/releasenotes_player.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/support/player2/doc/releasenotes_player2.html">http://www.vmware.com/support/player2/doc/releasenotes_player2.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html">http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html">http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0679">ADV-2008-0679</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0905/references">ADV-2008-0905</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40837">vmware-sharedfolders-directory-traversal(40837)</ref>
    </refs>
    <vuln_soft>
      <prod name="ace" vendor="vmware">
        <vers num="1.0"/>
        <vers num="1.0.2"/>
        <vers num="2.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
      </prod>
      <prod name="player" vendor="vmware">
        <vers num="1.0.4"/>
      </prod>
      <prod name="vmware_player" vendor="vmware">
        <vers num="1.0.1_build_19317"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
      </prod>
      <prod name="vmware_workstation" vendor="vmware">
        <vers num="6.0.1"/>
        <vers num="6.0.2"/>
      </prod>
      <prod name="workstation" vendor="vmware">
        <vers num="4.5.2"/>
        <vers num="5.5.3_build_34685"/>
        <vers num="5.5.4"/>
        <vers num="6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0924" seq="2008-0924" published="2008-03-28" modified="2018-11-01" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the DoLBURPRequest function in libnldap in ndsd in Novell eDirectory 8.7.3.9 and earlier, and 8.8.1 and earlier in the 8.8.x series, allows remote attackers to cause a denial of service (daemon crash or CPU consumption) or execute arbitrary code via a long delRequest LDAP Extended Request message, probably involving a long Distinguished Name (DN) field.</descript>
      <descript source="nvd">During analysis the following related page was found.

http://www.zerodayinitiative.com/advisories/ZDI-08-013/</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490117/100/0/threaded" adv="1">20080326 ZDI-08-013: Novell eDirectory for Linux Stack Overflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28434" adv="1">28434</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019692" adv="1">1019692</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0987/references" adv="1">ADV-2008-0987</ref>
      <ref source="MISC" url="http://www.zerodayinitiative.com/advisories/ZDI-08-013/" adv="1">http://www.zerodayinitiative.com/advisories/ZDI-08-013/</ref>
      <ref source="CONFIRM" url="https://secure-support.novell.com/KanisaPlatform/Publishing/411/3382120_f.SAL_Public.html" patch="1">https://secure-support.novell.com/KanisaPlatform/Publishing/411/3382120_f.SAL_Public.html</ref>
    </refs>
    <vuln_soft>
      <prod name="edirectory" vendor="novell">
        <vers num="8.7"/>
        <vers num="8.7.1" edition="sp1"/>
        <vers num="8.7.3" edition="sp1:windows"/>
        <vers num="8.7.3" edition="sp2:windows"/>
        <vers num="8.7.3" edition="sp3:windows"/>
        <vers num="8.7.3" edition="sp4:windows"/>
        <vers num="8.7.3" edition="sp5:windows"/>
        <vers num="8.7.3" edition="sp6:windows"/>
        <vers num="8.7.3" edition="sp7:windows"/>
        <vers num="8.7.3" edition="sp8:windows"/>
        <vers num="8.7.3" edition="sp9:windows"/>
        <vers num="8.7.3.8"/>
        <vers num="8.8" edition="sp2:windows"/>
        <vers num="8.8" edition="sp8"/>
        <vers num="8.8.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0925" seq="2008-0925" published="2008-06-18" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the iMonitor interface in Novell eDirectory 8.7.3.x before 8.7.3 sp10, and 8.8.x before 8.8.2 ftf2, allows remote attackers to inject arbitrary web script or HTML via unspecified parameters that are used within "error messages of the HTTP stack."</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020321">1020321</ref>
      <ref source="CONFIRM" url="http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5037180.html">http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5037180.html</ref>
      <ref source="CONFIRM" url="http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5037181.html">http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5037181.html</ref>
      <ref source="CONFIRM" url="http://www.novell.com/support/viewContent.do?externalId=3460217&amp;sliceId=1">http://www.novell.com/support/viewContent.do?externalId=3460217&amp;sliceId=1</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29782">29782</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1863/references">ADV-2008-1863</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43151">novell-edirectory-imonitor-xss(43151)</ref>
    </refs>
    <vuln_soft>
      <prod name="edirectory" vendor="novell">
        <vers num="8.7.3.9" edition=":linux"/>
        <vers num="8.7.3.9" edition=":solaris"/>
        <vers num="8.7.3.9" edition=":windows_2000"/>
        <vers num="8.7.3.9" edition=":windows_2003"/>
        <vers num="8.8" edition=":linux"/>
        <vers num="8.8" edition=":solaris"/>
        <vers num="8.8" edition=":windows_2000"/>
        <vers num="8.8" edition=":windows_2003"/>
        <vers num="8.8.1" edition=":linux"/>
        <vers num="8.8.1" edition=":solaris"/>
        <vers num="8.8.1" edition=":windows_2000"/>
        <vers num="8.8.1" edition=":windows_2003"/>
        <vers num="8.8.2" edition=":linux"/>
        <vers num="8.8.2" edition=":solaris"/>
        <vers num="8.8.2" edition=":windows_2000"/>
        <vers num="8.8.2" edition=":windows_2003"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0926" seq="2008-0926" published="2008-03-28" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The SOAP interface to the eMBox module in Novell eDirectory 8.7.3.9 and earlier, and 8.8.x before 8.8.2, relies on client-side authentication, which allows remote attackers to bypass authentication via requests for /SOAP URIs, and cause a denial of service (daemon shutdown) or read arbitrary files. NOTE: it was later reported that 8.7.3.10 (aka 8.7.3 SP10) is also affected.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491621/100/0/threaded">20080505 Novell eDirectory unauthenticated access to SOAP interface</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28441">28441</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019691">1019691</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0988/references" adv="1">ADV-2008-0988</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41426">novell-edirectory-embox-unspecified(41426)</ref>
      <ref source="CONFIRM" url="https://secure-support.novell.com/KanisaPlatform/Publishing/876/3866911_f.SAL_Public.html">https://secure-support.novell.com/KanisaPlatform/Publishing/876/3866911_f.SAL_Public.html</ref>
    </refs>
    <vuln_soft>
      <prod name="edirectory" vendor="novell">
        <vers num="8.5"/>
        <vers num="8.5.12a"/>
        <vers num="8.5.27"/>
        <vers num="8.6.2"/>
        <vers num="8.7"/>
        <vers num="8.7.1" edition="sp1"/>
        <vers num="8.7.3"/>
        <vers num="8.7.3.8"/>
        <vers num="8.7.3.8_presp9"/>
        <vers num="8.7.3.9"/>
        <vers num="8.7.3.10" prev="1"/>
        <vers num="8.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0927" seq="2008-0927" published="2008-04-14" modified="2018-10-31" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">dhost.exe in Novell eDirectory 8.7.3 before sp10 and 8.8.2 allows remote attackers to cause a denial of service (CPU consumption) via an HTTP request with (1) multiple Connection headers or (2) a Connection header with multiple comma-separated values.  NOTE: this might be similar to CVE-2008-1777.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.novell.com/support/viewContent.do?externalId=3829452&amp;sliceId=1" adv="1">http://www.novell.com/support/viewContent.do?externalId=3829452&amp;sliceId=1</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491622/100/0/threaded" adv="1">20080505 Novell eDirectory DoS via HTTP headers</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28757" adv="1">28757</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019836" adv="1">1019836</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1217/references" adv="1">ADV-2008-1217</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41787" adv="1">novell-edirectory-dhost-dos(41787)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5547" adv="1">5547</ref>
    </refs>
    <vuln_soft>
      <prod name="windows-nt" vendor="microsoft">
        <vers num="2000"/>
        <vers num="2003"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0928" seq="2008-0928" published="2008-03-03" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.7" CVSS_base_score="4.7" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:C/I:N/A:N)">
    <desc>
      <descript source="cve">Qemu 0.9.1 and earlier does not perform range checks for block device read or write requests, which allows guest host users with root privileges to access arbitrary memory and escape the virtual machine.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html">SUSE-SR:2009:008</ref>
      <ref source="MLIST" url="http://marc.info/?l=debian-security&amp;m=120343592917055&amp;w=2">[debian-security] 20080219 qemu unchecked block read/write vulnerability</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2009/dsa-1799">DSA-1799</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:162">MDVSA-2008:162</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2009:016">MDVSA-2009:016</ref>
      <ref source="FEDORA" url="http://www.redhat.com/archives/fedora-package-announce/2008-February/msg00830.html">FEDORA-2008-1973</ref>
      <ref source="FEDORA" url="http://www.redhat.com/archives/fedora-package-announce/2008-February/msg00850.html">FEDORA-2008-1993</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0194.html">RHSA-2008:0194</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28001">28001</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=433560">https://bugzilla.redhat.com/show_bug.cgi?id=433560</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9706">oval:org.mitre.oval:def:9706</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00852.html">FEDORA-2008-1995</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00857.html">FEDORA-2008-2001</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00900.html">FEDORA-2008-2057</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00957.html">FEDORA-2008-2083</ref>
    </refs>
    <vuln_soft>
      <prod name="qemu" vendor="qemu">
        <vers num="0.1"/>
        <vers num="0.1.1"/>
        <vers num="0.1.2"/>
        <vers num="0.1.3"/>
        <vers num="0.1.4"/>
        <vers num="0.1.5"/>
        <vers num="0.1.6"/>
        <vers num="0.2"/>
        <vers num="0.3"/>
        <vers num="0.4"/>
        <vers num="0.4.1"/>
        <vers num="0.4.2"/>
        <vers num="0.4.3"/>
        <vers num="0.5.0"/>
        <vers num="0.5.1"/>
        <vers num="0.5.2"/>
        <vers num="0.5.3"/>
        <vers num="0.5.4"/>
        <vers num="0.5.5"/>
        <vers num="0.6.0"/>
        <vers num="0.6.1"/>
        <vers num="0.7.0"/>
        <vers num="0.7.1"/>
        <vers num="0.7.2"/>
        <vers num="0.8.0"/>
        <vers num="0.8.1"/>
        <vers num="0.8.2"/>
        <vers num="0.9.0"/>
        <vers num="0.9.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0929" seq="2008-0929" published="2008-02-25" modified="2008-09-10" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was withdrawn by its CNA.  Further investigation showed that it was not a security issue.  Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2008-0930" seq="2008-0930" published="2008-03-03" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">w_editeur.c in XWine 1.0.1 for Debian GNU/Linux allows local users to overwrite or print arbitrary files via a symlink attack on the temporaire temporary file.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=468050">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=468050</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1526">DSA-1526</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28049">28049</ref>
    </refs>
    <vuln_soft>
      <prod name="xwine" vendor="freshmeat">
        <vers num="1.0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0931" seq="2008-0931" published="2008-03-03" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="6.3" CVSS_base_score="6.3" CVSS_impact_subscore="9.2" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:N/I:C/A:C)">
    <desc>
      <descript source="cve">w_export.c in XWine 1.0.1 on Debian GNU/Linux sets insecure permissions (0666) for /etc/wine/config, which might allow local users to execute arbitrary commands or cause a denial of service by modifying the file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=468050">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=468050</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1526">DSA-1526</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28369">28369</ref>
    </refs>
    <vuln_soft>
      <prod name="xwine" vendor="xwine">
        <vers num="1.0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0932" seq="2008-0932" published="2008-02-25" modified="2011-03-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">diatheke.pl in The SWORD Project Diatheke 1.5.9 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the range parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=466449">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=466449</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200803-06.xml">GLSA-200803-06</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1508">DSA-1508</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27874">27874</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27987">27987</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0670/references">ADV-2008-0670</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=433723">https://bugzilla.redhat.com/show_bug.cgi?id=433723</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00769.html">FEDORA-2008-1922</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00806.html">FEDORA-2008-1951</ref>
    </refs>
    <vuln_soft>
      <prod name="diatheke_front_end" vendor="the_sword_project">
        <vers num="1.5.9" prev="1"/>
      </prod>
      <prod name="sword" vendor="the_sword_project">
        <vers num="1.5.9" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0933" seq="2008-0933" published="2008-02-25" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.7" CVSS_base_score="4.7" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Multiple race conditions in the CPU Performance Counters (cpc) subsystem in the kernel in Sun Solaris 10 allow local users to cause a denial of service (panic) via unspecified vectors related to kcpc_unbind and kcpc_restore.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-231466-1" patch="1">231466</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27941" patch="1">27941</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019490">1019490</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0642">ADV-2008-0642</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5476">oval:org.mitre.oval:def:5476</ref>
    </refs>
    <vuln_soft>
      <prod name="solaris" vendor="sun">
        <vers num="10.0" edition=":sparc"/>
        <vers num="10.0" edition=":x86"/>
        <vers num="10.0" edition=":x86_sparc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0934" seq="2008-0934" published="2008-02-25" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in modules.php in the NukeC 2.1 module for PHP-Nuke allows remote attackers to execute arbitrary SQL commands via the id_catg parameter in a ViewCatg action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27937">27937</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5172">5172</ref>
    </refs>
    <vuln_soft>
      <prod name="nukec" vendor="nukec">
        <vers num="2.1"/>
      </prod>
      <prod name="nukec_module" vendor="php-nuke">
        <vers num="2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0935" seq="2008-0935" published="2008-02-25" modified="2011-03-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the Novell iPrint Control ActiveX control in ienipp.ocx in Novell iPrint Client before 4.34 allows remote attackers to execute arbitrary code via a long argument to the ExecuteRequest method.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://download.novell.com/Download?buildid=prBBH4JpImA~" patch="1">http://download.novell.com/Download?buildid=prBBH4JpImA~</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27939">27939</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019489" patch="1">1019489</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0639">ADV-2008-0639</ref>
    </refs>
    <vuln_soft>
      <prod name="iprint" vendor="novell">
        <vers num="4.32" prev="1"/>
      </prod>
      <prod name="iprint_client" vendor="novell">
        <vers num="4.26"/>
        <vers num="4.32"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0936" seq="2008-0936" published="2008-02-25" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the Prayer List (prayerlist) 1.04 module for XOOPS allows remote attackers to execute arbitrary SQL commands via the cid parameter in a view action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=120362358919492&amp;w=2">20080221 XOOPS Module prayerlist SQL Injection(cid)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27934">27934</ref>
    </refs>
    <vuln_soft>
      <prod name="prayer_list_module" vendor="xoops">
        <vers num="1.04"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0937" seq="2008-0937" published="2008-02-25" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the Tiny Event (tinyevent) 1.01 module for XOOPS allows remote attackers to execute arbitrary SQL commands via the id parameter in a print action, a different vector than CVE-2007-1811.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=120361694407815&amp;w=2">20080221 XOOPS Module tinyevent-print SQL Injection(id)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27931">27931</ref>
    </refs>
    <vuln_soft>
      <prod name="tinyevent" vendor="tinyevent">
        <vers num="1.01"/>
      </prod>
      <prod name="tiny_event_module" vendor="xoops">
        <vers num="1.01"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0938" seq="2008-0938" published="2008-02-25" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.7" CVSS_base_score="4.7" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:C/I:N/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the dynamic tracing framework (DTrace) in Sun Solaris 10 allows local users with PRIV_DTRACE_USER or PRIV_DTRACE_PROC privileges to obtain sensitive kernel information via unspecified vectors, a different vulnerability than CVE-2007-4126.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-231803-1">231803</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27942">27942</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019483">1019483</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0640">ADV-2008-0640</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5451">oval:org.mitre.oval:def:5451</ref>
    </refs>
    <vuln_soft>
      <prod name="solaris" vendor="sun">
        <vers num="10" edition=":sparc"/>
        <vers num="10" edition=":x86"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0939" seq="2008-0939" published="2008-02-25" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in wppa.php in the WP Photo Album (WPPA) before 1.1 plugin for WordPress allow remote attackers to execute arbitrary SQL commands via (1) the photo parameter to index.php, used by the wppa_photo_name function; or (2) the album parameter to index.php, used by the wppa_album_name function.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://me.mywebsight.ws/web/wppa/">http://me.mywebsight.ws/web/wppa/</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3693">3693</ref>
      <ref source="MISC" url="http://weblogtoolscollection.com/archives/2008/02/21/photo-album-plugin-vulnerabilities/">http://weblogtoolscollection.com/archives/2008/02/21/photo-album-plugin-vulnerabilities/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488290">20080216 WordPress album PHOTO SQL Injection</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27832">27832</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0586">ADV-2008-0586</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40599">photoalbum-index-sql-injection(40599)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5135">5135</ref>
    </refs>
    <vuln_soft>
      <prod name="photo_album_plugin" vendor="wordpress">
        <vers num="1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0940" seq="2008-0940" published="2008-02-25" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Plain Black WebGUI before 7.4.24 allows remote attackers to inject arbitrary web script or HTML when creating a username, a different vulnerability than CVE-2007-0407.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.plainblack.com/getwebgui/advisories/webgui-7_4_24-stable-released">http://www.plainblack.com/getwebgui/advisories/webgui-7_4_24-stable-released</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27869" patch="1">27869</ref>
    </refs>
    <vuln_soft>
      <prod name="webgui" vendor="webgui">
        <vers num="7.4"/>
        <vers num="7.4.2"/>
        <vers num="7.4.3"/>
        <vers num="7.4.4"/>
        <vers num="7.4.5"/>
        <vers num="7.4.6"/>
        <vers num="7.4.7"/>
        <vers num="7.4.8"/>
        <vers num="7.4.9"/>
        <vers num="7.4.10"/>
        <vers num="7.4.11"/>
        <vers num="7.4.12"/>
        <vers num="7.4.13"/>
        <vers num="7.4.14"/>
        <vers num="7.4.15"/>
        <vers num="7.4.16"/>
        <vers num="7.4.17"/>
        <vers num="7.4.18"/>
        <vers num="7.4.23"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0941" seq="2008-0941" published="2008-02-25" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Eagle Software Aeries Browser Interface (ABI) 3.8.2.8 allows remote authenticated users to inject arbitrary web script or HTML via an event.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3694">3694</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488430/100/0/threaded">20080221 aeries browser interface(ABI) 3.8.2.8 XSS</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27924">27924</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40756">abi-newevent-xss(40756)</ref>
    </refs>
    <vuln_soft>
      <prod name="aeries_student_information_system" vendor="aeries">
        <vers num="3.7.2.2"/>
        <vers num="3.8.2.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0942" seq="2008-0942" published="2008-02-25" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in GradebookStuScores.asp in Eagle Software Aeries Browser Interface (ABI) 3.8.2.8 allows remote attackers to execute arbitrary SQL commands via the GrdBk parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3695">3695</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488456/100/0/threaded">20080221 aeries browser interface(ABI) 3.8.2.8 Remote SQL Injection</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27924">27924</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40847">abi-gradebookstuscores-sql-injection(40847)</ref>
    </refs>
    <vuln_soft>
      <prod name="aeries_student_information_system" vendor="aeries">
        <vers num="3.7.2.2"/>
        <vers num="3.8.2.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0943" seq="2008-0943" published="2008-02-25" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in Eagle Software Aeries Browser Interface (ABI) 3.7.2.2 allow remote attackers to execute arbitrary SQL commands via the (1) FC parameter to Comments.asp, or the Term parameter to (2) Labels.asp or (3) ClassList.asp.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3696">3696</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488428/100/0/threaded">20080221 aeries browser interface(ABI) 3.7.2.2 Remote SQL Injection</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27924">27924</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40757">abi-fcterm-sql-injection(40757)</ref>
    </refs>
    <vuln_soft>
      <prod name="aeries_student_information_system" vendor="aeries">
        <vers num="3.7.2.2"/>
        <vers num="3.8.2.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0944" seq="2008-0944" published="2008-02-25" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Ipswitch Instant Messaging (IM) 2.0.8.1 and earlier allows remote attackers to cause a denial of service (NULL dereference and application crash) via a version field containing zero.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/ipsimene-adv.txt">http://aluigi.altervista.org/adv/ipsimene-adv.txt</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3697">3697</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487748/100/200/threaded">20080207 Multiple vulnerabilities in Ipswitch Instant Messaging 2.0.8.1</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27677">27677</ref>
    </refs>
    <vuln_soft>
      <prod name="instant_messaging" vendor="ipswitch">
        <vers num="2.0.8.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0945" seq="2008-0945" published="2008-02-25" modified="2018-10-15" severity="Low" CVSS_version="2.0" CVSS_score="3.5" CVSS_base_score="3.5" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="6.8" CVSS_vector="(AV:N/AC:M/Au:S/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Format string vulnerability in the logging function in the IM Server (aka IMserve or IMserver) in Ipswitch Instant Messaging (IM) 2.0.8.1 and earlier allows remote authenticated users to cause a denial of service (daemon crash) and possibly have unspecified other impact via format string specifiers in an IP address field.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/ipsimene-adv.txt">http://aluigi.altervista.org/adv/ipsimene-adv.txt</ref>
      <ref source="MISC" url="http://aluigi.org/poc/ipsimene.zip">http://aluigi.org/poc/ipsimene.zip</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3697">3697</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487748/100/200/threaded">20080207 Multiple vulnerabilities in Ipswitch Instant Messaging 2.0.8.1</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27677">27677</ref>
    </refs>
    <vuln_soft>
      <prod name="imserver" vendor="ipswitch">
        <vers num="2.0.8.1" prev="1"/>
      </prod>
      <prod name="instant_messaging" vendor="ipswitch">
        <vers num="2.0.8.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0946" seq="2008-0946" published="2008-02-25" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.9" CVSS_base_score="4.9" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="6.8" CVSS_vector="(AV:N/AC:M/Au:S/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in the IM Server (aka IMserve or IMserver) in Ipswitch Instant Messaging (IM) 2.0.8.1 and earlier allows remote authenticated users to create arbitrary empty files via a .. (dot dot) in the recipient field.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/ipsimene-adv.txt">http://aluigi.altervista.org/adv/ipsimene-adv.txt</ref>
      <ref source="MISC" url="http://aluigi.org/poc/ipsimene.zip">http://aluigi.org/poc/ipsimene.zip</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3697">3697</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487748/100/200/threaded">20080207 Multiple vulnerabilities in Ipswitch Instant Messaging 2.0.8.1</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27677">27677</ref>
    </refs>
    <vuln_soft>
      <prod name="imserver" vendor="ipswitch">
        <vers num="2.0.8.1" prev="1"/>
      </prod>
      <prod name="instant_messaging" vendor="ipswitch">
        <vers num="2.0.8.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0947" seq="2008-0947" published="2008-03-18" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the RPC library used by libgssrpc and kadmind in MIT Kerberos 5 (krb5) 1.4 through 1.6.3 allows remote attackers to execute arbitrary code by triggering a large number of open file descriptors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00006.html">SUSE-SA:2008:016</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=130497213107107&amp;w=2">SSRT100495</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200803-31.xml">GLSA-200803-31</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3752">3752</ref>
      <ref source="CONFIRM" url="http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022520.html">http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022520.html</ref>
      <ref source="CONFIRM" url="http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022542.html">http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022542.html</ref>
      <ref source="CONFIRM" url="http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-002.txt">http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-002.txt</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0112">http://wiki.rpath.com/Advisories:rPSA-2008-0112</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0112">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0112</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1524">DSA-1524</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/374121">VU#374121</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:069">MDVSA-2008:069</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:070">MDVSA-2008:070</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0164.html">RHSA-2008:0164</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489762/100/0/threaded">20080318 MITKRB5-SA-2008-001: double-free, uninitialized data vulnerabilities in krb5kdc</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489784/100/0/threaded">20080318 MITKRB5-SA-2008-002: array overrun in RPC library used by kadmin (resend, corrected subject)</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489883/100/0/threaded">20080319 rPSA-2008-0112-1 krb5 krb5-server krb5-services krb5-test krb5-workstation</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28302">28302</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019631">1019631</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-587-1">USN-587-1</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-079B.html">TA08-079B</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0922/references">ADV-2008-0922</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1102/references">ADV-2008-1102</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41273">krb5-rpclibrary-bo(41273)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10984">oval:org.mitre.oval:def:10984</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00537.html">FEDORA-2008-2637</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00544.html">FEDORA-2008-2647</ref>
    </refs>
    <vuln_soft>
      <prod name="kerberos" vendor="mit">
        <vers num="5-1.4"/>
        <vers num="5-1.4.1"/>
        <vers num="5-1.4.2"/>
        <vers num="5-1.4.3"/>
        <vers num="5-1.4.4"/>
        <vers num="5-1.5"/>
        <vers num="5-1.5.1"/>
        <vers num="5-1.5.2"/>
        <vers num="5-1.5.3"/>
        <vers num="5-1.6"/>
        <vers num="5-1.6.1"/>
        <vers num="5-1.6.2"/>
      </prod>
      <prod name="kerberos_5" vendor="mit">
        <vers num="1.6.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0948" seq="2008-0948" published="2008-03-18" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the RPC library (lib/rpc/rpc_dtablesize.c) used by libgssrpc and kadmind in MIT Kerberos 5 (krb5) 1.2.2, and probably other versions before 1.3, when running on systems whose unistd.h does not define the FD_SETSIZE macro, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by triggering a large number of open file descriptors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00006.html">SUSE-SA:2008:016</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=130497213107107&amp;w=2">SSRT100495</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3752">3752</ref>
      <ref source="CONFIRM" url="http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022520.html">http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022520.html</ref>
      <ref source="CONFIRM" url="http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022542.html">http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022542.html</ref>
      <ref source="CONFIRM" url="http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-002.txt">http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-002.txt</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/374121">VU#374121</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0181.html">RHSA-2008:0181</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489762/100/0/threaded">20080318 MITKRB5-SA-2008-001: double-free, uninitialized data vulnerabilities in krb5kdc</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489784/100/0/threaded">20080318 MITKRB5-SA-2008-002: array overrun in RPC library used by kadmin (resend, corrected subject)</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493080/100/0/threaded">20080604 VMSA-2008-0009 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Fusion, VMware Server, VMware VIX API, VMware ESX, VMware ESXi resolve critical security issues</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28302">28302</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019631">1019631</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-079B.html">TA08-079B</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2008-0009.html">http://www.vmware.com/security/advisories/VMSA-2008-0009.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0922/references">ADV-2008-0922</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1102/references">ADV-2008-1102</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1744">ADV-2008-1744</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41274">krb5-rpclibrary-fdsetsize-bo(41274)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9209">oval:org.mitre.oval:def:9209</ref>
    </refs>
    <vuln_soft>
      <prod name="kerberos" vendor="mit">
        <vers num="5-1.2.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0949" seq="2008-0949" published="2008-03-17" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in IBM Informix Dynamic Server (IDS) 7.x through 11.x allows remote attackers to gain privileges via a malformed connection request packet.</descript>
      <descript source="nvd">IBM links require software support sign in to access information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.informixmag.com/content/view/11143/27/">http://www.informixmag.com/content/view/11143/27/</ref>
      <ref source="MISC" url="http://www.informixmag.com/content/view/11144/27/">http://www.informixmag.com/content/view/11144/27/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28198">28198</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0860">ADV-2008-0860</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/search.wss?rs=0&amp;q=IC55224&amp;apar=only">IC55224</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/search.wss?rs=0&amp;q=IC55225&amp;apar=only">IC55225</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41370">ibm-ids-unspecified-privilege-escalation(41370)</ref>
    </refs>
    <vuln_soft>
      <prod name="informix_dynamic_server" vendor="ibm">
        <vers num="7.3"/>
        <vers num="7.31.xd8"/>
        <vers num="7.31.xd9"/>
        <vers num="9.3"/>
        <vers num="9.4"/>
        <vers num="9.40.tc5"/>
        <vers num="9.40.uc1"/>
        <vers num="9.40.uc2"/>
        <vers num="9.40.uc3"/>
        <vers num="9.40.uc5"/>
        <vers num="9.40.xd8"/>
        <vers num="9.40_xc7"/>
        <vers num="10.0"/>
        <vers num="10.0.xc3"/>
        <vers num="10.0.xc4"/>
        <vers num="10.00.xc7w1"/>
        <vers num="11.10.xc2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0951" seq="2008-0951" published="2008-03-24" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Microsoft Windows Vista does not properly enforce the NoDriveTypeAutoRun registry value, which allows user-assisted remote attackers, and possibly physically proximate attackers, to execute arbitrary code by inserting a (1) CD-ROM device or (2) U3-enabled USB device containing a filesystem with an Autorun.inf file, and possibly other vectors related to (a) AutoRun and (b) AutoPlay actions.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/889747">VU#889747</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28360">28360</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020446">1020446</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0954/references">ADV-2008-0954</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-038">MS08-038</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41349">vista-nodrivetypeautorun-weak-security(41349)</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_vista" vendor="microsoft">
        <vers num="" edition=":business"/>
        <vers num="" edition=":enterprise"/>
        <vers num="" edition=":home_basic"/>
        <vers num="" edition=":home_premium"/>
        <vers num="" edition=":ultimate"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0952" seq="2008-0952" published="2008-06-04" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The AppendStringToFile function in the HPISDataManagerLib.Datamgr ActiveX control in HPISDataManager.dll in HP Instant Support before 1.0.0.24 allows remote attackers to create files with arbitrary content via a full pathname in the first argument and the content in the second argument, a different vulnerability than CVE-2007-5608 and CVE-2008-0953.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.csis.dk/dk/forside/CSIS-RI-0003.pdf">http://www.csis.dk/dk/forside/CSIS-RI-0003.pdf</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29526">29526</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29535">29535</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020165">1020165</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1740/references">ADV-2008-1740</ref>
      <ref source="HP" url="http://www12.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01422264">HPSBMA02326</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42834">hp-instantsupport-append-file-overwrite(42834)</ref>
    </refs>
    <vuln_soft>
      <prod name="instant_support" vendor="hp">
        <vers num="1.0.0.23" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0953" seq="2008-0953" published="2008-06-04" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The StartApp function in the HPISDataManagerLib.Datamgr ActiveX control in HPISDataManager.dll in HP Instant Support before 1.0.0.24 allows remote attackers to execute arbitrary programs via a .exe filename in the argument, a different vulnerability than CVE-2007-5608 and CVE-2008-0953.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.csis.dk/dk/forside/CSIS-RI-0003.pdf">http://www.csis.dk/dk/forside/CSIS-RI-0003.pdf</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29526">29526</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29533">29533</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020165">1020165</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1740/references">ADV-2008-1740</ref>
      <ref source="HP" url="http://www12.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01422264">SSRT071490</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42851">hp-instantsupport-startapp-code-execution(42851)</ref>
    </refs>
    <vuln_soft>
      <prod name="instant_support" vendor="hp">
        <vers num="1.0.0.23" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0955" seq="2008-0955" published="2008-05-29" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the Creative Software AutoUpdate Engine ActiveX control in CTSUEng.ocx allows remote attackers to execute arbitrary code via a long CacheFolder property value.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/501843">VU#501843</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29391">29391</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1668">ADV-2008-1668</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42673">creativesoftware-autoupdate-cachefolder-bo(42673)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5681">5681</ref>
    </refs>
    <vuln_soft>
      <prod name="creative_software_autoupdate_engine" vendor="creative">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0956" seq="2008-0956" published="2008-06-11" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple stack-based buffer overflows in the BackWeb Lite Install Runner ActiveX control in the BackWeb Web Package ActiveX object in LiteInstActivator.dll in BackWeb before 8.1.1.87, as used in Logitech Desktop Manager (LDM) before 2.56, allow remote attackers to execute arbitrary code via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://backweb.com/news_events/press_releases/051608.php">http://backweb.com/news_events/press_releases/051608.php</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=121380194923597&amp;w=2">HPSBST02344</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/216153" patch="1">VU#216153</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29558">29558</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-162B.html">TA08-162B</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1791">ADV-2008-1791</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1792">ADV-2008-1792</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-032">MS08-032</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42991">backweb-activex-liteinstactivator-bo(42991)</ref>
    </refs>
    <vuln_soft>
      <prod name="backweb" vendor="backweb">
        <vers num="8.1.1.86" prev="1"/>
      </prod>
      <prod name="desktop_manager" vendor="logitech">
        <vers num="2.55" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0957" seq="2008-0957" published="2008-05-20" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple stack-based buffer overflows in the PhotoStockPlus Uploader Tool ActiveX control (PSPUploader.ocx) allow remote attackers to execute arbitrary code via unspecified initialization parameters.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/406937">VU#406937</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29279">29279</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1571">ADV-2008-1571</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42534">photostockplus-uploader-bo(42534)</ref>
    </refs>
    <vuln_soft>
      <prod name="photostockplus_uploader_tool" vendor="photostockplus">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0958" seq="2008-0958" published="2008-05-29" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple stack-based buffer overflows in the Online Media Technologies NCTSoft NCTAudioGrabber2 ActiveX control in NCTAudioGrabber2.dll allow remote attackers to execute arbitrary code via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/656593">VU#656593</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1669">ADV-2008-1669</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42678">nctaudioeditor-nctaudiograbber2-bo(42678)</ref>
    </refs>
    <vuln_soft>
      <prod name="nctaudioeditor_activex_control" vendor="nctsoft">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0959" seq="2008-0959" published="2008-05-29" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple stack-based buffer overflows in the Online Media Technologies NCTSoft NCTAudioInformation2 ActiveX control in NCTAudioInformation2.dll, as used in (1) Power Audio CD Grabber 1.0, (2) Power Audio CD Burner 1.02, (3) CinematicMP3 1.4.0.0, (4) Alive MP3 WAV Converter 3.9.3.2, and possibly other products, allow remote attackers to execute arbitrary code via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/669265">VU#669265</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1669">ADV-2008-1669</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42680">nctaudiostudio-nctaudioinformation2-bo(42680)</ref>
    </refs>
    <vuln_soft>
      <prod name="alive_mp3_wav_converter" vendor="alivemedia">
        <vers num="3.9.3.2"/>
      </prod>
      <prod name="nctaudioeditor_activex_control" vendor="online_media_technologies">
        <vers num=""/>
      </prod>
      <prod name="nctaudiostudio_activex_control" vendor="online_media_technologies">
        <vers num=""/>
      </prod>
      <prod name="cinematicmp3" vendor="orion_studios">
        <vers num="1.4.0.0"/>
      </prod>
      <prod name="power_audio_cd_burner" vendor="ussun">
        <vers num="1.02"/>
      </prod>
      <prod name="power_audio_cd_grabber" vendor="ussun">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0960" seq="2008-0960" published="2008-06-10" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html">APPLE-SA-2008-06-30</ref>
      <ref source="MLIST" url="http://lists.ingate.com/pipermail/productinfo/2008/000021.html">[productinfo] 20080611 Ingate Firewall and SIParator affected by SNMPv3 vulnerability</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html">SUSE-SA:2008:039</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=127730470825399&amp;w=2">SSRT080082</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2008-0528.html">RHSA-2008:0528</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200808-02.xml">GLSA-200808-02</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3933">3933</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/forum/forum.php?forum_id=833770">http://sourceforge.net/forum/forum.php?forum_id=833770</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/tracker/index.php?func=detail&amp;aid=1989089&amp;group_id=12694&amp;atid=456380">http://sourceforge.net/tracker/index.php?func=detail&amp;aid=1989089&amp;group_id=12694&amp;atid=456380</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1">238865</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT2163">http://support.apple.com/kb/HT2163</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm">http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm</ref>
      <ref source="CISCO" url="http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml" adv="1">20080610 SNMP Version 3 Authentication Vulnerabilities</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1663" patch="1">DSA-1663</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/878044">VU#878044</ref>
      <ref source="CONFIRM" url="http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q">http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q</ref>
      <ref source="CONFIRM" url="http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z">http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z</ref>
      <ref source="CONFIRM" url="http://www.kb.cert.org/vuls/id/MIMG-7ETS87">http://www.kb.cert.org/vuls/id/MIMG-7ETS87</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:118">MDVSA-2008:118</ref>
      <ref source="MISC" url="http://www.ocert.org/advisories/ocert-2008-006.html">http://www.ocert.org/advisories/ocert-2008-006.html</ref>
      <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/06/09/1">[oss-security] 20080609 [oCERT-2008-006] multiple SNMP implementations HMAC authentication spoofing</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0529.html">RHSA-2008:0529</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493218/100/0/threaded">20080609 [oCERT-2008-006] multiple SNMP implementations HMAC authentication spoofing</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/497962/100/0/threaded">20081031 VMSA-2008-0017 Updated ESX packages for libxml2, ucd-snmp, libtiff</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29623" patch="1">29623</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020218">1020218</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-685-1">USN-685-1</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-162A.html">TA08-162A</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2008-0013.html">http://www.vmware.com/security/advisories/VMSA-2008-0013.html</ref>
      <ref source="MISC" url="http://www.vmware.com/security/advisories/VMSA-2008-0017.html">http://www.vmware.com/security/advisories/VMSA-2008-0017.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1787/references">ADV-2008-1787</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1788/references">ADV-2008-1788</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1797/references">ADV-2008-1797</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1800/references">ADV-2008-1800</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1801/references">ADV-2008-1801</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1836/references">ADV-2008-1836</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1981/references">ADV-2008-1981</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2361">ADV-2008-2361</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2971">ADV-2008-2971</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/1612">ADV-2009-1612</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=447974">https://bugzilla.redhat.com/show_bug.cgi?id=447974</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820">oval:org.mitre.oval:def:10820</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785">oval:org.mitre.oval:def:5785</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414">oval:org.mitre.oval:def:6414</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5790">5790</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html">FEDORA-2008-5215</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html">FEDORA-2008-5224</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html">FEDORA-2008-5218</ref>
    </refs>
    <vuln_soft>
      <prod name="session_and_resource_control" vendor="juniper">
        <vers num="1.0"/>
        <vers num="2.0"/>
      </prod>
      <prod name="src_pe" vendor="juniper">
        <vers num="1.0"/>
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0961" seq="2008-0961" published="2008-04-14" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">EMV DiskXtender 6.20.060 has a hard-coded login and password, which allows remote attackers to bypass authentication via the RPC interface.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=683">20080410 EMC DiskXtender Authentication Bypass Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28727">28727</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019827">1019827</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1198/references">ADV-2008-1198</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41772">emc-diskxtender-unauthorized-access(41772)</ref>
    </refs>
    <vuln_soft>
      <prod name="diskxtender" vendor="emc">
        <vers num="6.20.060"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0962" seq="2008-0962" published="2008-04-14" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="9.0" CVSS_base_score="9.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the File System Manager for EMC DiskXtender 6.20.060 allows remote authenticated users to execute arbitrary code via a crafted request to the RPC interface.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=684">20080410 EMC DiskXtender File System Manager Stack Buffer Overflow Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28728">28728</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019828">1019828</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1198/references">ADV-2008-1198</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41774">emc-diskxtender-filesystemmanager-bo(41774)</ref>
    </refs>
    <vuln_soft>
      <prod name="diskxtender" vendor="emc">
        <vers num="6.20.060"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0963" seq="2008-0963" published="2008-04-14" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="9.0" CVSS_base_score="9.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Format string vulnerability in EMC DiskXtender MediaStor 6.20.060 allows remote authenticated users to execute arbitrary code via a crafted message to the RPC interface.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=685">20080410 EMC DiskXtender MediaStor Format String Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28727">28727</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28729">28729</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019829">1019829</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1198/references">ADV-2008-1198</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41773">emc-diskxtender-mediastor-format-string(41773)</ref>
    </refs>
    <vuln_soft>
      <prod name="diskxtender" vendor="emc">
        <vers num="6.20.060"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0964" seq="2008-0964" published="2008-08-08" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple stack-based buffer overflows in snoop on Sun Solaris 8 through 10 and OpenSolaris before snv_96, when the -o option is omitted, allow remote attackers to execute arbitrary code via a crafted SMB packet.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=734">20080804 Solaris snoop SMB Decoding Multiple Stack Buffer Overflow Vulnerabilities</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-240101-1" adv="1">240101</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2008-355.htm">http://support.avaya.com/elmodocs2/security/ASA-2008-355.htm</ref>
      <ref source="CONFIRM" url="http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&amp;id=766935">http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&amp;id=766935</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30556">30556</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020633">1020633</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2311" adv="1">ADV-2008-2311</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/44222">solaris-snoop1m-bo(44222)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5318">oval:org.mitre.oval:def:5318</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/6328">6328</ref>
    </refs>
    <vuln_soft>
      <prod name="opensolaris" vendor="sun">
        <vers num="" edition=":sparc"/>
        <vers num="" edition=":x86"/>
        <vers num="build_snv_01"/>
        <vers num="build_snv_02"/>
        <vers num="build_snv_13"/>
        <vers num="build_snv_19"/>
        <vers num="build_snv_22"/>
        <vers num="build_snv_64"/>
        <vers num="build_snv_88"/>
        <vers num="build_snv_89"/>
        <vers num="build_snv_91"/>
        <vers num="build_snv_92"/>
        <vers num="build_snv_95" prev="1"/>
      </prod>
      <prod name="solaris" vendor="sun">
        <vers num="8" edition=":sparc"/>
        <vers num="8" edition=":x86"/>
        <vers num="9" edition=":sparc"/>
        <vers num="9" edition=":x86"/>
        <vers num="10" edition=":sparc"/>
        <vers num="10" edition=":x86"/>
      </prod>
      <prod name="sunos" vendor="sun">
        <vers num="5.8"/>
        <vers num="5.9"/>
        <vers num="5.10"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0965" seq="2008-0965" published="2008-08-08" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple format string vulnerabilities in snoop on Sun Solaris 8 through 10 and OpenSolaris before snv_96, when the -o option is omitted, allow remote attackers to execute arbitrary code via format string specifiers in an SMB packet.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=735">20080804 Solaris snoop SMB Decoding Multiple Format String Vulnerabilities</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-240101-1" adv="1">240101</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2008-355.htm">http://support.avaya.com/elmodocs2/security/ASA-2008-355.htm</ref>
      <ref source="CONFIRM" url="http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&amp;id=766935">http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&amp;id=766935</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30556">30556</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020633">1020633</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2311" adv="1">ADV-2008-2311</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/44222">sun-solaris-snoop1m-command-execution(44222)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/44415">solaris-snoop1m-format-string(44415)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5742">oval:org.mitre.oval:def:5742</ref>
    </refs>
    <vuln_soft>
      <prod name="opensolaris" vendor="sun">
        <vers num="" edition=":sparc"/>
        <vers num="" edition=":x86"/>
        <vers num="build_snv_01"/>
        <vers num="build_snv_02"/>
        <vers num="build_snv_13"/>
        <vers num="build_snv_19"/>
        <vers num="build_snv_22"/>
        <vers num="build_snv_64"/>
        <vers num="build_snv_88"/>
        <vers num="build_snv_89"/>
        <vers num="build_snv_91"/>
        <vers num="build_snv_92"/>
        <vers num="build_snv_95" prev="1"/>
      </prod>
      <prod name="solaris" vendor="sun">
        <vers num="8" edition=":sparc"/>
        <vers num="8" edition=":x86"/>
        <vers num="9" edition=":sparc"/>
        <vers num="9" edition=":x86"/>
        <vers num="10" edition=":sparc"/>
        <vers num="10" edition=":x86"/>
      </prod>
      <prod name="sunos" vendor="sun">
        <vers num="5.8"/>
        <vers num="5.9"/>
        <vers num="5.10"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0967" seq="2008-0967" published="2008-06-05" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="6.9" CVSS_base_score="6.9" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Untrusted search path vulnerability in vmware-authd in VMware Workstation 5.x before 5.5.7 build 91707 and 6.x before 6.0.4 build 93057, VMware Player 1.x before 1.0.7 build 91707 and 2.x before 2.0.4 build 93057, and VMware Server before 1.0.6 build 91891 on Linux, and VMware ESXi 3.5 and VMware ESX 2.5.4 through 3.5, allows local users to gain privileges via a library path option in a configuration file.</descript>
      <descript source="nvd">Per: http://cwe.mitre.org/data/definitions/426.html 
'CWE-426: Untrusted Search Path'</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=713">20080604 VMware Multiple Products vmware-authd Untrusted Library Loading Vulnerability</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-201209-25.xml">GLSA-201209-25</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3922">3922</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020198">1020198</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493080/100/0/threaded">20080604 VMSA-2008-0009 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Fusion, VMware Server, VMware VIX API, VMware ESX, VMware ESXi resolve critical security issues</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29557">29557</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2008-0009.html" adv="1">http://www.vmware.com/security/advisories/VMSA-2008-0009.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1744" adv="1">ADV-2008-1744</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42878">vmware-vmwareauthd-privilege-escalation(42878)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4768">oval:org.mitre.oval:def:4768</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5583">oval:org.mitre.oval:def:5583</ref>
    </refs>
    <vuln_soft>
      <prod name="esx_server" vendor="vmware">
        <vers num="2.5.5"/>
        <vers num="3.1"/>
        <vers num="3.2"/>
        <vers num="3.3"/>
        <vers num="3.5"/>
      </prod>
      <prod name="esxi" vendor="vmware">
        <vers num="3.5"/>
      </prod>
      <prod name="player" vendor="vmware">
        <vers num="1.0.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.4"/>
        <vers num="1.0.5"/>
        <vers num="1.0.6"/>
        <vers num="2.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
      </prod>
      <prod name="server" vendor="vmware">
        <vers num="1.0.3"/>
      </prod>
      <prod name="vmware_server" vendor="vmware">
        <vers num="1.0.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.4"/>
        <vers num="1.0.5"/>
      </prod>
      <prod name="vmware_workstation" vendor="vmware">
        <vers num="5.5.0"/>
        <vers num="5.5.2"/>
        <vers num="5.5.5"/>
        <vers num="5.5.6"/>
        <vers num="6.0.1"/>
        <vers num="6.0.2"/>
        <vers num="6.0.3"/>
      </prod>
      <prod name="workstation" vendor="vmware">
        <vers num="5.5.1"/>
        <vers num="5.5.3"/>
        <vers num="5.5.4"/>
        <vers num="6.0"/>
      </prod>
      <prod name="esx" vendor="vmware">
        <vers num="3.0.0"/>
        <vers num="3.0.1"/>
        <vers num="3.0.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0971" seq="2008-0971" published="2008-12-19" modified="2018-10-15" severity="Low" CVSS_version="2.0" CVSS_score="3.5" CVSS_base_score="3.5" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="6.8" CVSS_vector="(AV:N/AC:M/Au:S/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in index.cgi in Barracuda Spam Firewall (BSF) before 3.5.12.007, Message Archiver before 1.2.1.002, Web Filter before 3.3.0.052, IM Firewall before 3.1.01.017, and Load Balancer before 2.3.024 allow remote attackers to inject arbitrary web script or HTML via (1) the Policy Name field in Search Based Retention Policy in Message Archiver; unspecified parameters in the (2) IP Configuration, (3) Administration, (4) Journal Accounts, (5) Retention Policy, and (6) GroupWise Sync components in Message Archiver; (7) input to search operations in Web Filter; and (8) input used in error messages and (9) hidden INPUT elements in (a) Spam Firewall, (b) IM Firewall, and (c) Web Filter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://dcsl.ul.ie/advisories/03.htm">http://dcsl.ul.ie/advisories/03.htm</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/4792">4792</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1021454">1021454</ref>
      <ref source="CONFIRM" url="http://www.barracudanetworks.com/ns/support/tech_alert.php" adv="1">http://www.barracudanetworks.com/ns/support/tech_alert.php</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/499294/100/0/threaded">20081216 CVE-2008-0971 - Barracuda Networks products Multiple Cross-Site Scripting Vulnerabilities</ref>
    </refs>
    <vuln_soft>
      <prod name="barracuda_im_firewall" vendor="barracuda_networks">
        <vers num="3.0.01.008" prev="1"/>
      </prod>
      <prod name="barracuda_load_balancer" vendor="barracuda_networks">
        <vers num="2.2.006" prev="1"/>
      </prod>
      <prod name="barracuda_message_archiver" vendor="barracuda_networks">
        <vers num="1.1.0.010" prev="1"/>
      </prod>
      <prod name="barracuda_spam_firewall" vendor="barracuda_networks">
        <vers num="3.5.11.020" prev="1"/>
      </prod>
      <prod name="barracuda_web_filter" vendor="barracuda_networks">
        <vers num="3.3.0.038" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0973" seq="2008-0973" published="2008-02-25" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in Double-Take (aka HP StorageWorks Storage Mirroring) 4.5.0.1629, and other 4.5.0.x versions, allows remote attackers to have an unknown impact via a packet with a long string in the username field.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/doubletakedown-adv.txt">http://aluigi.altervista.org/adv/doubletakedown-adv.txt</ref>
      <ref source="MISC" url="http://aluigi.org/poc/doubletakedown.zip">http://aluigi.org/poc/doubletakedown.zip</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3698">3698</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488632/100/0/threaded">20080222 Multiple vulnerabilities in Double-Take 5.0.0.2865</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27951">27951</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0666">ADV-2008-0666</ref>
    </refs>
    <vuln_soft>
      <prod name="double-take" vendor="double-take_software">
        <vers num="4.5"/>
        <vers num="5.0.0.2865"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0974" seq="2008-0974" published="2008-02-25" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Double-Take 5.0.0.2865 and earlier, distributed under the HP StorageWorks Storage Mirroring name and other names, allows remote attackers to cause a denial of service (daemon termination) via (1) a large vector&lt;T> value, which raises a "vector&lt;T> too long" exception; or (2) a certain packet that raises an ospace/time/src\date.cpp exception.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/doubletakedown-adv.txt">http://aluigi.altervista.org/adv/doubletakedown-adv.txt</ref>
      <ref source="MISC" url="http://aluigi.org/poc/doubletakedown.zip">http://aluigi.org/poc/doubletakedown.zip</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3698">3698</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488632/100/0/threaded">20080222 Multiple vulnerabilities in Double-Take 5.0.0.2865</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27951">27951</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0666">ADV-2008-0666</ref>
    </refs>
    <vuln_soft>
      <prod name="double-take" vendor="double-take_software">
        <vers num="4.5"/>
        <vers num="5.0.0.2865" prev="1"/>
      </prod>
      <prod name="storageworks_double-take" vendor="hp">
        <vers num="5.0.0.2865" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0975" seq="2008-0975" published="2008-02-25" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Double-Take 5.0.0.2865 and earlier, distributed under the HP StorageWorks Storage Mirroring name and other names, allows remote attackers to cause a denial of service (CPU consumption) via a -1 value in the field that specifies the size of the vector&lt;T> value.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/doubletakedown-adv.txt">http://aluigi.altervista.org/adv/doubletakedown-adv.txt</ref>
      <ref source="MISC" url="http://aluigi.org/poc/doubletakedown.zip">http://aluigi.org/poc/doubletakedown.zip</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3698">3698</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488632/100/0/threaded">20080222 Multiple vulnerabilities in Double-Take 5.0.0.2865</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27951">27951</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0666">ADV-2008-0666</ref>
    </refs>
    <vuln_soft>
      <prod name="double-take" vendor="double-take_software">
        <vers num="4.5"/>
        <vers num="5.0.0.2865"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0976" seq="2008-0976" published="2008-02-25" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Double-Take 5.0.0.2865 and earlier, distributed under the HP StorageWorks Storage Mirroring name and other names, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a malformed packet, as demonstrated by a packet of type (1) 0x2722 or (2) 0x272a.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/doubletakedown-adv.txt">http://aluigi.altervista.org/adv/doubletakedown-adv.txt</ref>
      <ref source="MISC" url="http://aluigi.org/poc/doubletakedown.zip">http://aluigi.org/poc/doubletakedown.zip</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3698">3698</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488632/100/0/threaded">20080222 Multiple vulnerabilities in Double-Take 5.0.0.2865</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27951">27951</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0666">ADV-2008-0666</ref>
    </refs>
    <vuln_soft>
      <prod name="double-take" vendor="double-take_software">
        <vers num="4.5"/>
        <vers num="5.0.0.2865" prev="1"/>
      </prod>
      <prod name="storageworks_double-take" vendor="hp">
        <vers num="5.0.0.2865" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0977" seq="2008-0977" published="2008-02-25" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Double-Take 5.0.0.2865 and earlier, distributed under the HP StorageWorks Storage Mirroring name and other names, allows remote attackers to cause a denial of service (daemon crash) via a certain long packet that triggers an attempt to allocate a large amount of memory.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/doubletakedown-adv.txt">http://aluigi.altervista.org/adv/doubletakedown-adv.txt</ref>
      <ref source="MISC" url="http://aluigi.org/poc/doubletakedown.zip">http://aluigi.org/poc/doubletakedown.zip</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3698">3698</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488632/100/0/threaded">20080222 Multiple vulnerabilities in Double-Take 5.0.0.2865</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27951">27951</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0666">ADV-2008-0666</ref>
    </refs>
    <vuln_soft>
      <prod name="double-take" vendor="double-take_software">
        <vers num="4.5"/>
        <vers num="5.0.0.2865"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0978" seq="2008-0978" published="2008-02-25" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Double-Take 5.0.0.2865 and earlier, distributed under the HP StorageWorks Storage Mirroring name and other names, allows remote attackers to obtain sensitive information via a packet of type (1) 0x2728, which provides operating system and path information; (2) 0x274e, which lists Ethernet adapters; (3) 0x2726, which provides filesystem information; (4) 0x274f, which specifies the printer driver; or (5) 0x2757, which provides recent log entries.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/doubletakedown-adv.txt">http://aluigi.altervista.org/adv/doubletakedown-adv.txt</ref>
      <ref source="MISC" url="http://aluigi.org/poc/doubletakedown.zip">http://aluigi.org/poc/doubletakedown.zip</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3698">3698</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488632/100/0/threaded">20080222 Multiple vulnerabilities in Double-Take 5.0.0.2865</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27951">27951</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0666">ADV-2008-0666</ref>
    </refs>
    <vuln_soft>
      <prod name="double-take" vendor="double-take_software">
        <vers num="4.5"/>
        <vers num="5.0.0.2865"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0979" seq="2008-0979" published="2008-02-25" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Stack consumption vulnerability in Double-Take 5.0.0.2865 and earlier, distributed under the HP StorageWorks Storage Mirroring name and other names, allows remote attackers to cause a denial of service (daemon crash) via a certain packet that triggers the recursive calling of a function.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/doubletakedown-adv.txt">http://aluigi.altervista.org/adv/doubletakedown-adv.txt</ref>
      <ref source="MISC" url="http://aluigi.org/poc/doubletakedown.zip">http://aluigi.org/poc/doubletakedown.zip</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3698">3698</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488632/100/0/threaded">20080222 Multiple vulnerabilities in Double-Take 5.0.0.2865</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27951">27951</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0666">ADV-2008-0666</ref>
    </refs>
    <vuln_soft>
      <prod name="double-take" vendor="double-take_software">
        <vers num="4.5"/>
        <vers num="5.0.0.2865" prev="1"/>
      </prod>
      <prod name="storageworks_double-take" vendor="hp">
        <vers num="5.0.0.2865" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0980" seq="2008-0980" published="2008-02-25" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in Spyce - Python Server Pages (PSP) 2.1.3 allow remote attackers to inject arbitrary web script or HTML via (1) the url or type parameter to docs/examples/redirect.spy; (2) the x parameter to docs/examples/handlervalidate.spy; (3) the name parameter to spyce/examples/request.spy; (4) the Name parameter to spyce/examples/getpost.spy; (5) the mytextarea parameter, the mypass parameter, or an empty parameter to spyce/examples/formtag.spy; (6) the newline parameter to the default URI under demos/chat/; (7) the text1 parameter to docs/examples/formintro.spy; or (8) the mytext or mydate parameter to docs/examples/formtag.spy.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3699">3699</ref>
      <ref source="MISC" url="http://www.procheckup.com/Vulnerability_PR08-01.php">http://www.procheckup.com/Vulnerability_PR08-01.php</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488336/100/0/threaded">20080219 PR08-01: Several XSS, a cross-domain redirect and a webroot disclosure on Spyce - Python Server Pages (PSP)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27898">27898</ref>
    </refs>
    <vuln_soft>
      <prod name="spyce" vendor="spyce">
        <vers num="2.1.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0981" seq="2008-0981" published="2008-02-25" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Open redirect vulnerability in spyce/examples/redirect.spy in Spyce - Python Server Pages (PSP) 2.1.3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the url parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3699">3699</ref>
      <ref source="MISC" url="http://www.procheckup.com/Vulnerability_PR08-01.php">http://www.procheckup.com/Vulnerability_PR08-01.php</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488336/100/0/threaded">20080219 PR08-01: Several XSS, a cross-domain redirect and a webroot disclosure on Spyce - Python Server Pages (PSP)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27898">27898</ref>
    </refs>
    <vuln_soft>
      <prod name="spyce" vendor="spyce">
        <vers num="2.1.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0982" seq="2008-0982" published="2008-02-25" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.8" CVSS_base_score="5.8" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Spyce - Python Server Pages (PSP) 2.1.3 allows remote attackers to obtain sensitive information via a direct request for spyce/examples/automaton.spy, which reveals the path in an error message.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3699">3699</ref>
      <ref source="MISC" url="http://www.procheckup.com/Vulnerability_PR08-01.php">http://www.procheckup.com/Vulnerability_PR08-01.php</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488336/100/0/threaded">20080219 PR08-01: Several XSS, a cross-domain redirect and a webroot disclosure on Spyce - Python Server Pages (PSP)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27898">27898</ref>
    </refs>
    <vuln_soft>
      <prod name="spyce" vendor="spyce">
        <vers num="2.1.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0983" seq="2008-0983" published="2008-02-26" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">lighttpd 1.4.18, and possibly other versions before 1.5.0, does not properly calculate the size of a file descriptor array, which allows remote attackers to cause a denial of service (crash) via a large number of connections, which triggers an out-of-bounds access.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00005.html">SUSE-SR:2008:008</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200803-10.xml">GLSA-200803-10</ref>
      <ref source="CONFIRM" url="http://trac.lighttpd.net/trac/ticket/1562" patch="1">http://trac.lighttpd.net/trac/ticket/1562</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0084">http://wiki.rpath.com/Advisories:rPSA-2008-0084</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1609">DSA-1609</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488926/100/0/threaded">20080228 rPSA-2008-0084-1 lighttpd</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27943" patch="1">27943</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0659/references">ADV-2008-0659</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2284">https://issues.rpath.com/browse/RPL-2284</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00162.html">FEDORA-2008-2262</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00180.html">FEDORA-2008-2278</ref>
    </refs>
    <vuln_soft>
      <prod name="lighttpd" vendor="lighttpd">
        <vers num="1.4.7"/>
        <vers num="1.4.8"/>
        <vers num="1.4.9"/>
        <vers num="1.4.10"/>
        <vers num="1.4.11"/>
        <vers num="1.4.12"/>
        <vers num="1.4.13"/>
        <vers num="1.4.14"/>
        <vers num="1.4.15"/>
        <vers num="1.4.16"/>
        <vers num="1.4.17"/>
        <vers num="1.4.18"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0984" seq="2008-0984" published="2008-02-26" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The MP4 demuxer (mp4.c) for VLC media player 0.8.6d and earlier, as used in Miro Player 1.1 and earlier, allows remote attackers to overwrite arbitrary memory and execute arbitrary code via a malformed MP4 file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2008-February/060481.html">20080227 CORE-2008-0130: VLC media player chunk context validation error</ref>
      <ref source="MISC" url="http://www.coresecurity.com/?action=item&amp;id=2147">http://www.coresecurity.com/?action=item&amp;id=2147</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1543">DSA-1543</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200803-13.xml">GLSA-200803-13</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488841/100/0/threaded">20080227 CORE-2008-0130: VLC media player chunk context validation error</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28007">28007</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019510">1019510</ref>
      <ref source="CONFIRM" url="http://www.videolan.org/security/sa0802.html" patch="1">http://www.videolan.org/security/sa0802.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0682" adv="1">ADV-2008-0682</ref>
    </refs>
    <vuln_soft>
      <prod name="miro_player" vendor="miro">
        <vers num="1.1" prev="1"/>
      </prod>
      <prod name="vlc_media_player" vendor="videolan">
        <vers num="0.8.6d" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0985" seq="2008-0985" published="2008-03-05" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in the GIF library in the WebKit framework for Google Android SDK m3-rc37a and earlier allows remote attackers to execute arbitrary code via a crafted GIF file whose logical screen height and width are different than the actual height and width.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://android-developers.blogspot.com/2008/03/android-sdk-update-m5-rc15-released.html" patch="1">http://android-developers.blogspot.com/2008/03/android-sdk-update-m5-rc15-released.html</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3727">3727</ref>
      <ref source="MISC" url="http://www.coresecurity.com/?action=item&amp;id=2148">http://www.coresecurity.com/?action=item&amp;id=2148</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489135/100/0/threaded">20080304 CORE-2008-0124: Multiple vulnerabilities in Google's Android SDK</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28005">28005</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40998">androidsdk-gifimagedecoderondecode-bo(40998)</ref>
    </refs>
    <vuln_soft>
      <prod name="android_sdk" vendor="google">
        <vers num="m3-rc37a"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0986" seq="2008-0986" published="2008-03-05" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Integer overflow in the BMP::readFromStream method in the libsgl.so library in Google Android SDK m3-rc37a and earlier, and m5-rc14, allows remote attackers to execute arbitrary code via a crafted BMP file with a header containing a negative offset field.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://android-developers.blogspot.com/2008/03/android-sdk-update-m5-rc15-released.html">http://android-developers.blogspot.com/2008/03/android-sdk-update-m5-rc15-released.html</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3727">3727</ref>
      <ref source="MISC" url="http://www.coresecurity.com/?action=item&amp;id=2148">http://www.coresecurity.com/?action=item&amp;id=2148</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489135/100/0/threaded">20080304 CORE-2008-0124: Multiple vulnerabilities in Google's Android SDK</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28006">28006</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40999">androidsdk-bmpreadfromstream-int-overflow(40999)</ref>
    </refs>
    <vuln_soft>
      <prod name="android_sdk" vendor="google">
        <vers num="m3-rc37a" prev="1"/>
        <vers num="m5-rc14"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0987" seq="2008-0987" published="2008-03-18" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in Image Raw in Apple Mac OS X 10.5.2, and Digital Camera RAW Compatibility before Update 2.0 for Aperture 2 and iPhoto 7.1.2, allows remote attackers to execute arbitrary code via a crafted Adobe Digital Negative (DNG) image.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307562">http://docs.info.apple.com/article.html?artnum=307562</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html" patch="1">APPLE-SA-2008-03-18</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Mar/msg00003.html">APPLE-SA-2008-03-20</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT1232">http://support.apple.com/kb/HT1232</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28304">28304</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28363">28363</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019659">1019659</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019683">1019683</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019684">1019684</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-079A.html">TA08-079A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0924/references" adv="1">ADV-2008-0924</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0957/references" adv="1">ADV-2008-0957</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41294">macos-imageraw-bo(41294)</ref>
    </refs>
    <vuln_soft>
      <prod name="aperture" vendor="apple">
        <vers num="2"/>
      </prod>
      <prod name="iphoto" vendor="apple">
        <vers num="7.1.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0988" seq="2008-0988" published="2008-03-18" modified="2011-03-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Off-by-one error in the Libsystem strnstr API in libc on Apple Mac OS X 10.4.11 allows context-dependent attackers to cause a denial of service (crash) via crafted arguments that trigger a buffer over-read.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307562">http://docs.info.apple.com/article.html?artnum=307562</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html" patch="1">APPLE-SA-2008-03-18</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28304">28304</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28374">28374</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019661">1019661</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-079A.html">TA08-079A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0924/references">ADV-2008-0924</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.4.11"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.4.11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0989" seq="2008-0989" published="2008-03-18" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.9" CVSS_base_score="6.9" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Format string vulnerability in mDNSResponderHelper in Apple Mac OS X 10.5.2 allows local users to execute arbitrary code via format string specifiers in the local hostname.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307562">http://docs.info.apple.com/article.html?artnum=307562</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html" patch="1">APPLE-SA-2008-03-18</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28304">28304</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28339">28339</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019662">1019662</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-079A.html">TA08-079A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0924/references">ADV-2008-0924</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41292">macos-mdnsresponderhelper-format-string(41292)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.5.2"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.5.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0990" seq="2008-0990" published="2008-03-18" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.4" CVSS_base_score="4.4" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">notifyd in Apple Mac OS X 10.4.11 does not verify that Mach port death notifications have originated from the kernel, which allows local users to cause a denial of service via spoofed death notifications that prevent other applications from receiving notifications.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307562">http://docs.info.apple.com/article.html?artnum=307562</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html" patch="1">APPLE-SA-2008-03-18</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28304">28304</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28345">28345</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019663">1019663</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-079A.html">TA08-079A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0924/references">ADV-2008-0924</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41289">macos-notifyd-dos(41289)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.4.11"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.4.11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0992" seq="2008-0992" published="2008-03-18" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.8" CVSS_base_score="5.8" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:P)">
    <desc>
      <descript source="cve">Array index error in pax in Apple Mac OS X 10.5.2 allows context-dependent attackers to execute arbitrary code via an archive with a crafted length value.</descript>
    </desc>
    <loss_types>
      <avail/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307562">http://docs.info.apple.com/article.html?artnum=307562</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html" patch="1">APPLE-SA-2008-03-18</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28304">28304</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28365">28365</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019673">1019673</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-079A.html">TA08-079A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0924/references">ADV-2008-0924</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41288">macos-pax-code-execution(41288)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.5.2"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.5.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0993" seq="2008-0993" published="2008-03-18" modified="2013-08-27" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Podcast Capture in Podcast Producer for Apple Mac OS X 10.5.2 invokes a subtask with passwords in command line arguments, which allows local users to read the passwords via process listings.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307562">http://docs.info.apple.com/article.html?artnum=307562</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html" patch="1">APPLE-SA-2008-03-18</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28304">28304</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28372">28372</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019664">1019664</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-079A.html">TA08-079A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0924/references">ADV-2008-0924</ref>
    </refs>
    <vuln_soft>
      <prod name="podcast_producer" vendor="apple">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0994" seq="2008-0994" published="2008-03-18" modified="2017-08-07" severity="Low" CVSS_version="2.0" CVSS_score="2.6" CVSS_base_score="2.6" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Preview in Apple Mac OS X 10.5.2 uses 40-bit RC4 when saving a PDF file with encryption, which makes it easier for attackers to decrypt the file via brute force methods.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307562">http://docs.info.apple.com/article.html?artnum=307562</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html" patch="1">APPLE-SA-2008-03-18</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28304">28304</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28386">28386</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019665">1019665</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-079A.html">TA08-079A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0924/references">ADV-2008-0924</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41276">macos-preview-weak-encryption(41276)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.5.2"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.5.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0995" seq="2008-0995" published="2008-03-18" modified="2017-08-07" severity="Low" CVSS_version="2.0" CVSS_score="2.6" CVSS_base_score="2.6" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The Printing component in Apple Mac OS X 10.5.2 uses 40-bit RC4 when printing to an encrypted PDF file, which makes it easier for attackers to decrypt the file via brute force methods.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307562">http://docs.info.apple.com/article.html?artnum=307562</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html" patch="1">APPLE-SA-2008-03-18</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28304">28304</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28387">28387</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019667">1019667</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-079A.html">TA08-079A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0924/references">ADV-2008-0924</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41287">macos-printing-weak-encryption(41287)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.5.2"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.5.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0996" seq="2008-0996" published="2008-03-18" modified="2017-08-07" severity="Low" CVSS_version="2.0" CVSS_score="1.7" CVSS_base_score="1.7" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.1" CVSS_vector="(AV:L/AC:L/Au:S/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The Printing component in Apple Mac OS X 10.5.2 might save authentication credentials to disk when starting a job on an authenticated print queue, which might allow local users to obtain the credentials.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307562">http://docs.info.apple.com/article.html?artnum=307562</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html" patch="1">APPLE-SA-2008-03-18</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28304">28304</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28344">28344</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019667">1019667</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-079A.html">TA08-079A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0924/references">ADV-2008-0924</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41284">macos-printqueue-information-disclosure(41284)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.5.2"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.5.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0997" seq="2008-0997" published="2008-03-18" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in AppKit in Apple Mac OS X 10.4.11 allows user-assisted remote attackers to cause a denial of service (application termination) and execute arbitrary code via a crafted PostScript Printer Description (PPD) file that is not properly handled when querying a network printer.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307562">http://docs.info.apple.com/article.html?artnum=307562</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html" patch="1">APPLE-SA-2008-03-18</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28304">28304</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28364">28364</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019648">1019648</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-079A.html">TA08-079A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0924/references">ADV-2008-0924</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41282">macos-appkit-ppd-bo(41282)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.4.11"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.4.11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0998" seq="2008-0998" published="2008-03-18" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.9" CVSS_base_score="6.9" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in NetCfgTool in the System Configuration component in Apple Mac OS X 10.4.11 and 10.5.2 allows local users to bypass authorization and execute arbitrary code via crafted distributed objects.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307562">http://docs.info.apple.com/article.html?artnum=307562</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html" patch="1">APPLE-SA-2008-03-18</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28304">28304</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28385">28385</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019674">1019674</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-079A.html">TA08-079A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0924/references">ADV-2008-0924</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41281">macos-netcfgtool-code-execution(41281)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.4.11"/>
        <vers num="10.5.2"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.4.11"/>
        <vers num="10.5.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-0999" seq="2008-0999" published="2008-03-18" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.1" CVSS_base_score="7.1" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Apple Mac OS X 10.5.2 allows user-assisted attackers to cause a denial of service (crash) via a crafted Universal Disc Format (UDF) disk image, which triggers a NULL pointer dereference.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307562">http://docs.info.apple.com/article.html?artnum=307562</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html" patch="1">APPLE-SA-2008-03-18</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28304">28304</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28389">28389</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019669">1019669</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-079A.html">TA08-079A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0924/references">ADV-2008-0924</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41280">macos-udf-dos(41280)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.5.2"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.5.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1000" seq="2008-1000" published="2008-03-18" modified="2018-10-15" severity="High" CVSS_version="2.0" CVSS_score="8.5" CVSS_base_score="8.5" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="6.8" CVSS_vector="(AV:N/AC:M/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in ContentServer.py in the Wiki Server in Apple Mac OS X 10.5.2 (aka Leopard) allows remote authenticated users to write arbitrary files via ".." sequences in file attachments.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307562">http://docs.info.apple.com/article.html?artnum=307562</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html">APPLE-SA-2008-03-18</ref>
      <ref source="MISC" url="http://www.coresecurity.com/index.php5?module=ContentMod&amp;action=item&amp;id=2189" patch="1">http://www.coresecurity.com/index.php5?module=ContentMod&amp;action=item&amp;id=2189</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489786/100/0/threaded">20080318 CORE-2008-0123: Leopard Server Remote Path Traversal</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28278">28278</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019660">1019660</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0924/references">ADV-2008-0924</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41278">macos-contentserver-directory-traversal(41278)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.5.2"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.5.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1001" seq="2008-1001" published="2008-03-18" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Apple Safari before 3.1, when running on Windows XP or Vista, allows remote attackers to inject arbitrary web script or HTML via a crafted URL that is not properly handled in the error page.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307563">http://docs.info.apple.com/article.html?artnum=307563</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Mar/msg00000.html" patch="1">APPLE-SA-2008-03-18</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28290">28290</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28321">28321</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019653">1019653</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-079A.html">TA08-079A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0920/references">ADV-2008-0920</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41333">safari-errorpage-xss(41333)</ref>
    </refs>
    <vuln_soft>
      <prod name="safari" vendor="apple">
        <vers num="3.0"/>
        <vers num="3.0.1"/>
        <vers num="3.0.2"/>
        <vers num="3.0.3"/>
        <vers num="3.0.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1002" seq="2008-1002" published="2008-03-18" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Apple Safari before 3.1 allows remote attackers to inject arbitrary web script or HTML via a crafted javascript: URL.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307563">http://docs.info.apple.com/article.html?artnum=307563</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Mar/msg00000.html" patch="1">APPLE-SA-2008-03-18</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/766019">VU#766019</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28290">28290</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28328">28328</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019653">1019653</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-079A.html">TA08-079A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0920/references">ADV-2008-0920</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41335">safari-javascripturls-security-bypass(41335)</ref>
    </refs>
    <vuln_soft>
      <prod name="safari" vendor="apple">
        <vers num="0.8"/>
        <vers num="0.9"/>
        <vers num="1.0"/>
        <vers num="1.1"/>
        <vers num="1.2"/>
        <vers num="1.3"/>
        <vers num="1.3.1"/>
        <vers num="1.3.2"/>
        <vers num="2.0"/>
        <vers num="2.0.2"/>
        <vers num="2.0.4"/>
        <vers num="3.0"/>
        <vers num="3.0.1"/>
        <vers num="3.0.2"/>
        <vers num="3.0.3"/>
        <vers num="3.0.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1003" seq="2008-1003" published="2008-03-18" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in WebCore, as used in Apple Safari before 3.1, allows remote attackers to inject arbitrary web script or HTML via unknown vectors related to sites that set the document.domain property or have the same document.domain.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307563">http://docs.info.apple.com/article.html?artnum=307563</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Mar/msg00000.html" patch="1">APPLE-SA-2008-03-18</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28290">28290</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28330">28330</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019653">1019653</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-079A.html">TA08-079A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0920/references">ADV-2008-0920</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41334">safari-documentdomain-security-bypass(41334)</ref>
    </refs>
    <vuln_soft>
      <prod name="safari" vendor="apple">
        <vers num="0.8"/>
        <vers num="0.9"/>
        <vers num="1.0"/>
        <vers num="1.1"/>
        <vers num="1.2"/>
        <vers num="1.3"/>
        <vers num="1.3.1"/>
        <vers num="1.3.2"/>
        <vers num="2.0"/>
        <vers num="2.0.2"/>
        <vers num="2.0.4"/>
        <vers num="3.0"/>
        <vers num="3.0.1"/>
        <vers num="3.0.2"/>
        <vers num="3.0.3"/>
        <vers num="3.0.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1004" seq="2008-1004" published="2008-03-18" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in WebCore, as used in Apple Safari before 3.1, allows remote attackers to inject arbitrary web script or HTML via unknown vectors related to the Web Inspector.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307563">http://docs.info.apple.com/article.html?artnum=307563</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Mar/msg00000.html" patch="1">APPLE-SA-2008-03-18</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28290">28290</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28347">28347</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019653">1019653</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-079A.html">TA08-079A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0920/references">ADV-2008-0920</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41331">safari-webinspector-security-bypass(41331)</ref>
    </refs>
    <vuln_soft>
      <prod name="safari" vendor="apple">
        <vers num="0.8"/>
        <vers num="0.9"/>
        <vers num="1.0"/>
        <vers num="1.1"/>
        <vers num="1.2"/>
        <vers num="1.3"/>
        <vers num="1.3.1"/>
        <vers num="1.3.2"/>
        <vers num="2.0"/>
        <vers num="2.0.2"/>
        <vers num="2.0.4"/>
        <vers num="3.0"/>
        <vers num="3.0.1"/>
        <vers num="3.0.2"/>
        <vers num="3.0.3"/>
        <vers num="3.0.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1005" seq="2008-1005" published="2008-03-18" modified="2017-08-07" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">WebCore, as used in Apple Safari before 3.1, does not properly mask the password field when reverse conversion is used with the Kotoeri input method, which allows physically proximate attackers to read the password.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307563">http://docs.info.apple.com/article.html?artnum=307563</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Mar/msg00000.html">APPLE-SA-2008-03-18</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28290">28290</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28326">28326</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019656">1019656</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-079A.html">TA08-079A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0920/references">ADV-2008-0920</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41329">safari-webcore-weak-security(41329)</ref>
    </refs>
    <vuln_soft>
      <prod name="safari" vendor="apple">
        <vers num="0.8"/>
        <vers num="0.9"/>
        <vers num="1.0"/>
        <vers num="1.1"/>
        <vers num="1.2"/>
        <vers num="1.3"/>
        <vers num="1.3.1"/>
        <vers num="1.3.2"/>
        <vers num="2.0"/>
        <vers num="2.0.2"/>
        <vers num="2.0.4"/>
        <vers num="3.0"/>
        <vers num="3.0.1"/>
        <vers num="3.0.2"/>
        <vers num="3.0.3"/>
        <vers num="3.0.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1006" seq="2008-1006" published="2008-03-18" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in WebCore, as used in Apple Safari before 3.1, allows remote attackers to inject arbitrary web script or HTML by using the window.open function to change the security context of a web page.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307563">http://docs.info.apple.com/article.html?artnum=307563</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Mar/msg00000.html" patch="1">APPLE-SA-2008-03-18</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28290">28290</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28332">28332</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019653">1019653</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-079A.html">TA08-079A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0920/references">ADV-2008-0920</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41326">safari-windowopen-security-bypass(41326)</ref>
    </refs>
    <vuln_soft>
      <prod name="safari" vendor="apple">
        <vers num="0.8"/>
        <vers num="0.9"/>
        <vers num="1.0"/>
        <vers num="1.1"/>
        <vers num="1.2"/>
        <vers num="1.3"/>
        <vers num="1.3.1"/>
        <vers num="1.3.2"/>
        <vers num="2.0"/>
        <vers num="2.0.2"/>
        <vers num="2.0.4"/>
        <vers num="3.0"/>
        <vers num="3.0.1"/>
        <vers num="3.0.2"/>
        <vers num="3.0.3"/>
        <vers num="3.0.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1007" seq="2008-1007" published="2008-03-18" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">WebCore, as used in Apple Safari before 3.1, does not enforce the frame navigation policy for Java applets, which allows remote attackers to conduct cross-site scripting (XSS) attacks.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307563" adv="1">http://docs.info.apple.com/article.html?artnum=307563</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Mar/msg00000.html">APPLE-SA-2008-03-18</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28290">28290</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28335">28335</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019653">1019653</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-079A.html">TA08-079A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0920/references" adv="1">ADV-2008-0920</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41324">safari-navigation-policy-security-bypass(41324)</ref>
    </refs>
    <vuln_soft>
      <prod name="safari" vendor="apple">
        <vers num="0.8"/>
        <vers num="0.9"/>
        <vers num="1.0"/>
        <vers num="1.1"/>
        <vers num="1.2"/>
        <vers num="1.3"/>
        <vers num="1.3.1"/>
        <vers num="1.3.2"/>
        <vers num="2.0"/>
        <vers num="2.0.2"/>
        <vers num="2.0.4"/>
        <vers num="3.0"/>
        <vers num="3.0.1"/>
        <vers num="3.0.2"/>
        <vers num="3.0.3"/>
        <vers num="3.0.4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1008" seq="2008-1008" published="2008-03-18" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in WebCore, as used in Apple Safari before 3.1, allows remote attackers to inject arbitrary web script or HTML via the document.domain property.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307563">http://docs.info.apple.com/article.html?artnum=307563</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Mar/msg00000.html" patch="1">APPLE-SA-2008-03-18</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28290">28290</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28336">28336</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019653">1019653</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-079A.html">TA08-079A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0920/references">ADV-2008-0920</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41323">safari-documentdomain-xss(41323)</ref>
    </refs>
    <vuln_soft>
      <prod name="safari" vendor="apple">
        <vers num="0.8"/>
        <vers num="0.9"/>
        <vers num="1.0"/>
        <vers num="1.1"/>
        <vers num="1.2"/>
        <vers num="1.3"/>
        <vers num="1.3.1"/>
        <vers num="1.3.2"/>
        <vers num="2.0"/>
        <vers num="2.0.2"/>
        <vers num="2.0.4"/>
        <vers num="3.0"/>
        <vers num="3.0.1"/>
        <vers num="3.0.2"/>
        <vers num="3.0.3"/>
        <vers num="3.0.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1009" seq="2008-1009" published="2008-03-18" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in WebCore, as used in Apple Safari before 3.1, allows remote attackers to inject arbitrary JavaScript by modifying the history object.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307563">http://docs.info.apple.com/article.html?artnum=307563</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Mar/msg00000.html" patch="1">APPLE-SA-2008-03-18</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28290">28290</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28337">28337</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019653">1019653</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-079A.html">TA08-079A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0920/references">ADV-2008-0920</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41322">safari-historyobject-security-bypass(41322)</ref>
    </refs>
    <vuln_soft>
      <prod name="safari" vendor="apple">
        <vers num="0.8"/>
        <vers num="0.9"/>
        <vers num="1.0"/>
        <vers num="1.1"/>
        <vers num="1.2"/>
        <vers num="1.3"/>
        <vers num="1.3.1"/>
        <vers num="1.3.2"/>
        <vers num="2.0"/>
        <vers num="2.0.2"/>
        <vers num="2.0.4"/>
        <vers num="3.0"/>
        <vers num="3.0.1"/>
        <vers num="3.0.2"/>
        <vers num="3.0.3"/>
        <vers num="3.0.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1010" seq="2008-1010" published="2008-03-18" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in WebKit, as used in Apple Safari before 3.1, allows remote attackers to execute arbitrary code via crafted regular expressions in JavaScript.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307563">http://docs.info.apple.com/article.html?artnum=307563</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Mar/msg00000.html" patch="1">APPLE-SA-2008-03-18</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28290">28290</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28338">28338</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019654">1019654</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-079A.html">TA08-079A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0920/references">ADV-2008-0920</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41321">safari-webkit-bo(41321)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00402.html">FEDORA-2008-3229</ref>
    </refs>
    <vuln_soft>
      <prod name="safari" vendor="apple">
        <vers num="0.8"/>
        <vers num="0.9"/>
        <vers num="1.0"/>
        <vers num="1.1"/>
        <vers num="1.2"/>
        <vers num="1.3"/>
        <vers num="1.3.1"/>
        <vers num="1.3.2"/>
        <vers num="2.0"/>
        <vers num="2.0.2"/>
        <vers num="2.0.4"/>
        <vers num="3.0"/>
        <vers num="3.0.1"/>
        <vers num="3.0.2"/>
        <vers num="3.0.3"/>
        <vers num="3.0.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1011" seq="2008-1011" published="2008-03-18" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in WebKit, as used in Apple Safari before 3.1, allows remote attackers to inject arbitrary web script or HTML via a frame that calls a method instance in another frame.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=307563">http://docs.info.apple.com/article.html?artnum=307563</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Mar/msg00000.html" patch="1">APPLE-SA-2008-03-18</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28290">28290</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28342">28342</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019653">1019653</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-079A.html">TA08-079A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0920/references">ADV-2008-0920</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41320">safari-webkitcomponent-security-bypass(41320)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00402.html">FEDORA-2008-3229</ref>
    </refs>
    <vuln_soft>
      <prod name="safari" vendor="apple">
        <vers num="0.8"/>
        <vers num="0.9"/>
        <vers num="1.0"/>
        <vers num="1.1"/>
        <vers num="1.2"/>
        <vers num="1.3"/>
        <vers num="1.3.1"/>
        <vers num="1.3.2"/>
        <vers num="2.0"/>
        <vers num="2.0.2"/>
        <vers num="2.0.4"/>
        <vers num="3.0"/>
        <vers num="3.0.1"/>
        <vers num="3.0.2"/>
        <vers num="3.0.3"/>
        <vers num="3.0.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1012" seq="2008-1012" published="2008-03-20" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Apple AirPort Extreme Base Station Firmware 7.3.1 allows remote attackers to cause a denial of service (file sharing hang) via a crafted AFP request, related to "input validation."</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Mar/msg00002.html">APPLE-SA-2008-03-19</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT1226">http://support.apple.com/kb/HT1226</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28348">28348</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019678">1019678</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0955/references">ADV-2008-0955</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41325">airport-extremebasestation-afp-dos(41325)</ref>
    </refs>
    <vuln_soft>
      <prod name="apple_airport_extreme_base_station" vendor="apple">
        <vers num="" edition=":7.3.1_firmware"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1013" seq="2008-1013" published="2008-04-04" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Apple QuickTime before 7.4.5 enables deserialization of QTJava objects by untrusted Java applets, which allows remote attackers to execute arbitrary code via a crafted applet.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019757">1019757</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT1241">http://support.apple.com/kb/HT1241</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28583">28583</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-094A.html" patch="1">TA08-094A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1078">ADV-2008-1078</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41601">quicktime-qtjava-code-execution(41601)</ref>
    </refs>
    <vuln_soft>
      <prod name="quicktime" vendor="apple">
        <vers num="7.4.4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1014" seq="2008-1014" published="2008-04-04" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Apple QuickTime before 7.4.5 does not properly handle external URLs in movies, which allows remote attackers to obtain sensitive information.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019758">1019758</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT1241">http://support.apple.com/kb/HT1241</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28583">28583</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-094A.html" patch="1">TA08-094A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1078">ADV-2008-1078</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41602">quicktime-moviefiles-information-disclosure(41602)</ref>
    </refs>
    <vuln_soft>
      <prod name="quicktime" vendor="apple">
        <vers num="7.4.4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1015" seq="2008-1015" published="2008-04-04" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in the data reference atom handling in Apple QuickTime before 7.4.5 allows remote attackers to execute arbitrary code via a crafted movie.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//Jul/msg00000.html">APPLE-SA-2008-07-10</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019759">1019759</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT1241">http://support.apple.com/kb/HT1241</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28583">28583</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-094A.html" patch="1">TA08-094A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1078">ADV-2008-1078</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2064/references">ADV-2008-2064</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41604">quicktime-data-reference-bo(41604)</ref>
    </refs>
    <vuln_soft>
      <prod name="quicktime" vendor="apple">
        <vers num="7.4.4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1016" seq="2008-1016" published="2008-04-04" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Apple QuickTime before 7.4.5 does not properly handle movie media tracks, which allows remote attackers to execute arbitrary code via a crafted movie that triggers memory corruption.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019760">1019760</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT1241">http://support.apple.com/kb/HT1241</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28583">28583</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-094A.html" patch="1">TA08-094A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1078">ADV-2008-1078</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41605">quicktime-movie-media-code-execution(41605)</ref>
    </refs>
    <vuln_soft>
      <prod name="quicktime" vendor="apple">
        <vers num="7.4.4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1017" seq="2008-1017" published="2008-04-04" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in clipping region (aka crgn) atom handling in quicktime.qts in Apple QuickTime before 7.4.5 allows remote attackers to execute arbitrary code via a crafted movie.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//Jul/msg00000.html">APPLE-SA-2008-07-10</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019761">1019761</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT1241">http://support.apple.com/kb/HT1241</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490460/100/0/threaded">20080403 ZDI-08-015: Apple QuickTime Clipping Region Heap Overflow Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28583">28583</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-094A.html" patch="1">TA08-094A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1078">ADV-2008-1078</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2064/references">ADV-2008-2064</ref>
      <ref source="MISC" url="http://www.zerodayinitiative.com/advisories/ZDI-08-015">http://www.zerodayinitiative.com/advisories/ZDI-08-015</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41607">quicktime-crgn-bo(41607)</ref>
    </refs>
    <vuln_soft>
      <prod name="quicktime" vendor="apple">
        <vers num="7.4.4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1018" seq="2008-1018" published="2008-04-04" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in Apple QuickTime before 7.4.5 allows remote attackers to execute arbitrary code via an MP4A movie with a malformed Channel Compositor (aka chan) atom.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//Jul/msg00000.html">APPLE-SA-2008-07-10</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019762">1019762</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT1241">http://support.apple.com/kb/HT1241</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490467/100/0/threaded">20080403 ZDI-08-016: Apple QuickTime MP4A Atom Parsing Heap Corruption Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28583">28583</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-094A.html" patch="1">TA08-094A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1078">ADV-2008-1078</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2064/references">ADV-2008-2064</ref>
      <ref source="MISC" url="http://www.zerodayinitiative.com/advisories/ZDI-08-016">http://www.zerodayinitiative.com/advisories/ZDI-08-016</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41606">quicktime-chan-bo(41606)</ref>
    </refs>
    <vuln_soft>
      <prod name="quicktime" vendor="apple">
        <vers num="7.4.4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1019" seq="2008-1019" published="2008-04-04" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in quickTime.qts in Apple QuickTime before 7.4.5 allows remote attackers to execute arbitrary code via a crafted PICT image file, related to an improperly terminated memory copy loop.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019763">1019763</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT1241">http://support.apple.com/kb/HT1241</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490459/100/0/threaded">20080403 ZDI-08-014: Apple Quicktime Multiple Opcode Memory Corruption Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28583">28583</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-094A.html" patch="1">TA08-094A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1078">ADV-2008-1078</ref>
      <ref source="MISC" url="http://www.zerodayinitiative.com/advisories/ZDI-08-014">http://www.zerodayinitiative.com/advisories/ZDI-08-014</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41609">quicktime-pict-records-bo(41609)</ref>
    </refs>
    <vuln_soft>
      <prod name="quicktime" vendor="apple">
        <vers num="7.4.4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1020" seq="2008-1020" published="2008-04-04" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in quickTime.qts in Apple QuickTime before 7.4.5 on Windows allows remote attackers to execute arbitrary code via a crafted PICT image file with Kodak encoding, related to error checking and error messages.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019764">1019764</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT1241">http://support.apple.com/kb/HT1241</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490468/100/0/threaded">20080403 ZDI-08-017: Apple QuickTime Kodak Encoding Heap Overflow Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28583">28583</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-094A.html" patch="1">TA08-094A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1078">ADV-2008-1078</ref>
      <ref source="MISC" url="http://www.zerodayinitiative.com/advisories/ZDI-08-017">http://www.zerodayinitiative.com/advisories/ZDI-08-017</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41610">quicktime-pictimage-bo(41610)</ref>
    </refs>
    <vuln_soft>
      <prod name="quicktime" vendor="apple">
        <vers num="7.4.4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1021" seq="2008-1021" published="2008-04-04" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in Animation codec content handling in Apple QuickTime before 7.4.5 on Windows allows remote attackers to execute arbitrary code via a crafted movie with run length encoding.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019765">1019765</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT1241">http://support.apple.com/kb/HT1241</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490462/100/0/threaded">20080403 ZDI-08-018: Apple QuickTime Run Length Encoding Heap Overflow Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28583">28583</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-094A.html" patch="1">TA08-094A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1078">ADV-2008-1078</ref>
      <ref source="MISC" url="http://www.zerodayinitiative.com/advisories/ZDI-08-018">http://www.zerodayinitiative.com/advisories/ZDI-08-018</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41612">quicktime-animation-codec-bo(41612)</ref>
    </refs>
    <vuln_soft>
      <prod name="quicktime" vendor="apple">
        <vers num="7.4.4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1022" seq="2008-1022" published="2008-04-04" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in Apple QuickTime before 7.4.5 allows remote attackers to execute arbitrary code via a crafted VR movie with an obji atom of zero size.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019766">1019766</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT1241">http://support.apple.com/kb/HT1241</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490461/100/0/threaded">20080403 ZDI-08-019: Apple QuickTime Malformed VR obji Atom Parsing Memory Corruption Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28583">28583</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-094A.html" patch="1">TA08-094A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1078">ADV-2008-1078</ref>
      <ref source="MISC" url="http://www.zerodayinitiative.com/advisories/ZDI-08-019">http://www.zerodayinitiative.com/advisories/ZDI-08-019</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41613">quicktime-obji-atoms-bo(41613)</ref>
    </refs>
    <vuln_soft>
      <prod name="quicktime" vendor="apple">
        <vers num="7.4.4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1023" seq="2008-1023" published="2008-04-04" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in Clip opcode parsing in Apple QuickTime before 7.4.5 on Windows allows remote attackers to execute arbitrary code via a crafted PICT image file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019767">1019767</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT1241">http://support.apple.com/kb/HT1241</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28583">28583</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-094A.html" patch="1">TA08-094A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1078">ADV-2008-1078</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41615">quicktime-clip-opcodes-bo(41615)</ref>
    </refs>
    <vuln_soft>
      <prod name="quicktime" vendor="apple">
        <vers num="7.4.4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1024" seq="2008-1024" published="2008-04-17" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Apple Safari before 3.1.1, when running on Windows XP or Vista, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a file download with a crafted file name, which triggers memory corruption.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Apr/msg00001.html">APPLE-SA-2008-04-16</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT1467">http://support.apple.com/kb/HT1467</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/529441">VU#529441</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28813">28813</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019868">1019868</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0979/references">ADV-2008-0979</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41864">apple-safari-filedownload-code-execution(41864)</ref>
    </refs>
    <vuln_soft>
      <prod name="safari" vendor="apple">
        <vers num="3"/>
        <vers num="3.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1025" seq="2008-1025" published="2008-04-17" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Apple WebKit, as used in Safari before 3.1.1, allows remote attackers to inject arbitrary web script or HTML via a crafted URL with a colon in the hostname portion.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//Jul/msg00001.html">APPLE-SA-2008-07-11</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Apr/msg00001.html">APPLE-SA-2008-04-16</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT1467">http://support.apple.com/kb/HT1467</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/705529">VU#705529</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28814">28814</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019869">1019869</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1250/references">ADV-2008-1250</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2094/references">ADV-2008-2094</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41862">apple-safari-webkit-hostname-xss(41862)</ref>
    </refs>
    <vuln_soft>
      <prod name="safari" vendor="apple">
        <vers num="0.8"/>
        <vers num="0.9"/>
        <vers num="1.0"/>
        <vers num="1.0.3"/>
        <vers num="1.1"/>
        <vers num="1.2"/>
        <vers num="1.3"/>
        <vers num="1.3.1"/>
        <vers num="1.3.2"/>
        <vers num="2.0"/>
        <vers num="2.0.2"/>
        <vers num="2.0.4"/>
        <vers num="3.0"/>
        <vers num="3.0.2"/>
        <vers num="3.0.3"/>
        <vers num="3.0.4"/>
        <vers num="3.1"/>
      </prod>
      <prod name="webkit" vendor="apple">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1026" seq="2008-1026" published="2008-04-17" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Integer overflow in the PCRE regular expression compiler (JavaScriptCore/pcre/pcre_compile.cpp) in Apple WebKit, as used in Safari before 3.1.1, allows remote attackers to execute arbitrary code via a regular expression with large, nested repetition counts, which triggers a heap-based buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//Jul/msg00001.html">APPLE-SA-2008-07-11</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Apr/msg00001.html">APPLE-SA-2008-04-16</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3815">3815</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT1467" patch="1">http://support.apple.com/kb/HT1467</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490990/100/0/threaded">20080416 ZDI-08-022: Apple Safari WebKit PCRE Handling Integer Overflow Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28815">28815</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019870">1019870</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1250/references">ADV-2008-1250</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2094/references">ADV-2008-2094</ref>
      <ref source="MISC" url="http://www.zerodayinitiative.com/advisories/ZDI-08-022" patch="1">http://www.zerodayinitiative.com/advisories/ZDI-08-022</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41859">apple-safari-webkit-pcrecompile-bo(41859)</ref>
    </refs>
    <vuln_soft>
      <prod name="safari" vendor="apple">
        <vers num="3"/>
        <vers num="3.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1027" seq="2008-1027" published="2008-06-02" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Apple Filing Protocol (AFP) Server in Apple Mac OS X before 10.5.3 does not verify that requested files and directories are inside shared folders, which allows remote attackers to read arbitrary files via unspecified AFP traffic.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//May/msg00001.html">APPLE-SA-2008-05-28</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020130">1020130</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29412">29412</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29490">29490</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-150A.html">TA08-150A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1697">ADV-2008-1697</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42703">macosx-afpserver-security-bypass(42703)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.4.11"/>
        <vers num="10.5"/>
        <vers num="10.5.1"/>
        <vers num="10.5.2"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.4.11"/>
        <vers num="10.5"/>
        <vers num="10.5.1"/>
        <vers num="10.5.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1028" seq="2008-1028" published="2008-06-02" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in AppKit in Apple Mac OS X before 10.5 allows user-assisted remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted document file, as demonstrated by opening the document with TextEdit.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//May/msg00001.html">APPLE-SA-2008-05-28</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020131">1020131</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29412">29412</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29487">29487</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-150A.html">TA08-150A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1697" adv="1">ADV-2008-1697</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42705">macosx-appkit-code-execution(42705)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.4.11"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.4.11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1030" seq="2008-1030" published="2008-06-02" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Integer overflow in the CFDataReplaceBytes function in the CFData API in CoreFoundation in Apple Mac OS X before 10.5.3 allows context-dependent attackers to execute arbitrary code or cause a denial of service (crash) via an invalid length argument, which triggers a heap-based buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//May/msg00001.html">APPLE-SA-2008-05-28</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020135">1020135</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29412">29412</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29491">29491</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-150A.html">TA08-150A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1697" adv="1">ADV-2008-1697</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42709">macosx-corefoundation-cfdatareplacebytes-bo(42709)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.4.11"/>
        <vers num="10.5"/>
        <vers num="10.5.1"/>
        <vers num="10.5.2"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.4.11"/>
        <vers num="10.5"/>
        <vers num="10.5.1"/>
        <vers num="10.5.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1031" seq="2008-1031" published="2008-06-02" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">CoreGraphics in Apple Mac OS X before 10.5.3 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted PDF document, related to an uninitialized variable.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//May/msg00001.html">APPLE-SA-2008-05-28</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020136">1020136</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29412">29412</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29480">29480</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-150A.html">TA08-150A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1697">ADV-2008-1697</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42710">macosx-coregraphics-unspec-code-execution(42710)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.4.11"/>
        <vers num="10.5"/>
        <vers num="10.5.1"/>
        <vers num="10.5.2"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.4.11"/>
        <vers num="10.5"/>
        <vers num="10.5.1"/>
        <vers num="10.5.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1032" seq="2008-1032" published="2008-06-02" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Incomplete blacklist vulnerability in CoreTypes in Apple Mac OS X before 10.5.3 allows user-assisted remote attackers to execute arbitrary code via an (1) Automator, (2) Help, (3) Safari, or (4) Terminal content type for a downloadable object, which does not trigger a "potentially unsafe" warning message in (a) the Download Validation feature in Mac OS X 10.4 or (b) the Quarantine feature in Mac OS X 10.5.</descript>
      <descript source="nvd">Per: http://cwe.mitre.org/data/definitions/184.html
'CWE-184: Incomplete Blacklist'</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//May/msg00001.html" patch="1">APPLE-SA-2008-05-28</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020137">1020137</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29412" patch="1">29412</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29481">29481</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-150A.html" patch="1">TA08-150A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1697" adv="1">ADV-2008-1697</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42711">macosx-coretypes-weak-security(42711)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.4.11"/>
        <vers num="10.5"/>
        <vers num="10.5.1"/>
        <vers num="10.5.2"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.4.11"/>
        <vers num="10.5"/>
        <vers num="10.5.1"/>
        <vers num="10.5.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1033" seq="2008-1033" published="2008-06-02" modified="2017-08-07" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:N/AC:H/Au:S/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The scheduler in CUPS in Apple Mac OS X 10.5 before 10.5.3, when debug logging is enabled and a printer requires a password, allows attackers to obtain sensitive information (credentials) by reading the log data, related to "authentication environment variables."</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//May/msg00001.html">APPLE-SA-2008-05-28</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020145">1020145</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29412">29412</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29484">29484</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-150A.html">TA08-150A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1697" adv="1">ADV-2008-1697</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42713">macosx-cups-info-disclosure(42713)</ref>
    </refs>
    <vuln_soft>
      <prod name="cups" vendor="apple">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1034" seq="2008-1034" published="2008-06-02" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Integer underflow in Help Viewer in Apple Mac OS X before 10.5 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted help:topic URL that triggers a buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//May/msg00001.html">APPLE-SA-2008-05-28</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020138">1020138</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/566875">VU#566875</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29412">29412</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29483">29483</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-150A.html">TA08-150A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1697" adv="1">ADV-2008-1697</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42716">macosx-helpviewer-bo(42716)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.0"/>
        <vers num="10.1"/>
        <vers num="10.2"/>
        <vers num="10.3"/>
        <vers num="10.4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1035" seq="2008-1035" published="2008-06-03" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Use-after-free vulnerability in Apple iCal 3.0.1 on Mac OS X allows remote CalDAV servers, and user-assisted remote attackers, to trigger memory corruption or possibly execute arbitrary code via an "ATTACH;VALUE=URI:S=osumi" line in a .ics file, which triggers a "resource liberation" bug.  NOTE: CVE-2008-2007 was originally used for this issue, but this is the appropriate identifier.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//May/msg00001.html">APPLE-SA-2008-05-28</ref>
      <ref source="MISC" url="http://www.coresecurity.com/?action=item&amp;id=2219">http://www.coresecurity.com/?action=item&amp;id=2219</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492414/100/0/threaded">20080521 CORE-2008-0126: Multiple vulnerabilities in iCal</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492638/100/100/threaded">20080527 Re: CORE-2008-0126: Multiple vulnerabilities in iCal</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492682/100/0/threaded">20080528 Re: CORE-2008-0126: Multiple vulnerabilities in iCal</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28633">28633</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29412">29412</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29486">29486</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020095">1020095</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-150A.html">TA08-150A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1601">ADV-2008-1601</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1697">ADV-2008-1697</ref>
    </refs>
    <vuln_soft>
      <prod name="ical" vendor="apple">
        <vers num="3.0.1" edition=":os_x"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1036" seq="2008-1036" published="2008-06-02" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The International Components for Unicode (ICU) library in Apple Mac OS X before 10.5.3, Red Hat Enterprise Linux 5, and other operating systems omits some invalid character sequences during conversion of some character encodings, which might allow remote attackers to conduct cross-site scripting (XSS) attacks.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//May/msg00001.html" adv="1" patch="1">APPLE-SA-2008-05-28</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020139">1020139</ref>
      <ref source="MISC" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0064">http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0064</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2009/dsa-1762">DSA-1762</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2009-0296.html">RHSA-2009:0296</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29412">29412</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29488">29488</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/USN-747-1">USN-747-1</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-150A.html" patch="1">TA08-150A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1697" adv="1">ADV-2008-1697</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42717">macosx-icu-security-bypass(42717)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10824">oval:org.mitre.oval:def:10824</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.4.11"/>
        <vers num="10.5"/>
        <vers num="10.5.1"/>
        <vers num="10.5.2"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.4.11"/>
        <vers num="10.5"/>
        <vers num="10.5.1"/>
        <vers num="10.5.2"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1037" seq="2008-1037" published="2008-02-27" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the file listing function in the web management interface in Packeteer PacketShaper and PolicyCenter 8.2.2 allows remote attackers to inject arbitrary web script or HTML via the FILELIST parameter to an arbitrary component, which triggers injection into an Error Report page.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3701">3701</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488712/100/0/threaded">20080224 Packeteer Products File Listing XSS</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27982">27982</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019501">1019501</ref>
    </refs>
    <vuln_soft>
      <prod name="packetshaper" vendor="packeteer">
        <vers num="8.2.2"/>
      </prod>
      <prod name="policycenter" vendor="packeteer">
        <vers num="8.2.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1038" seq="2008-1038" published="2008-02-27" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in mod/mod.extmanager.php in DBHcms 1.1.4 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the extmanager_install parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27996">27996</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40835">dbhcms-modextmanager-file-include(40835)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5189">5189</ref>
    </refs>
    <vuln_soft>
      <prod name="dbhcms" vendor="drbenhur.com">
        <vers num="1.1.3"/>
        <vers num="1.1.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1039" seq="2008-1039" published="2008-02-27" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in question.asp in PORAR WEBBOARD allows remote attackers to execute arbitrary SQL commands via the QID parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27989">27989</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40839">porar-question-sql-injection(40839)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5185">5185</ref>
    </refs>
    <vuln_soft>
      <prod name="webboard" vendor="porar">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1040" seq="2008-1040" published="2008-02-27" modified="2011-03-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the Single Sign-On function in Fujitsu Interstage Application Server 8.0.0 through 8.0.3 and 9.0.0, Interstage Studio 8.0.1 and 9.0.0, and Interstage Apworks 8.0.0 allows remote attackers to execute arbitrary code via a long URI.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.fujitsu.com/global/support/software/security/products-f/interstage-200804e.html">http://www.fujitsu.com/global/support/software/security/products-f/interstage-200804e.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27966">27966</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0662">ADV-2008-0662</ref>
    </refs>
    <vuln_soft>
      <prod name="interstage_application_server_enterprise" vendor="fujitsu">
        <vers num="8.0.0" edition=":rehl_as4_x86"/>
        <vers num="8.0.0" edition=":rhel_as4_em64t"/>
        <vers num="8.0.0" edition=":solaris"/>
        <vers num="8.0.0" edition=":windows"/>
        <vers num="8.0.1" edition=":windows"/>
        <vers num="8.0.2" edition=":rhel_as4_em64t"/>
        <vers num="8.0.2" edition=":rhel_as4_x86"/>
        <vers num="8.0.2" edition=":solaris"/>
        <vers num="8.0.2" edition=":windows"/>
        <vers num="8.0.3" edition=":rhel_as4_em64t"/>
        <vers num="8.0.3" edition=":rhel_as4_x86"/>
        <vers num="8.0.3" edition=":solaris"/>
        <vers num="8.0.3" edition=":windows"/>
        <vers num="v9.0.0" edition=":rhel5_intel64"/>
        <vers num="v9.0.0" edition=":rhel5_ipf"/>
        <vers num="v9.0.0" edition=":rhel5_x86"/>
        <vers num="v9.0.0" edition=":rhel_as4_em64t"/>
        <vers num="v9.0.0" edition=":rhel_as4_ipf"/>
        <vers num="v9.0.0" edition=":rhel_as4_x86"/>
        <vers num="v9.0.0" edition=":solaris"/>
        <vers num="v9.0.0" edition=":windows"/>
        <vers num="v9.0.0a" edition=":rhel5_ipf"/>
        <vers num="v9.0.0a" edition=":rhel_as4_ipf"/>
        <vers num="v9.0.0a" edition=":windows"/>
      </prod>
      <prod name="interstage_application_server_standard_j" vendor="fujitsu">
        <vers num="8.0.0" edition=":rhel_as4_em64t"/>
        <vers num="8.0.0" edition=":rhel_as4_x86"/>
        <vers num="8.0.0" edition=":solaris"/>
        <vers num="8.0.0" edition=":windows"/>
        <vers num="8.0.2" edition=":rhel_as4_em64t"/>
        <vers num="8.0.2" edition=":rhel_as4_x86"/>
        <vers num="8.0.2" edition=":solaris"/>
        <vers num="8.0.2" edition=":windows"/>
        <vers num="8.0.3" edition=":rhel_as4_em64t"/>
        <vers num="8.0.3" edition=":rhel_as4_x86"/>
        <vers num="8.0.3" edition=":solaris"/>
        <vers num="8.0.3" edition=":windows"/>
        <vers num="v9.0.0.0" edition=":rhel5_intel64"/>
        <vers num="v9.0.0.0" edition=":rhel5_ipf"/>
        <vers num="v9.0.0.0" edition=":rhel5_x86"/>
        <vers num="v9.0.0.0" edition=":rhel_as4_em64t"/>
        <vers num="v9.0.0.0" edition=":rhel_as4_ipf"/>
        <vers num="v9.0.0.0" edition=":rhel_as4_x86"/>
        <vers num="v9.0.0.0" edition=":solaris"/>
        <vers num="v9.0.0.0" edition=":windows"/>
        <vers num="v9.0.0a" edition=":windows"/>
      </prod>
      <prod name="interstage_apworks_enterprise" vendor="fujitsu">
        <vers num="8.0.0" edition=":windows"/>
      </prod>
      <prod name="interstage_apworks_standard_j" vendor="fujitsu">
        <vers num="8.0.0" edition=":windows"/>
      </prod>
      <prod name="interstage_studio_enterprise" vendor="fujitsu">
        <vers num="8.0.1" edition=":windows"/>
        <vers num="v9.0.0" edition=":windows"/>
      </prod>
      <prod name="interstage_studio_standard_j" vendor="fujitsu">
        <vers num="8.0.1" edition=":windows"/>
        <vers num="v9.0.0" edition=":windows"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1041" seq="2008-1041" published="2008-02-27" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in mwhois.php in Matt Wilson Matt's Whois (MWhois) allows remote attackers to inject arbitrary web script or HTML via the domain parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.packetstormsecurity.org/0802-exploits/mattswhois-xss.txt">http://www.packetstormsecurity.org/0802-exploits/mattswhois-xss.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27974">27974</ref>
    </refs>
    <vuln_soft>
      <prod name="matts_whois" vendor="matts_whois">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1042" seq="2008-1042" published="2008-02-27" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in include/body.inc.php in Linux Web Shop (LWS) php Download Manager 1.0 and 1.1 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the content parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27961">27961</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40795">phpdownloadmanager-body-file-include(40795)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5183">5183</ref>
    </refs>
    <vuln_soft>
      <prod name="php_download_manager" vendor="linux_web_shop">
        <vers num="1.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1043" seq="2008-1043" published="2008-02-27" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in templates/default/header.inc.php in Linux Web Shop (LWS) php User Base 1.3 BETA allows remote attackers to execute arbitrary PHP code via a URL in the menu parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/494140/100/0/threaded">20080710 phpuserbase 1.3 (menu) Remote File Inclusion Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27963">27963</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40794">phpuserbase-header-file-include(40794)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5180">5180</ref>
    </refs>
    <vuln_soft>
      <prod name="php_user_base" vendor="linux_web_shop">
        <vers num="1.3" edition="beta"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1044" seq="2008-1044" published="2008-02-27" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the Quantum Streaming Player (Quantum Streaming IE Player) ActiveX control (aka QSP2IE.QSP2IE) in qsp2ie07076007.dll 7.7.6.7 and qsp2ie07074039.dll 7.7.4.39 in Move Media Player allows remote attackers to execute arbitrary code via a long argument to the UploadLogs method, a different vector than CVE-2007-4722.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2008-February/060460.html">20080226 Move Networks Quantum Streaming Player UploadLogs() Buffer Overflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27995">27995</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0684">ADV-2008-0684</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5190">5190</ref>
    </refs>
    <vuln_soft>
      <prod name="move_media_player" vendor="move_networks_inc">
        <vers num=""/>
      </prod>
      <prod name="qunatum_streaming_player" vendor="move_networks_inc">
        <vers num="7.7.4_39"/>
        <vers num="7.7.6.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1045" seq="2008-1045" published="2008-02-27" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the file tree navigation function in system/workplace/views/explorer/tree_files.jsp in Alkacon OpenCMS 7.0.3 allows remote attackers to inject arbitrary web script or HTML via the resource parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3702">3702</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488708/100/0/threaded">20080224 Alkacon OpenCms tree_files.jsp resource XSS</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27986">27986</ref>
    </refs>
    <vuln_soft>
      <prod name="opencms" vendor="alkacon">
        <vers num="7.0.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1046" seq="2008-1046" published="2008-02-27" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in footer.php in Quinsonnas Mail Checker 1.55 allows remote attackers to execute arbitrary PHP code via a URL in the op[footer_body] parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5176">5176</ref>
    </refs>
    <vuln_soft>
      <prod name="quinsonnas_mail_checker" vendor="quinsonnas">
        <vers num="1.55"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1047" seq="2008-1047" published="2008-02-27" modified="2012-10-24" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in tiki-edit_article.php in TikiWiki before 1.9.10.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://dev.tikiwiki.org/tiki-view_tracker_item.php?itemId=1498">http://dev.tikiwiki.org/tiki-view_tracker_item.php?itemId=1498</ref>
      <ref source="CONFIRM" url="http://tikiwiki.org/ReleaseNotes1910" patch="1">http://tikiwiki.org/ReleaseNotes1910</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27968" patch="1">27968</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0661">ADV-2008-0661</ref>
    </refs>
    <vuln_soft>
      <prod name="tikiwiki_cms/groupware" vendor="tiki">
        <vers num="1.6.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1048" seq="2008-1048" published="2008-02-27" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in manager/xmedia.php in Plume CMS 1.2.2 allows remote attackers to inject arbitrary web script or HTML via the dir parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.digitrustgroup.com/advisories/web-application-security-plume-cms.html">http://www.digitrustgroup.com/advisories/web-application-security-plume-cms.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27999">27999</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019507">1019507</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40841">plume-xmedia-xss(40841)</ref>
    </refs>
    <vuln_soft>
      <prod name="plume_cms" vendor="plume-cms">
        <vers num="1.2.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1049" seq="2008-1049" published="2008-02-27" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Parallels SiteStudio before 1.7.2, and 1.8.x before 1.8b, as used in Parallels H-Sphere 3.0 before Patch 9 and 2.5 before Patch 11, has unknown impact and attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.psoft.net/misc/hs_ss_technical_update.html" patch="1">http://www.psoft.net/misc/hs_ss_technical_update.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28002">28002</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019506">1019506</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40846">hsphere-sitestudio-unspecified(40846)</ref>
    </refs>
    <vuln_soft>
      <prod name="h-sphere" vendor="positive_software">
        <vers num="2.5_patch_10" prev="1"/>
        <vers num="3.0_patch_8" prev="1"/>
      </prod>
      <prod name="sitestudio" vendor="positive_software">
        <vers num="1.7.1"/>
        <vers num="1.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1050" seq="2008-1050" published="2008-02-27" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in Softbiz Jokes &amp; Funny Pics Script allows remote attackers to execute arbitrary SQL commands via the sbcat_id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3703">3703</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488706/100/0/threaded">20080224 Softbiz jokes and funny pictures (index.php) sql injection</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27973">27973</ref>
    </refs>
    <vuln_soft>
      <prod name="jokes_and_funny_pictures_script" vendor="softbiz">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1051" seq="2008-1051" published="2008-02-27" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in include/body_comm.inc.php in phpProfiles 4.5.2 BETA allows remote attackers to execute arbitrary PHP code via a URL in the content parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27952">27952</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5175">5175</ref>
    </refs>
    <vuln_soft>
      <prod name="phpprofiles_" vendor="phpprofiles">
        <vers num="4.5.2" edition="beta"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1052" seq="2008-1052" published="2008-02-27" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:P)">
    <desc>
      <descript source="cve">The administration web interface in NetWin SurgeFTP 2.3a2 and earlier allows remote attackers to cause a denial of service (daemon crash) via a large integer in the Content-Length HTTP header, which triggers a NULL pointer dereference when memory allocation fails.</descript>
    </desc>
    <loss_types>
      <avail/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/surgeftpizza-adv.txt">http://aluigi.altervista.org/adv/surgeftpizza-adv.txt</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3704">3704</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488745/100/0/threaded">20080225 NULL pointer in SurgeFTP 2.3a2</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27993">27993</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40843">surgeftp-contentlength-dos(40843)</ref>
    </refs>
    <vuln_soft>
      <prod name="surgeftp" vendor="netwin">
        <vers num="2.3a2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1053" seq="2008-1053" published="2008-02-27" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in the Kose_Yazilari module for PHP-Nuke allow remote attackers to execute arbitrary SQL commands via the artid parameter in a (1) viewarticle or (2) printpage action to modules.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27991">27991</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40848">koseyazilari-artid-sql-injection(40848)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5186">5186</ref>
    </refs>
    <vuln_soft>
      <prod name="kose_yazilari_module" vendor="phpnuke">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1054" seq="2008-1054" published="2008-02-27" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the _lib_spawn_user_getpid function in (1) swatch.exe and (2) surgemail.exe in NetWin SurgeMail 38k4 and earlier, and beta 39a, allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via an HTTP request with multiple long headers to webmail.exe and unspecified other CGI executables, which triggers an overflow when assigning values to environment variables.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/surgemailz-adv.txt">http://aluigi.altervista.org/adv/surgemailz-adv.txt</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3705">3705</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488741/100/0/threaded">20080225 Format string and buffer-overflow in SurgeMail 38k4</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27992">27992</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019500">1019500</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0678">ADV-2008-0678</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40834">surgemail-webmail-bo(40834)</ref>
    </refs>
    <vuln_soft>
      <prod name="surgemail" vendor="netwin">
        <vers num="1.8a"/>
        <vers num="1.8b3"/>
        <vers num="1.8d"/>
        <vers num="1.8e"/>
        <vers num="1.8g3"/>
        <vers num="1.9"/>
        <vers num="1.9b2"/>
        <vers num="2.0a2"/>
        <vers num="2.0c"/>
        <vers num="2.0e"/>
        <vers num="2.0g2"/>
        <vers num="2.1a"/>
        <vers num="2.1c7"/>
        <vers num="2.2a6"/>
        <vers num="2.2c9"/>
        <vers num="2.2c10"/>
        <vers num="2.2g2"/>
        <vers num="2.2g3"/>
        <vers num="3.0a"/>
        <vers num="3.0c2"/>
        <vers num="3.1s"/>
        <vers num="3.8f3"/>
        <vers num="3.8i"/>
        <vers num="3.8i2"/>
        <vers num="3.8i3"/>
        <vers num="38k"/>
        <vers num="38k4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1055" seq="2008-1055" published="2008-02-27" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Format string vulnerability in webmail.exe in NetWin SurgeMail 38k4 and earlier and beta 39a, and WebMail 3.1s and earlier, allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via format string specifiers in the page parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/surgemailz-adv.txt">http://aluigi.altervista.org/adv/surgemailz-adv.txt</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3705">3705</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488741/100/0/threaded">20080225 Format string and buffer-overflow in SurgeMail 38k4</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27990">27990</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019500">1019500</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0678">ADV-2008-0678</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40833">surgemail-webmail-format-string(40833)</ref>
    </refs>
    <vuln_soft>
      <prod name="surgemail" vendor="netwin">
        <vers num="1.8a"/>
        <vers num="1.8b3"/>
        <vers num="1.8d"/>
        <vers num="1.8e"/>
        <vers num="1.8g3"/>
        <vers num="1.9"/>
        <vers num="1.9b2"/>
        <vers num="2.0a2"/>
        <vers num="2.0c"/>
        <vers num="2.0e"/>
        <vers num="2.0g2"/>
        <vers num="2.1a"/>
        <vers num="2.1c7"/>
        <vers num="2.2a6"/>
        <vers num="2.2c9"/>
        <vers num="2.2c10"/>
        <vers num="2.2g2"/>
        <vers num="2.2g3"/>
        <vers num="3.0a"/>
        <vers num="3.0c2"/>
        <vers num="3.8f3"/>
        <vers num="38k4" prev="1"/>
        <vers num="39a"/>
        <vers num="beta_39a"/>
      </prod>
      <prod name="webmail" vendor="netwin">
        <vers num="3.1s" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1056" seq="2008-1056" published="2008-02-28" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.9" CVSS_base_score="6.9" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple stack-based buffer overflows in Symark PowerBroker 2.8 through 5.0.1 allow local users to gain privileges via a long argv[0] string when executing (1) pbrun, (2) pbsh, or (3) pbksh.  NOTE: the product is often installed in environments with trust relationships that facilitate subsequent remote compromises.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.mnin.org/advisories/2008_symarkpb.pdf">http://www.mnin.org/advisories/2008_symarkpb.pdf</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28015" patch="1">28015</ref>
      <ref source="CONFIRM" url="http://www.symark.com/support/PBFeb2008Announcement.html" patch="1">http://www.symark.com/support/PBFeb2008Announcement.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40872">powerbroker-argv-bo(40872)</ref>
    </refs>
    <vuln_soft>
      <prod name="powerbroker" vendor="symark">
        <vers num="2.8"/>
        <vers num="3.0"/>
        <vers num="3.2"/>
        <vers num="3.5"/>
        <vers num="4.0"/>
        <vers num="5.0"/>
        <vers num="5.01"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1057" seq="2008-1057" published="2008-02-28" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">The ip6_check_rh0hdr function in netinet6/ip6_input.c in OpenBSD 4.2 allows attackers to cause a denial of service (panic) via malformed IPv6 routing headers.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="OPENBSD" url="http://www.openbsd.org/errata42.html#008_ip6rthdr" patch="1">20080225 008: RELIABILITY FIX: February 25, 2008</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27965" patch="1">27965</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019496">1019496</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0660">ADV-2008-0660</ref>
    </refs>
    <vuln_soft>
      <prod name="openbsd" vendor="openbsd">
        <vers num="4.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1058" seq="2008-1058" published="2008-02-28" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">The tcp_respond function in netinet/tcp_subr.c in OpenBSD 4.1 and 4.2 allows attackers to cause a denial of service (panic) via crafted TCP packets.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="OPENBSD" url="http://www.openbsd.org/errata41.html#013_tcprespond" patch="1">20080222 013: RELIABILITY FIX: February 22, 2008</ref>
      <ref source="OPENBSD" url="http://www.openbsd.org/errata42.html#007_tcprespond" patch="1">20080222 007: RELIABILITY FIX: February 22, 2008</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27949" patch="1">27949</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019495">1019495</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0660">ADV-2008-0660</ref>
    </refs>
    <vuln_soft>
      <prod name="openbsd" vendor="openbsd">
        <vers num="4.1"/>
        <vers num="4.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1059" seq="2008-1059" published="2008-02-28" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in modules/syntax_highlight.php in the Sniplets 1.1.2 and 1.2.2 plugin for WordPress allows remote attackers to execute arbitrary PHP code via a URL in the libpath parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3706">3706</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488734/100/0/threaded">20080225 Wordpress Plugin Sniplets 1.1.2 Multiple Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27985">27985</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40829">sniplets-syntaxhighlight-file-include(40829)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5194">5194</ref>
    </refs>
    <vuln_soft>
      <prod name="sniplets_plugin" vendor="wordpress">
        <vers num="1.1.2"/>
        <vers num="1.2.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1060" seq="2008-1060" published="2008-02-28" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Eval injection vulnerability in modules/execute.php in the Sniplets 1.1.2 and 1.2.2 plugin for WordPress allows remote attackers to execute arbitrary PHP code via the text parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3706">3706</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488734/100/0/threaded">20080225 Wordpress Plugin Sniplets 1.1.2 Multiple Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27985">27985</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40831">sniplets-execute-code-execution(40831)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5194">5194</ref>
    </refs>
    <vuln_soft>
      <prod name="sniplets_plugin" vendor="wordpress">
        <vers num="1.1.2"/>
        <vers num="1.2.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1061" seq="2008-1061" published="2008-02-28" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in the Sniplets 1.1.2 and 1.2.2 plugin for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) text parameter to (a) warning.php, (b) notice.php, and (c) inset.php in view/sniplets/, and possibly (d) modules/execute.php; the (2) url parameter to (e) view/admin/submenu.php; and the (3) page parameter to (f) view/admin/pager.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3706">3706</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488734/100/0/threaded">20080225 Wordpress Plugin Sniplets 1.1.2 Multiple Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27985">27985</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40830">sniplets-multiple-xss(40830)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5194">5194</ref>
    </refs>
    <vuln_soft>
      <prod name="sniplets_plugin" vendor="wordpress">
        <vers num="1.1.2"/>
        <vers num="1.2.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1062" seq="2008-1062" published="2008-02-28" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">InterVideo IMC Server (aka IMCSvr.exe) and InterVideo Home Theater (aka IHT.exe) in InterVideo WinDVD Media Center 2.11.15.0 allow remote attackers to cause a denial of service (NULL dereference and application crash) via a crafted packet with two CRLF sequences.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28016">28016</ref>
    </refs>
    <vuln_soft>
      <prod name="windvd_media_center" vendor="intervideo">
        <vers num="2.11.15.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1063" seq="2008-1063" published="2008-02-28" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability index.php in the XM-Memberstats (xmmemberstats) module for XOOPS allows remote attackers to inject arbitrary web script or HTML via the sortby parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.xssing.com/index.php?x=3&amp;y=12">http://www.xssing.com/index.php?x=3&amp;y=12</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41001">xmmemberstats-sortby-xss(41001)</ref>
    </refs>
    <vuln_soft>
      <prod name="xm-memberstats" vendor="xoops">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1064" seq="2008-1064" published="2008-02-28" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in images.php in the Red Mexico RMSOFT Gallery System (GS) 2.0 module (aka rmgs) for XOOPS allows remote attackers to inject arbitrary web script or HTML via the q parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.xssing.com/index.php?x=3&amp;y=12">http://www.xssing.com/index.php?x=3&amp;y=12</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41013">rmsoftgallerysystem-images-xss(41013)</ref>
    </refs>
    <vuln_soft>
      <prod name="xoops_rmsoft_gallery_system" vendor="xoops">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1065" seq="2008-1065" published="2008-02-28" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in index.php in the XM-Memberstats (xmmemberstats) 2.0e module for XOOPS allow remote attackers to execute arbitrary SQL commands via the (1) letter or (2) sortby parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27979">27979</ref>
      <ref source="MISC" url="http://www.xssing.com/index.php?x=3&amp;y=12">http://www.xssing.com/index.php?x=3&amp;y=12</ref>
    </refs>
    <vuln_soft>
      <prod name="xm_memberstats" vendor="xoops">
        <vers num="2.0e"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1066" seq="2008-1066" published="2008-02-28" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The modifier.regex_replace.php plugin in Smarty before 2.6.19, as used by Serendipity (S9Y) and other products, allows attackers to call arbitrary PHP functions via templates, related to a '\0' character in a search string.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://blog.s9y.org/archives/191-Serendipity-1.3-beta1-released.html">http://blog.s9y.org/archives/191-Serendipity-1.3-beta1-released.html</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00008.html">SUSE-SR:2008:007</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-201111-04.xml">GLSA-201111-04</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1520">DSA-1520</ref>
      <ref source="CONFIRM" url="http://www.phpinsider.com/smarty-forum/viewtopic.php?p=47652">http://www.phpinsider.com/smarty-forum/viewtopic.php?p=47652</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28105">28105</ref>
      <ref source="CONFIRM" url="http://www.smarty.net/misc/NEWS">http://www.smarty.net/misc/NEWS</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41002">smarty-modifierregexreplace-security-bypass(41002)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00298.html">FEDORA-2008-2650</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00358.html">FEDORA-2008-2587</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00551.html">FEDORA-2008-2656</ref>
    </refs>
    <vuln_soft>
      <prod name="smarty" vendor="smarty">
        <vers num="2.6.18" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1067" seq="2008-1067" published="2008-02-28" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple PHP remote file inclusion vulnerabilities in phpQLAdmin 2.2.7 allow remote attackers to execute arbitrary PHP code via a URL in the _SESSION[path] parameter to (1) ezmlm.php and (2) tools/update_translations.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5173">5173</ref>
    </refs>
    <vuln_soft>
      <prod name="phpqladmin" vendor="phpqladmin">
        <vers num="2.2.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1068" seq="2008-1068" published="2008-02-28" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple PHP remote file inclusion vulnerabilities in Portail Web Php 2.5.1.1 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the site_path parameter to (1) Vert/index.php, (2) Noir/index.php, and (3) Bleu/index.php in template/, different vectors than CVE-2008-0645.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27962">27962</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5182">5182</ref>
    </refs>
    <vuln_soft>
      <prod name="portail_web_php" vendor="portail_web_php">
        <vers num="2.5.1.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1069" seq="2008-1069" published="2008-02-28" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple PHP remote file inclusion vulnerabilities in Quantum Game Library 0.7.2c allow remote attackers to execute arbitrary PHP code via a URL in the CONFIG[gameroot] parameter to (1) server_request.php and (2) qlib/smarty.inc.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27945">27945</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40776">quantumgame-server-file-include(40776)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5174">5174</ref>
    </refs>
    <vuln_soft>
      <prod name="quantum_game_library" vendor="quantum_game_library">
        <vers num="0.7.2c"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1070" seq="2008-1070" published="2008-02-28" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The SCTP dissector in Wireshark (formerly Ethereal) 0.99.5 through 0.99.7 allows remote attackers to cause a denial of service (crash) via a malformed packet.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html">SUSE-SR:2008:005</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200803-32.xml">GLSA-200803-32</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2008-392.htm">http://support.avaya.com/elmodocs2/security/ASA-2008-392.htm</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0092">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0092</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:057">MDVSA-2008:057</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0890.html">RHSA-2008:0890</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488967/100/0/threaded">20080229 rPSA-2008-0092-1 tshark wireshark</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28025">28025</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019515">1019515</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0704">ADV-2008-0704</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2773">ADV-2008-2773</ref>
      <ref source="CONFIRM" url="http://www.wireshark.org/security/wnpa-sec-2008-01.html" adv="1">http://www.wireshark.org/security/wnpa-sec-2008-01.html</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2296">https://issues.rpath.com/browse/RPL-2296</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11378">oval:org.mitre.oval:def:11378</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14995">oval:org.mitre.oval:def:14995</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00140.html">FEDORA-2008-2941</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00228.html">FEDORA-2008-3040</ref>
    </refs>
    <vuln_soft>
      <prod name="wireshark" vendor="wireshark">
        <vers num="0.6"/>
        <vers num="0.7.9"/>
        <vers num="0.8.16"/>
        <vers num="0.9.10"/>
        <vers num="0.10"/>
        <vers num="0.10.4"/>
        <vers num="0.10.13"/>
        <vers num="0.99"/>
        <vers num="0.99.1"/>
        <vers num="0.99.2"/>
        <vers num="0.99.3"/>
        <vers num="0.99.4"/>
        <vers num="0.99.5"/>
        <vers num="0.99.6"/>
        <vers num="0.99.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1071" seq="2008-1071" published="2008-02-28" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The SNMP dissector in Wireshark (formerly Ethereal) 0.99.6 through 0.99.7 allows remote attackers to cause a denial of service (crash) via a malformed packet.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html">SUSE-SR:2008:005</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200803-32.xml">GLSA-200803-32</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2008-392.htm">http://support.avaya.com/elmodocs2/security/ASA-2008-392.htm</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0092">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0092</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:057">MDVSA-2008:057</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0890.html">RHSA-2008:0890</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488967/100/0/threaded">20080229 rPSA-2008-0092-1 tshark wireshark</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28025">28025</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019515">1019515</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0704">ADV-2008-0704</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2773">ADV-2008-2773</ref>
      <ref source="CONFIRM" url="http://www.wireshark.org/security/wnpa-sec-2008-01.html">http://www.wireshark.org/security/wnpa-sec-2008-01.html</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2296">https://issues.rpath.com/browse/RPL-2296</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11633">oval:org.mitre.oval:def:11633</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14784">oval:org.mitre.oval:def:14784</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00140.html">FEDORA-2008-2941</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00228.html">FEDORA-2008-3040</ref>
    </refs>
    <vuln_soft>
      <prod name="wireshark" vendor="wireshark">
        <vers num="0.6"/>
        <vers num="0.7.9"/>
        <vers num="0.8.16"/>
        <vers num="0.9.10"/>
        <vers num="0.10"/>
        <vers num="0.10.4"/>
        <vers num="0.10.13"/>
        <vers num="0.99"/>
        <vers num="0.99.1"/>
        <vers num="0.99.2"/>
        <vers num="0.99.3"/>
        <vers num="0.99.4"/>
        <vers num="0.99.5"/>
        <vers num="0.99.6"/>
        <vers num="0.99.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1072" seq="2008-1072" published="2008-02-28" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.7" CVSS_base_score="4.7" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">The TFTP dissector in Wireshark (formerly Ethereal) 0.6.0 through 0.99.7, when running on Ubuntu 7.10, allows remote attackers to cause a denial of service (crash or memory consumption) via a malformed packet, possibly related to a Cairo library bug.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html">SUSE-SR:2008:005</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200803-32.xml">GLSA-200803-32</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2008-392.htm">http://support.avaya.com/elmodocs2/security/ASA-2008-392.htm</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0092">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0092</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:057">MDVSA-2008:057</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0890.html">RHSA-2008:0890</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488967/100/0/threaded">20080229 rPSA-2008-0092-1 tshark wireshark</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28025">28025</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019515">1019515</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0704">ADV-2008-0704</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2773">ADV-2008-2773</ref>
      <ref source="CONFIRM" url="http://www.wireshark.org/security/wnpa-sec-2008-01.html">http://www.wireshark.org/security/wnpa-sec-2008-01.html</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2296">https://issues.rpath.com/browse/RPL-2296</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10188">oval:org.mitre.oval:def:10188</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00140.html">FEDORA-2008-2941</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00228.html">FEDORA-2008-3040</ref>
    </refs>
    <vuln_soft>
      <prod name="wireshark" vendor="wireshark">
        <vers num="0.6"/>
        <vers num="0.7.9"/>
        <vers num="0.8.16"/>
        <vers num="0.9.10"/>
        <vers num="0.10"/>
        <vers num="0.10.4"/>
        <vers num="0.10.13"/>
        <vers num="0.99"/>
        <vers num="0.99.1"/>
        <vers num="0.99.2"/>
        <vers num="0.99.3"/>
        <vers num="0.99.4"/>
        <vers num="0.99.5"/>
        <vers num="0.99.6"/>
        <vers num="0.99.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1073" seq="2008-1073" published="2008-02-28" modified="2011-03-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the report interface in Internet Security Systems (ISS) Internet Scanner 7.0 Service Pack 2 Build 7.2.2005.52 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="JVN" url="http://jvn.jp/jp/JVN%2342381549/index.html">JVN#42381549</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28014">28014</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019508">1019508</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0681">ADV-2008-0681</ref>
    </refs>
    <vuln_soft>
      <prod name="internet_scanner" vendor="internet_security_systems">
        <vers num="7.0_sp2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1074" seq="2008-1074" published="2008-02-28" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in lib/head_auth.php in GROUP-E 1.6.41 allows remote attackers to execute arbitrary PHP code via a URL in the CFG[PREPEND_FILE] parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?group_id=196032&amp;release_id=581434">http://sourceforge.net/project/shownotes.php?group_id=196032&amp;release_id=581434</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28024">28024</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0766">ADV-2008-0766</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5197">5197</ref>
    </refs>
    <vuln_soft>
      <prod name="group_e" vendor="group_e">
        <vers num="1.6.41"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1075" seq="2008-1075" published="2008-02-28" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php in Maian Cart 1.1 allows remote attackers to inject arbitrary web script or HTML via the keywords parameter in a search command.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28028">28028</ref>
    </refs>
    <vuln_soft>
      <prod name="maian_cart" vendor="maianscriptworld">
        <vers num="1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1076" seq="2008-1076" published="2008-02-28" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in search.php in Interspire Shopping Cart 1.x allows remote attackers to inject arbitrary web script or HTML via the search_query parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28029">28029</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40906">interspire-search-xss(40906)</ref>
    </refs>
    <vuln_soft>
      <prod name="shopping_cart" vendor="interspire">
        <vers num="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1077" seq="2008-1077" published="2008-02-28" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the Simpleboard (com_simpleboard) 1.0.3 Stable component for Mambo and Joomla! allows remote attackers to execute arbitrary SQL commands via the catid parameter in a view action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28018">28018</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5195">5195</ref>
    </refs>
    <vuln_soft>
      <prod name="simpleboard" vendor="mamboportal.com">
        <vers num="1.0.3_stable"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1078" seq="2008-1078" published="2008-02-28" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">expn in the am-utils and net-fs packages for Gentoo, rPath Linux, and other distributions, allows local users to overwrite arbitrary files via a symlink attack on the expn[PID] temporary file.  NOTE: this is the same issue as CVE-2003-0308.1.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.gentoo.org/show_bug.cgi?id=210158">http://bugs.gentoo.org/show_bug.cgi?id=210158</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0088">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0088</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200804-09.xml">GLSA-200804-09</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488931/100/0/threaded">20080228 rPSA-2008-0088-1 am-utils</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28044">28044</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2255">https://issues.rpath.com/browse/RPL-2255</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00273.html">FEDORA-2008-10755</ref>
    </refs>
    <vuln_soft>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
      <prod name="rpath_linux" vendor="rpath">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1079" seq="2008-1079" published="2008-03-04" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The outboxWriteUnsent function in FTPThread.class in SendFile.jar for Beehive Software SendFile.NET uses hard-coded credentials for an FTP server, which allows remote attackers to gain privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3711">3711</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488947/100/0/threaded">20080229 Beehive/SendFile.NET - Secure File Transfer Appliance Hardcoded Credentials</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28060">28060</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40982">sendfile-sendfilejar-weak-security(40982)</ref>
    </refs>
    <vuln_soft>
      <prod name="sendfile.net" vendor="beehive_software">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1080" seq="2008-1080" published="2008-02-28" modified="2012-06-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Opera before 9.26 allows user-assisted remote attackers to read arbitrary files by tricking a user into typing the characters of the target filename into a file input.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00010.html">SUSE-SA:2008:011</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200803-09.xml">GLSA-200803-09</ref>
      <ref source="CONFIRM" url="http://www.opera.com/docs/changelogs/linux/926/" patch="1">http://www.opera.com/docs/changelogs/linux/926/</ref>
      <ref source="CONFIRM" url="http://www.opera.com/support/search/view/877/">http://www.opera.com/support/search/view/877/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27901">27901</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0622">ADV-2008-0622</ref>
    </refs>
    <vuln_soft>
      <prod name="opera_browser" vendor="opera">
        <vers num="1.00"/>
        <vers num="2.00"/>
        <vers num="2.10" edition="beta1"/>
        <vers num="2.10" edition="beta2"/>
        <vers num="2.10" edition="beta3"/>
        <vers num="2.12"/>
        <vers num="3.00" edition="beta"/>
        <vers num="3.10"/>
        <vers num="3.21"/>
        <vers num="3.50"/>
        <vers num="3.51"/>
        <vers num="3.60"/>
        <vers num="3.61"/>
        <vers num="3.62" edition="beta"/>
        <vers num="4.00" edition="beta2"/>
        <vers num="4.00" edition="beta3"/>
        <vers num="4.00" edition="beta4"/>
        <vers num="4.00" edition="beta5"/>
        <vers num="4.00" edition="beta6"/>
        <vers num="4.01"/>
        <vers num="4.02"/>
        <vers num="5.0" edition="beta2"/>
        <vers num="5.0" edition="beta3"/>
        <vers num="5.0" edition="beta4"/>
        <vers num="5.0" edition="beta5"/>
        <vers num="5.0" edition="beta6"/>
        <vers num="5.0" edition="beta7"/>
        <vers num="5.0" edition="beta8"/>
        <vers num="5.02"/>
        <vers num="5.10"/>
        <vers num="5.11"/>
        <vers num="5.12"/>
        <vers num="6.0" edition="beta1"/>
        <vers num="6.0" edition="beta2"/>
        <vers num="6.0" edition="tp1"/>
        <vers num="6.0" edition="tp2"/>
        <vers num="6.0" edition="tp3"/>
        <vers num="6.01"/>
        <vers num="6.1" edition="beta1"/>
        <vers num="6.02"/>
        <vers num="6.03"/>
        <vers num="6.04"/>
        <vers num="6.05"/>
        <vers num="6.06"/>
        <vers num="6.11"/>
        <vers num="6.12"/>
        <vers num="7.0" edition="beta1"/>
        <vers num="7.0" edition="beta1_v2"/>
        <vers num="7.0" edition="beta2"/>
        <vers num="7.01"/>
        <vers num="7.02"/>
        <vers num="7.03"/>
        <vers num="7.10" edition="beta1"/>
        <vers num="7.11" edition="beta2"/>
        <vers num="7.20" edition="beta7"/>
        <vers num="7.21"/>
        <vers num="7.22"/>
        <vers num="7.23"/>
        <vers num="7.50" edition="beta1"/>
        <vers num="7.51"/>
        <vers num="7.52"/>
        <vers num="7.53"/>
        <vers num="7.54" edition="update1"/>
        <vers num="7.54" edition="update2"/>
        <vers num="7.60"/>
        <vers num="8.0" edition="beta1"/>
        <vers num="8.0" edition="beta2"/>
        <vers num="8.0" edition="beta3"/>
        <vers num="8.01"/>
        <vers num="8.02"/>
        <vers num="8.50"/>
        <vers num="8.51"/>
        <vers num="8.52"/>
        <vers num="8.53"/>
        <vers num="8.54"/>
        <vers num="9.0" edition="beta1"/>
        <vers num="9.0" edition="beta2"/>
        <vers num="9.01"/>
        <vers num="9.02"/>
        <vers num="9.10"/>
        <vers num="9.12"/>
        <vers num="9.20" edition="beta1"/>
        <vers num="9.21"/>
        <vers num="9.22"/>
        <vers num="9.23"/>
        <vers num="9.24"/>
        <vers num="9.25" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1081" seq="2008-1081" published="2008-02-28" modified="2012-06-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Opera before 9.26 allows user-assisted remote attackers to execute arbitrary script via images that contain custom comments, which are treated as script when the user displays the image properties.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00010.html">SUSE-SA:2008:011</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200803-09.xml">GLSA-200803-09</ref>
      <ref source="CONFIRM" url="http://www.opera.com/docs/changelogs/linux/926/" patch="1">http://www.opera.com/docs/changelogs/linux/926/</ref>
      <ref source="CONFIRM" url="http://www.opera.com/support/search/view/879/">http://www.opera.com/support/search/view/879/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27901">27901</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0622">ADV-2008-0622</ref>
    </refs>
    <vuln_soft>
      <prod name="opera_browser" vendor="opera">
        <vers num="1.00"/>
        <vers num="2.00"/>
        <vers num="2.10" edition="beta1"/>
        <vers num="2.10" edition="beta2"/>
        <vers num="2.10" edition="beta3"/>
        <vers num="2.12"/>
        <vers num="3.00" edition="beta"/>
        <vers num="3.10"/>
        <vers num="3.21"/>
        <vers num="3.50"/>
        <vers num="3.51"/>
        <vers num="3.60"/>
        <vers num="3.61"/>
        <vers num="3.62" edition="beta"/>
        <vers num="4.00" edition="beta2"/>
        <vers num="4.00" edition="beta3"/>
        <vers num="4.00" edition="beta4"/>
        <vers num="4.00" edition="beta5"/>
        <vers num="4.00" edition="beta6"/>
        <vers num="4.01"/>
        <vers num="4.02"/>
        <vers num="5.0" edition="beta2"/>
        <vers num="5.0" edition="beta3"/>
        <vers num="5.0" edition="beta4"/>
        <vers num="5.0" edition="beta5"/>
        <vers num="5.0" edition="beta6"/>
        <vers num="5.0" edition="beta7"/>
        <vers num="5.0" edition="beta8"/>
        <vers num="5.02"/>
        <vers num="5.10"/>
        <vers num="5.11"/>
        <vers num="5.12"/>
        <vers num="6.0" edition="beta1"/>
        <vers num="6.0" edition="beta2"/>
        <vers num="6.0" edition="tp1"/>
        <vers num="6.0" edition="tp2"/>
        <vers num="6.0" edition="tp3"/>
        <vers num="6.01"/>
        <vers num="6.1" edition="beta1"/>
        <vers num="6.02"/>
        <vers num="6.03"/>
        <vers num="6.04"/>
        <vers num="6.05"/>
        <vers num="6.06"/>
        <vers num="6.11"/>
        <vers num="6.12"/>
        <vers num="7.0" edition="beta1"/>
        <vers num="7.0" edition="beta1_v2"/>
        <vers num="7.0" edition="beta2"/>
        <vers num="7.01"/>
        <vers num="7.02"/>
        <vers num="7.03"/>
        <vers num="7.10" edition="beta1"/>
        <vers num="7.11" edition="beta2"/>
        <vers num="7.20" edition="beta7"/>
        <vers num="7.21"/>
        <vers num="7.22"/>
        <vers num="7.23"/>
        <vers num="7.50" edition="beta1"/>
        <vers num="7.51"/>
        <vers num="7.52"/>
        <vers num="7.53"/>
        <vers num="7.54" edition="update1"/>
        <vers num="7.54" edition="update2"/>
        <vers num="7.60"/>
        <vers num="8.0" edition="beta1"/>
        <vers num="8.0" edition="beta2"/>
        <vers num="8.0" edition="beta3"/>
        <vers num="8.01"/>
        <vers num="8.02"/>
        <vers num="8.50"/>
        <vers num="8.51"/>
        <vers num="8.52"/>
        <vers num="8.53"/>
        <vers num="8.54"/>
        <vers num="9.0" edition="beta1"/>
        <vers num="9.0" edition="beta2"/>
        <vers num="9.01"/>
        <vers num="9.02"/>
        <vers num="9.10"/>
        <vers num="9.12"/>
        <vers num="9.20" edition="beta1"/>
        <vers num="9.21"/>
        <vers num="9.22"/>
        <vers num="9.23"/>
        <vers num="9.24"/>
        <vers num="9.25" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1082" seq="2008-1082" published="2008-02-28" modified="2012-06-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Opera before 9.26 allows remote attackers to "bypass sanitization filters" and conduct cross-site scripting (XSS) attacks via crafted attribute values in an XML document, which are not properly handled during DOM presentation.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00010.html">SUSE-SA:2008:011</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200803-09.xml">GLSA-200803-09</ref>
      <ref source="CONFIRM" url="http://www.opera.com/docs/changelogs/linux/926/" patch="1">http://www.opera.com/docs/changelogs/linux/926/</ref>
      <ref source="CONFIRM" url="http://www.opera.com/support/search/view/880/">http://www.opera.com/support/search/view/880/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27901">27901</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0622">ADV-2008-0622</ref>
    </refs>
    <vuln_soft>
      <prod name="opera_browser" vendor="opera">
        <vers num="1.00"/>
        <vers num="2.00"/>
        <vers num="2.10" edition="beta1"/>
        <vers num="2.10" edition="beta2"/>
        <vers num="2.10" edition="beta3"/>
        <vers num="2.12"/>
        <vers num="3.00" edition="beta"/>
        <vers num="3.10"/>
        <vers num="3.21"/>
        <vers num="3.50"/>
        <vers num="3.51"/>
        <vers num="3.60"/>
        <vers num="3.61"/>
        <vers num="3.62" edition="beta"/>
        <vers num="4.00" edition="beta2"/>
        <vers num="4.00" edition="beta3"/>
        <vers num="4.00" edition="beta4"/>
        <vers num="4.00" edition="beta5"/>
        <vers num="4.00" edition="beta6"/>
        <vers num="4.01"/>
        <vers num="4.02"/>
        <vers num="5.0" edition="beta2"/>
        <vers num="5.0" edition="beta3"/>
        <vers num="5.0" edition="beta4"/>
        <vers num="5.0" edition="beta5"/>
        <vers num="5.0" edition="beta6"/>
        <vers num="5.0" edition="beta7"/>
        <vers num="5.0" edition="beta8"/>
        <vers num="5.02"/>
        <vers num="5.10"/>
        <vers num="5.11"/>
        <vers num="5.12"/>
        <vers num="6.0" edition="beta1"/>
        <vers num="6.0" edition="beta2"/>
        <vers num="6.0" edition="tp1"/>
        <vers num="6.0" edition="tp2"/>
        <vers num="6.0" edition="tp3"/>
        <vers num="6.01"/>
        <vers num="6.1" edition="beta1"/>
        <vers num="6.02"/>
        <vers num="6.03"/>
        <vers num="6.04"/>
        <vers num="6.05"/>
        <vers num="6.06"/>
        <vers num="6.11"/>
        <vers num="6.12"/>
        <vers num="7.0" edition="beta1"/>
        <vers num="7.0" edition="beta1_v2"/>
        <vers num="7.0" edition="beta2"/>
        <vers num="7.01"/>
        <vers num="7.02"/>
        <vers num="7.03"/>
        <vers num="7.10" edition="beta1"/>
        <vers num="7.11" edition="beta2"/>
        <vers num="7.20" edition="beta7"/>
        <vers num="7.21"/>
        <vers num="7.22"/>
        <vers num="7.23"/>
        <vers num="7.50" edition="beta1"/>
        <vers num="7.51"/>
        <vers num="7.52"/>
        <vers num="7.53"/>
        <vers num="7.54" edition="update1"/>
        <vers num="7.54" edition="update2"/>
        <vers num="7.60"/>
        <vers num="8.0" edition="beta1"/>
        <vers num="8.0" edition="beta2"/>
        <vers num="8.0" edition="beta3"/>
        <vers num="8.01"/>
        <vers num="8.02"/>
        <vers num="8.50"/>
        <vers num="8.51"/>
        <vers num="8.52"/>
        <vers num="8.53"/>
        <vers num="8.54"/>
        <vers num="9.0" edition="beta1"/>
        <vers num="9.0" edition="beta2"/>
        <vers num="9.01"/>
        <vers num="9.02"/>
        <vers num="9.10"/>
        <vers num="9.12"/>
        <vers num="9.20" edition="beta1"/>
        <vers num="9.21"/>
        <vers num="9.22"/>
        <vers num="9.23"/>
        <vers num="9.24"/>
        <vers num="9.25" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1083" seq="2008-1083" published="2008-04-08" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in the CreateDIBPatternBrushPt function in GDI in Microsoft Windows 2000 SP4, XP SP2, Server 2003 SP1 and SP2, Vista, and Server 2008 allows remote attackers to execute arbitrary code via an EMF or WMF image file with a malformed header that triggers an integer overflow, aka "GDI Heap Overflow Vulnerability."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2008-04/0168.html">20080408 ZDI-08-020: Microsoft GDI WMF Parsing Heap Overflow Vulnerability</ref>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=681" adv="1">20080408 Microsoft Windows Graphics Rendering Engine Integer Overflow Vulnerability</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=120845064910729&amp;w=2">SSRT080048</ref>
      <ref source="MSKB" url="http://support.microsoft.com/kb/948590" adv="1">948590</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/632963">VU#632963</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490584/100/0/threaded">20080408 ZDI-08-020: Microsoft GDI WMF Parsing Heap Overflow Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28571" adv="1">28571</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30933" adv="1">30933</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019798" adv="1">1019798</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-099A.html">TA08-099A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1145/references">ADV-2008-1145</ref>
      <ref source="MISC" url="http://www.zerodayinitiative.com/advisories/ZDI-08-020/" adv="1">http://www.zerodayinitiative.com/advisories/ZDI-08-020/</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-021">MS08-021</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41471">win-emf-wmf-header-bo(41471)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5441">oval:org.mitre.oval:def:5441</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5442">5442</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/6330">6330</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_2000" vendor="microsoft">
        <vers num="" edition="sp4"/>
      </prod>
      <prod name="windows_2003_server" vendor="microsoft">
        <vers num="" edition=":x64"/>
        <vers num="" edition="sp1:itanium"/>
        <vers num="" edition="sp2:itanium"/>
        <vers num="" edition="sp2:x64"/>
      </prod>
      <prod name="windows_server_2008" vendor="microsoft">
        <vers num="-" edition=":itanium"/>
        <vers num="-" edition=":x64"/>
      </prod>
      <prod name="windows_vista" vendor="microsoft">
        <vers num="" edition=":x64"/>
        <vers num="-" edition="sp1:x64"/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition="sp2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1084" seq="2008-1084" published="2008-04-08" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the kernel in Microsoft Windows 2000 SP4, XP SP2, Server 2003 SP1 and SP2, through Vista SP1, and Server 2008 allows local users to execute arbitrary code via unknown vectors related to improper input validation.  NOTE: it was later reported that one affected function is NtUserFnOUTSTRING in win32k.sys.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=120845064910729&amp;w=2">SSRT080048</ref>
      <ref source="MISC" url="http://milw0rm.com/sploits/2008-ms08-25-exploit.zip">http://milw0rm.com/sploits/2008-ms08-25-exploit.zip</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28554" patch="1">28554</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019803">1019803</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-099A.html">TA08-099A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1149/references" adv="1">ADV-2008-1149</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-025">MS08-025</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5437">oval:org.mitre.oval:def:5437</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5518">5518</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_2000" vendor="microsoft">
        <vers num="" edition="sp4"/>
      </prod>
      <prod name="windows_2003_server" vendor="microsoft">
        <vers num="" edition=":x64"/>
        <vers num="" edition="sp1:itanium"/>
        <vers num="" edition="sp2:itanium"/>
        <vers num="" edition="sp2:x64"/>
      </prod>
      <prod name="windows_server_2008" vendor="microsoft">
        <vers num="-"/>
      </prod>
      <prod name="windows_vista" vendor="microsoft">
        <vers num="" edition=":x64"/>
        <vers num="" edition="sp1:x64"/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition=":x64"/>
        <vers num="" edition="sp2:x64"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1085" seq="2008-1085" published="2008-04-08" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Use-after-free vulnerability in Microsoft Internet Explorer 5.01 SP4, 6 through SP1, and 7 allows remote attackers to execute arbitrary code via a crafted data stream that triggers memory corruption, as demonstrated using an invalid MIME-type that does not have a registered handler.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=120845064910729&amp;w=2">SSRT080048</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490840/100/0/threaded">20080414 Secunia Research: Internet Explorer Data Stream HandlingVulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28552">28552</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019801">1019801</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-099A.html">TA08-099A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1148/references">ADV-2008-1148</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-024">MS08-024</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5563">oval:org.mitre.oval:def:5563</ref>
    </refs>
    <vuln_soft>
      <prod name="ie" vendor="microsoft">
        <vers num="5.01" edition="windows_2000_sp4"/>
        <vers num="6" edition="windows_server_2003_sp1"/>
        <vers num="6" edition="windows_server_2003_sp1_itanium"/>
        <vers num="6" edition="windows_xp_sp2"/>
        <vers num="7" edition=":windows_server_2003"/>
        <vers num="7" edition="windows_server_2003_sp1"/>
        <vers num="7" edition="windows_xp_sp2"/>
      </prod>
      <prod name="internet_explorer" vendor="microsoft">
        <vers num="6" edition=":windows_server_2003_sp2"/>
        <vers num="6" edition=":windows_server_2003_sp2_itanium"/>
        <vers num="6" edition=":windows_server_2003_x64_edition"/>
        <vers num="6" edition=":windows_server_2003_x64_edition_sp2"/>
        <vers num="6" edition=":windows_xp_professional_x64_edition"/>
        <vers num="6" edition=":windows_xp_professional_x64_edition_sp2"/>
        <vers num="7" edition=":windows_server_2003_sp2"/>
        <vers num="7" edition=":windows_server_2003_sp2_itanium"/>
        <vers num="7" edition=":windows_server_2003_x64_edition"/>
        <vers num="7" edition=":windows_server_2003_x64_edition_sp2"/>
        <vers num="7" edition=":windows_server_2008_itanium_edition"/>
        <vers num="7" edition=":windows_server_2008_x32_edition"/>
        <vers num="7" edition=":windows_server_2008_x64_edition"/>
        <vers num="7" edition=":windows_vista"/>
        <vers num="7" edition=":windows_vista_x64"/>
        <vers num="7" edition=":windows_xp_professional_x64_edition"/>
        <vers num="7" edition=":windows_xp_professional_x64_edition_sp2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1086" seq="2008-1086" published="2008-04-08" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The HxTocCtrl ActiveX control (hxvz.dll), as used in Microsoft Internet Explorer 5.01 SP4 and 6 SP1, in Windows XP SP2, Server 2003 SP1 and SP2, Vista SP1, and Server 2008, allows remote attackers to execute arbitrary code via malformed arguments, which triggers memory corruption.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=680" adv="1">20080408 Microsoft HxTocCtrl ActiveX Control Invalid Param Heap Corruption Vulnerability</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=120845064910729&amp;w=2">SSRT080048</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28606" patch="1">28606</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019800" adv="1">1019800</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-099A.html" adv="1">TA08-099A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1147/references">ADV-2008-1147</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-023">MS08-023</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41464">ie-hxvz-code-execution(41464)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5475">oval:org.mitre.oval:def:5475</ref>
    </refs>
    <vuln_soft>
      <prod name="ie" vendor="microsoft">
        <vers num="5.01" edition="sp4"/>
        <vers num="6" edition="sp1"/>
      </prod>
      <prod name="windows-nt" vendor="microsoft">
        <vers num="2008" edition=":itanium"/>
        <vers num="2008" edition=":x32"/>
        <vers num="2008" edition=":x64"/>
      </prod>
      <prod name="windows_2003_server" vendor="microsoft">
        <vers num="" edition=":x64"/>
        <vers num="" edition="sp1:itanium"/>
        <vers num="" edition="sp2:itanium"/>
        <vers num="" edition="sp2:x64"/>
      </prod>
      <prod name="windows_vista" vendor="microsoft">
        <vers num="" edition=":x64"/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition=":x64"/>
        <vers num="" edition="sp2:x64"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1087" seq="2008-1087" published="2008-04-08" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in GDI in Microsoft Windows 2000 SP4, XP SP2, Server 2003 SP1 and SP2, Vista, and Server 2008 allows remote attackers to execute arbitrary code via an EMF image file with crafted filename parameters, aka "GDI Stack Overflow Vulnerability."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=120845064910729&amp;w=2">SSRT080048</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28570" patch="1">28570</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019798" adv="1">1019798</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-099A.html" adv="1">TA08-099A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1145/references">ADV-2008-1145</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-021">MS08-021</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5580">oval:org.mitre.oval:def:5580</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5442">5442</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/6656">6656</ref>
    </refs>
    <vuln_soft>
      <prod name="windows-nt" vendor="microsoft">
        <vers num="2008" edition=":itanium"/>
        <vers num="2008" edition=":x32"/>
        <vers num="2008" edition=":x64"/>
      </prod>
      <prod name="windows_2000" vendor="microsoft">
        <vers num="" edition="sp4"/>
      </prod>
      <prod name="windows_2003_server" vendor="microsoft">
        <vers num="" edition=":x64"/>
        <vers num="" edition="sp1:itanium"/>
        <vers num="" edition="sp2:itanium"/>
        <vers num="" edition="sp2:x64"/>
      </prod>
      <prod name="windows_vista" vendor="microsoft">
        <vers num="" edition=":x64"/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition=":x64"/>
        <vers num="" edition="sp2:x64"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1088" seq="2008-1088" published="2008-04-08" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Microsoft Project 2000 Service Release 1, 2002 SP1, and 2003 SP2 allows user-assisted remote attackers to execute arbitrary code via a crafted Project file, related to improper validation of "memory resource allocations."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=120845064910729&amp;w=2">SSRT080048</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/155563">VU#155563</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28607" patch="1">28607</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019797">1019797</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-099A.html">TA08-099A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1142/references">ADV-2008-1142</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-018">MS08-018</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41447">project-file-code-execution(41447)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5384">oval:org.mitre.oval:def:5384</ref>
    </refs>
    <vuln_soft>
      <prod name="project" vendor="microsoft">
        <vers num="2000" edition="sr1"/>
        <vers num="2002" edition="sp1"/>
        <vers num="2003" edition="sp2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1089" seq="2008-1089" published="2008-04-08" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Microsoft Visio 2002 SP2, 2003 SP2 and SP3, and 2007 up to SP1 allows user-assisted remote attackers to execute arbitrary code via a Visio file containing crafted object header data, aka "Visio Object Header Vulnerability."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=120845064910729&amp;w=2">SSRT080048</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28555" patch="1">28555</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019804">1019804</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-099A.html">TA08-099A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1143/references">ADV-2008-1143</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-019">MS08-019</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41451">visio-object-header-code-execution(41451)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5496">oval:org.mitre.oval:def:5496</ref>
    </refs>
    <vuln_soft>
      <prod name="office" vendor="microsoft">
        <vers num="2003" edition="sp2"/>
        <vers num="2003" edition="sp3"/>
        <vers num="2007"/>
        <vers num="2007_sp1"/>
        <vers num="xp" edition="sp2"/>
      </prod>
      <prod name="visio" vendor="microsoft">
        <vers num="2002" edition="sp2"/>
        <vers num="2003" edition="sp1"/>
        <vers num="2003_sp3"/>
        <vers num="2007"/>
        <vers num="2007_sp1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1090" seq="2008-1090" published="2008-04-08" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Microsoft Visio 2002 SP2, 2003 SP2 and SP3, and 2007 up to SP1 allows user-assisted remote attackers to execute arbitrary code via a crafted .DXF file, aka "Visio Memory Validation Vulnerability."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=120845064910729&amp;w=2">SSRT080048</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28556" patch="1">28556</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019804">1019804</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-099A.html">TA08-099A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1143/references">ADV-2008-1143</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-019">MS08-019</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41452">visio-file-code-execution(41452)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5344">oval:org.mitre.oval:def:5344</ref>
    </refs>
    <vuln_soft>
      <prod name="office" vendor="microsoft">
        <vers num="2003" edition="sp2"/>
        <vers num="2003" edition="sp3"/>
        <vers num="2007"/>
        <vers num="2007_sp1"/>
        <vers num="xp" edition="sp2"/>
      </prod>
      <prod name="visio" vendor="microsoft">
        <vers num="2002" edition="sp2"/>
        <vers num="2003" edition="sp1"/>
        <vers num="2003_sp3"/>
        <vers num="2007"/>
        <vers num="2007_sp1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1091" seq="2008-1091" published="2008-05-13" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Microsoft Word in Office 2000 and XP SP3, 2003 SP2 and SP3, and 2007 Office System SP1 and earlier allows remote attackers to execute arbitrary code via a Rich Text Format (.rtf) file with a malformed string that triggers a "memory calculation error" and a heap-based buffer overflow, aka "Object Parsing Vulnerability."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=121129490723574&amp;w=2">SSRT080071</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/543907">VU#543907</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492020/100/0/threaded">20080513 ZDI-08-023: Microsoft Office RTF Parsing Engine Memory Corruption Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29104">29104</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020013">1020013</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-134A.html">TA08-134A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1504/references">ADV-2008-1504</ref>
      <ref source="MISC" url="http://www.zerodayinitiative.com/advisories/ZDI-08-023">http://www.zerodayinitiative.com/advisories/ZDI-08-023</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-026">MS08-026</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5494">oval:org.mitre.oval:def:5494</ref>
    </refs>
    <vuln_soft>
      <prod name="office" vendor="microsoft">
        <vers num="2000" edition="sp3"/>
        <vers num="2003" edition="sp2"/>
        <vers num="2003" edition="sp3"/>
        <vers num="2004" edition=":mac"/>
        <vers num="2007"/>
        <vers num="2007_sp1"/>
        <vers num="2008" edition=":mac"/>
        <vers num="xp" edition="sp3"/>
      </prod>
      <prod name="office_compatibility_pack_for_word_excel_ppt_2007" vendor="microsoft">
        <vers num="" edition=":sp1"/>
      </prod>
      <prod name="word_viewer" vendor="microsoft">
        <vers num="2003" edition=":sp3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1092" seq="2008-1092" published="2008-03-25" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in msjet40.dll before 4.0.9505.0 in Microsoft Jet Database Engine allows remote attackers to execute arbitrary code via a crafted Word file, as exploited in the wild in March 2008.  NOTE: as of 20080513, Microsoft has stated that this is the same issue as CVE-2007-6026.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=121129490723574&amp;w=2">SSRT080071</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/936529">VU#936529</ref>
      <ref source="MSKB" url="http://www.microsoft.com/technet/security/advisory/950627.mspx">950627</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019686">1019686</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-028">MS08-028</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41380">microsoft-jet-msjet40-bo(41380)</ref>
    </refs>
    <vuln_soft>
      <prod name="word" vendor="microsoft">
        <vers num="2000" edition="sp3"/>
        <vers num="2002" edition="sp3"/>
        <vers num="2003" edition="sp2"/>
        <vers num="2003_sp3"/>
        <vers num="2007"/>
        <vers num="2007_sp1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1093" seq="2008-1093" published="2008-09-18" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Acresso InstallShield Update Agent does not properly verify the authenticity of Rule Scripts obtained from GetRules.asp web pages on FLEXnet Connect servers, which allows remote man-in-the-middle attackers to execute arbitrary VBScript code via Trojan horse Rules.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/4268">4268</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/837092">VU#837092</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/496389/100/0/threaded">20080916 InstallShield Update Agent - Downloads and executes "Rule Scripts" insecurely.</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/31204">31204</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020893">1020893</ref>
      <ref source="MISC" url="http://www.simplicity.net/vuln/CVE-2008-1093.txt">http://www.simplicity.net/vuln/CVE-2008-1093.txt</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2613">ADV-2008-2613</ref>
    </refs>
    <vuln_soft>
      <prod name="flexnet_connect" vendor="acresso">
        <vers num=""/>
      </prod>
      <prod name="intallshield_update_agent" vendor="acresso">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1094" seq="2008-1094" published="2008-12-19" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.cgi in the Account View page in Barracuda Spam Firewall (BSF) before 3.5.12.007 allows remote authenticated administrators to execute arbitrary SQL commands via a pattern_x parameter in a search_count_equals action, as demonstrated by the pattern_0 parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://dcsl.ul.ie/advisories/02.htm">http://dcsl.ul.ie/advisories/02.htm</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/4793">4793</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1021455">1021455</ref>
      <ref source="CONFIRM" url="http://www.barracudanetworks.com/ns/support/tech_alert.php" adv="1">http://www.barracudanetworks.com/ns/support/tech_alert.php</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/499293/100/0/threaded">20081216 CVE-2008-1094 - Barracuda Span Firewall SQL Injection Vulnerability</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/7496">7496</ref>
    </refs>
    <vuln_soft>
      <prod name="barracuda_spam_firewall" vendor="barracuda_networks">
        <vers num="3.5.11.020" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1095" seq="2008-1095" published="2008-02-29" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Internet Protocol (IP) implementation in Sun Solaris 8, 9, and 10 allows remote attackers to bypass intended firewall policies or cause a denial of service (panic) via unknown vectors, possibly related to ICMP packets and IP fragment reassembly.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-66-200183-1" patch="1">200183</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2008-119.htm">http://support.avaya.com/elmodocs2/security/ASA-2008-119.htm</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27967" patch="1">27967</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0645" adv="1">ADV-2008-0645</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40473">solaris-ip-dos(40473)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5511">oval:org.mitre.oval:def:5511</ref>
    </refs>
    <vuln_soft>
      <prod name="solaris" vendor="sun">
        <vers num="8" edition=":x86"/>
        <vers num="9" edition=":x86"/>
        <vers num="10" edition=":x86"/>
      </prod>
      <prod name="sunos" vendor="sun">
        <vers num="5.8"/>
        <vers num="5.9"/>
        <vers num="5.10"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1096" seq="2008-1096" published="2008-03-05" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The load_tile function in the XCF coder in coders/xcf.c in (1) ImageMagick 6.2.8-0 and (2) GraphicsMagick (aka gm) 1.1.7 allows user-assisted remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted .xcf file that triggers an out-of-bounds heap write, possibly related to the ScaleCharToQuantum function.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414370">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414370</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html">SUSE-SR:2008:014</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2009/dsa-1858">DSA-1858</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:099">MDVSA-2008:099</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0145.html">RHSA-2008:0145</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28821">28821</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019880">1019880</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/USN-681-1">USN-681-1</ref>
      <ref source="MISC" url="https://bugzilla.redhat.com/show_bug.cgi?id=286411">https://bugzilla.redhat.com/show_bug.cgi?id=286411</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41194">imagemagick-loadtile-code-execution(41194)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10843">oval:org.mitre.oval:def:10843</ref>
    </refs>
    <vuln_soft>
      <prod name="graphicsmagick" vendor="imagemagick">
        <vers num="1.1.7"/>
        <vers num="1.1.8"/>
        <vers num="1.1.9"/>
        <vers num="1.1.10"/>
        <vers num="1.1.11"/>
        <vers num="1.1.12"/>
      </prod>
      <prod name="imagemagick" vendor="imagemagick">
        <vers num="6.2.8.0"/>
        <vers num="6.2.8.1"/>
        <vers num="6.2.8.2"/>
        <vers num="6.2.8.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1097" seq="2008-1097" published="2008-03-05" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in the ReadPCXImage function in the PCX coder in coders/pcx.c in (1) ImageMagick 6.2.4-5 and 6.2.8-0 and (2) GraphicsMagick (aka gm) 1.1.7 allows user-assisted remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted .pcx file that triggers incorrect memory allocation for the scanline array, leading to memory corruption.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=413034">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=413034</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html">SUSE-SR:2008:014</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-201311-10.xml">GLSA-201311-10</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2009/dsa-1858">DSA-1858</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:099">MDVSA-2008:099</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0145.html">RHSA-2008:0145</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0165.html">RHSA-2008:0165</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28822">28822</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019881">1019881</ref>
      <ref source="MISC" url="https://bugzilla.redhat.com/show_bug.cgi?id=285861">https://bugzilla.redhat.com/show_bug.cgi?id=285861</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41193">imagemagick-readpcximage-bo(41193)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11237">oval:org.mitre.oval:def:11237</ref>
    </refs>
    <vuln_soft>
      <prod name="graphicsmagick" vendor="imagemagick">
        <vers num="1.1.7"/>
        <vers num="1.1.8"/>
        <vers num="1.1.9"/>
        <vers num="1.1.10"/>
        <vers num="1.1.11"/>
        <vers num="1.1.12"/>
      </prod>
      <prod name="imagemagick" vendor="imagemagick">
        <vers num="6.2.8.0"/>
        <vers num="6.2.8.1"/>
        <vers num="6.2.8.2"/>
        <vers num="6.2.8.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1098" seq="2008-1098" published="2008-03-05" modified="2018-10-03" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in MoinMoin 1.5.8 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) certain input processed by formatter/text_gedit.py (aka the gui editor formatter); (2) a page name, which triggers an injection in PageEditor.py when the page is successfully deleted by a victim in a DeletePage action; or (3) the destination page name for a RenamePage action, which triggers an injection in PageEditor.py when a victim's rename attempt fails because of a duplicate name.  NOTE: the AttachFile XSS issue is already covered by CVE-2008-0781, and the login XSS issue is already covered by CVE-2008-0780.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://hg.moinmo.in/moin/1.5/rev/4ede07e792dd">http://hg.moinmo.in/moin/1.5/rev/4ede07e792dd</ref>
      <ref source="CONFIRM" url="http://hg.moinmo.in/moin/1.5/rev/d0152eeb4499">http://hg.moinmo.in/moin/1.5/rev/d0152eeb4499</ref>
      <ref source="CONFIRM" url="http://moinmo.in/SecurityFixes">http://moinmo.in/SecurityFixes</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1514">DSA-1514</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200803-27.xml">GLSA-200803-27</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28173">28173</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41037">moinmoin-multiple-actions-xss(41037)</ref>
      <ref source="UBUNTU" url="https://usn.ubuntu.com/716-1/">USN-716-1</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00510.html">FEDORA-2008-3301</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00538.html">FEDORA-2008-3328</ref>
    </refs>
    <vuln_soft>
      <prod name="moinmoin" vendor="moinmoin">
        <vers num="1.5.8" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1099" seq="2008-1099" published="2008-03-05" modified="2018-10-03" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">_macro_Getval in wikimacro.py in MoinMoin 1.5.8 and earlier does not properly enforce ACLs, which allows remote attackers to read protected pages.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://hg.moinmo.in/moin/1.5/rev/4a7de0173734">http://hg.moinmo.in/moin/1.5/rev/4a7de0173734</ref>
      <ref source="CONFIRM" url="http://moinmo.in/SecurityFixes">http://moinmo.in/SecurityFixes</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1514">DSA-1514</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200803-27.xml">GLSA-200803-27</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28177">28177</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41038">moinmoin-macrogetval-information-disclosure(41038)</ref>
      <ref source="UBUNTU" url="https://usn.ubuntu.com/716-1/">USN-716-1</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00510.html">FEDORA-2008-3301</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00538.html">FEDORA-2008-3328</ref>
    </refs>
    <vuln_soft>
      <prod name="moinmoin" vendor="moinmoin">
        <vers num="1.5.8" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1100" seq="2008-1100" published="2008-04-14" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the cli_scanpe function in libclamav (libclamav/pe.c) for ClamAV 0.92 and 0.92.1 allows remote attackers to execute arbitrary code via a crafted Upack PE file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://kolab.org/security/kolab-vendor-notice-20.txt">http://kolab.org/security/kolab-vendor-notice-20.txt</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html">APPLE-SA-2008-09-15</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00009.html">SUSE-SA:2008:024</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-updates/2015-05/msg00024.html">openSUSE-SU-2015:0906</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200805-19.xml">GLSA-200805-19</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1549">DSA-1549</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/858595">VU#858595</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:088">MDVSA-2008:088</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28756">28756</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28784">28784</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019837">1019837</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-260A.html">TA08-260A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1218/references">ADV-2008-1218</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2584">ADV-2008-2584</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41789">clamav-cliscanpe-bo(41789)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00576.html">FEDORA-2008-3358</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00625.html">FEDORA-2008-3420</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00249.html">FEDORA-2008-3900</ref>
      <ref source="CONFIRM" url="https://wwws.clamav.net/bugzilla/show_bug.cgi?id=878">https://wwws.clamav.net/bugzilla/show_bug.cgi?id=878</ref>
    </refs>
    <vuln_soft>
      <prod name="clamav" vendor="clam_anti-virus">
        <vers num="0.92"/>
        <vers num="0.92.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1101" seq="2008-1101" published="2008-04-10" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in kvdocve.dll in the KeyView document viewing engine in Autonomy (formerly Verity) KeyView, as used by IBM Lotus Notes 7.0.2 and 7.0.3, allows remote attackers to execute arbitrary code via a long pathname, as demonstrated by a long SRC attribute of an IMG element in an HTML document.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490826/100/0/threaded">20080414 Secunia Research: Lotus Notes kvdocve.dll Path Processing BufferOverflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28454">28454</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1153">ADV-2008-1153</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1156">ADV-2008-1156</ref>
      <ref source="CONFIRM" url="http://www-1.ibm.com/support/docview.wss?rs=463&amp;uid=swg21298453">http://www-1.ibm.com/support/docview.wss?rs=463&amp;uid=swg21298453</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41725">autonomy-keyview-kvdocve-bo(41725)</ref>
    </refs>
    <vuln_soft>
      <prod name="keyview" vendor="autonomy">
        <vers num="2.0.0.2"/>
        <vers num="10.3.0.0"/>
      </prod>
      <prod name="lotus_notes" vendor="ibm">
        <vers num="6.0"/>
        <vers num="6.5"/>
        <vers num="7.0"/>
        <vers num="7.0.2"/>
        <vers num="7.0.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1102" seq="2008-1102" published="2008-04-22" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the imb_loadhdr function in Blender 2.45 allows user-assisted remote attackers to execute arbitrary code via a .blend file that contains a crafted Radiance RGBE image.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html">SUSE-SR:2008:010</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1567">DSA-1567</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200805-12.xml">GLSA-200805-12</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:204">MDVSA-2008:204</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28870">28870</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1308/references">ADV-2008-1308</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41917">blender-imbloadhdr-bo(41917)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00225.html">FEDORA-2008-3862</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00237.html">FEDORA-2008-3875</ref>
    </refs>
    <vuln_soft>
      <prod name="blender" vendor="blender">
        <vers num="2.45"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1103" seq="2008-1103" published="2008-04-28" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.9" CVSS_base_score="6.9" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple unspecified vulnerabilities in Blender have unknown impact and attack vectors, related to "temporary file issues."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html">SUSE-SR:2008:010</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200805-12.xml">GLSA-200805-12</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:204">MDVSA-2008:204</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28936">28936</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42153">blender-file-unspecified(42153)</ref>
    </refs>
    <vuln_soft>
      <prod name="blender" vendor="blender">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1104" seq="2008-1104" published="2008-05-21" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in Foxit Reader before 2.3 build 2912 allows user-assisted remote attackers to execute arbitrary code via a crafted PDF file, related to the util.printf JavaScript function and floating point specifiers in format strings.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3899" adv="1">3899</ref>
      <ref source="CONFIRM" url="http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&amp;id=800801">http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&amp;id=800801</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/119747" adv="1">VU#119747</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492289/100/0/threaded">20080520 Secunia Research: Foxit Reader "util.printf()" Buffer Overflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29288" adv="1">29288</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020050" adv="1">1020050</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1572">ADV-2008-1572</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42531">foxitreader-utilprintf-bo(42531)</ref>
    </refs>
    <vuln_soft>
      <prod name="foxit_reader" vendor="foxitsoftware">
        <vers num="2.0"/>
        <vers num="2.2"/>
        <vers num="2.3" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1105" seq="2008-1105" published="2008-05-29" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in the receive_smb_raw function in util/sock.c in Samba 3.0.0 through 3.0.29 allows remote attackers to execute arbitrary code via a crafted SMB response.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html">APPLE-SA-2008-06-30</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00000.html">SUSE-SA:2008:026</ref>
      <ref source="MLIST" url="http://lists.vmware.com/pipermail/security-announce/2008/000023.html">[Security-announce] 20080728 VMSA-2008-00011 Updated ESX service console packages for Samba and vmnix</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200805-23.xml">GLSA-200805-23</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020123">1020123</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.473951">SSA:2008-149-01</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-249086-1">249086</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT2163">http://support.apple.com/kb/HT2163</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0180">http://wiki.rpath.com/Advisories:rPSA-2008-0180</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1590">DSA-1590</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:108">MDVSA-2008:108</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0288.html">RHSA-2008:0288</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0289.html">RHSA-2008:0289</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0290.html">RHSA-2008:0290</ref>
      <ref source="CONFIRM" url="http://www.samba.org/samba/security/CVE-2008-1105.html">http://www.samba.org/samba/security/CVE-2008-1105.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492683/100/0/threaded">20080528 [SAMBA] CVE-2008-1105 - Boundary failure when parsing SMB responses</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492737/100/0/threaded">20080529 Secunia Research: Samba "receive_smb_raw()" Buffer OverflowVulnerability</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492903/100/0/threaded">20080602 rPSA-2008-0180-1 samba samba-client samba-server samba-swat</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29404" patch="1">29404</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/31255">31255</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-617-1">USN-617-1</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-617-2">USN-617-2</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1681">ADV-2008-1681</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1908">ADV-2008-1908</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1981/references">ADV-2008-1981</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2222/references">ADV-2008-2222</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2639">ADV-2008-2639</ref>
      <ref source="CONFIRM" url="http://www.xerox.com/downloads/usa/en/c/cert_XRX08_009.pdf">http://www.xerox.com/downloads/usa/en/c/cert_XRX08_009.pdf</ref>
      <ref source="HP" url="http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657">HPSBUX02341</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42664">samba-receivesmbraw-bo(42664)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/45251">xerox-controller-samba-code-execution(45251)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10020">oval:org.mitre.oval:def:10020</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5733">oval:org.mitre.oval:def:5733</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5712">5712</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg01006.html">FEDORA-2008-4679</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg01030.html">FEDORA-2008-4724</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg01082.html">FEDORA-2008-4797</ref>
    </refs>
    <vuln_soft>
      <prod name="samba" vendor="samba">
        <vers num="3.0.28a"/>
        <vers num="3.0.29"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1106" seq="2008-1106" published="2008-06-09" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.1" CVSS_base_score="7.1" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:C/A:N)">
    <desc>
      <descript source="cve">The management interface in Akamai Client (formerly Red Swoosh) 3322 and earlier allows remote attackers to bypass authentication via an HTTP request that contains (1) no Referer header, or (2) a spoofed Referer header that matches an approved domain, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks and force the client to download and execute arbitrary files.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3930">3930</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493169/100/0/threaded">20080606 Akamai Technologies Security Advisory 2008-0003 (Akamai Client Software)</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493170/100/0/threaded">20080606 Secunia Research: Akamai Red Swoosh Cross-Site Request Forgery</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020208">1020208</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1761/references">ADV-2008-1761</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42895">redswoosh-http-csrf(42895)</ref>
    </refs>
    <vuln_soft>
      <prod name="client" vendor="akamai_technologies">
        <vers num="3322" prev="1"/>
      </prod>
      <prod name="client" vendor="red_swoosh">
        <vers num="3322" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1107" seq="2008-1107" published="2009-04-16" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple stack-based buffer overflows in the Danske Bank e-Sec Control Module ActiveX control (DanskeSikker.ocx) 3.1.0.48, and possibly earlier versions, allow remote attackers to execute arbitrary code via long arguments to unspecified methods, which are not properly handled by a logging function.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/502725/100/0/threaded">20090416 Secunia Research: Danske Bank e-Sec Control Module Error Logging Buffer Overflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/34549">34549</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/1047" adv="1">ADV-2009-1047</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/49903">danske-esec-activex-bo(49903)</ref>
    </refs>
    <vuln_soft>
      <prod name="danskesikker.ocx" vendor="danskebank">
        <vers num="3.1.0.48" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1108" seq="2008-1108" published="2008-06-04" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.6" CVSS_base_score="7.6" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in Evolution 2.22.1, when the ITip Formatter plugin is disabled, allows remote attackers to execute arbitrary code via a long timezone string in an iCalendar attachment.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00003.html">SUSE-SA:2008:028</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200806-06.xml">GLSA-200806-06</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:111">MDVSA-2008:111</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0514.html">RHSA-2008:0514</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0515.html">RHSA-2008:0515</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0516.html">RHSA-2008:0516</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0517.html">RHSA-2008:0517</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29527">29527</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020169">1020169</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-615-1">USN-615-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1732/references">ADV-2008-1732</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42824">evolution-icalendar-bo(42824)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10471">oval:org.mitre.oval:def:10471</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00157.html">FEDORA-2008-4990</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00178.html">FEDORA-2008-5016</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00179.html">FEDORA-2008-5018</ref>
    </refs>
    <vuln_soft>
      <prod name="evolution" vendor="gnome">
        <vers num="2.2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1109" seq="2008-1109" published="2008-06-04" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in Evolution 2.22.1 allows user-assisted remote attackers to execute arbitrary code via a long DESCRIPTION property in an iCalendar attachment, which is not properly handled during a reply in the calendar view (aka the Calendars window).</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00003.html">SUSE-SA:2008:028</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200806-06.xml">GLSA-200806-06</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:111">MDVSA-2008:111</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0514.html">RHSA-2008:0514</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0515.html">RHSA-2008:0515</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29527">29527</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020170">1020170</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-615-1">USN-615-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1732/references">ADV-2008-1732</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42826">evolution-icalendar-description-bo(42826)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10337">oval:org.mitre.oval:def:10337</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00157.html">FEDORA-2008-4990</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00178.html">FEDORA-2008-5016</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00179.html">FEDORA-2008-5018</ref>
    </refs>
    <vuln_soft>
      <prod name="evolution" vendor="gnome">
        <vers num="2.22.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1110" seq="2008-1110" published="2008-02-29" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in demuxers/demux_asf.c (aka the ASF demuxer) in the xineplug_dmx_asf.so plugin in xine-lib before 1.1.10 allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a crafted ASF header.  NOTE: this issue leads to a crash when an attack uses the CVE-2006-1664 exploit code, but it is different from CVE-2006-1664.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.gentoo.org/show_bug.cgi?id=208100">http://bugs.gentoo.org/show_bug.cgi?id=208100</ref>
      <ref source="CONFIRM" url="http://hg.debian.org/hg/xine-lib/xine-lib?cmd=changeset;node=fb6d089b520dca199ef16a046da28c50c984c2d2;style=gitweb">http://hg.debian.org/hg/xine-lib/xine-lib?cmd=changeset;node=fb6d089b520dca199ef16a046da28c50c984c2d2;style=gitweb</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200802-12.xml">GLSA-200802-12</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?group_id=9655&amp;release_id=571608" patch="1">http://sourceforge.net/project/shownotes.php?group_id=9655&amp;release_id=571608</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:178">MDVSA-2008:178</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-635-1">USN-635-1</ref>
      <ref source="CONFIRM" url="http://xinehq.de/index.php/news" patch="1">http://xinehq.de/index.php/news</ref>
      <ref source="CONFIRM" url="http://xinehq.de/index.php/security">http://xinehq.de/index.php/security</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41019">xinelib-demuxasf-bo(41019)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/1641">1641</ref>
    </refs>
    <vuln_soft>
      <prod name="xine-lib" vendor="xine">
        <vers num="1.1.9" prev="1"/>
      </prod>
      <prod name="xine-plugin" vendor="xine">
        <vers num="1.1.9" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1111" seq="2008-1111" published="2008-03-04" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">mod_cgi in lighttpd 1.4.18 sends the source code of CGI scripts instead of a 500 error when a fork failure occurs, which might allow remote attackers to obtain sensitive information.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00005.html">SUSE-SR:2008:008</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200803-10.xml">GLSA-200803-10</ref>
      <ref source="CONFIRM" url="http://trac.lighttpd.net/trac/changeset/2107">http://trac.lighttpd.net/trac/changeset/2107</ref>
      <ref source="MISC" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0106">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0106</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1513">DSA-1513</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489465/100/0/threaded">20080312 rPSA-2008-0106-1 lighttpd</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28100">28100</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0763" adv="1">ADV-2008-0763</ref>
      <ref source="CONFIRM" url="https://bugs.gentoo.org/show_bug.cgi?id=211956">https://bugs.gentoo.org/show_bug.cgi?id=211956</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41008">lighttpd-modcgi-information-disclosure(41008)</ref>
      <ref source="MISC" url="https://issues.rpath.com/browse/RPL-2326">https://issues.rpath.com/browse/RPL-2326</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00162.html">FEDORA-2008-2262</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00180.html">FEDORA-2008-2278</ref>
    </refs>
    <vuln_soft>
      <prod name="lighttpd" vendor="lighttpd">
        <vers num="1.4.18"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1112" seq="2008-1112" published="2008-03-03" modified="2008-03-05" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2008-0928.  Reason: This candidate is a duplicate of CVE-2008-0928.  Notes: All CVE users should reference CVE-2008-0928 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2008-1113" seq="2008-1113" published="2008-03-03" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:N/A:N)">
    <desc>
      <descript source="cve">Cisco Unified Wireless IP Phone 7921, when using Protected Extensible Authentication Protocol (PEAP), does not validate server certificates, which allows remote wireless access points to steal hashed passwords and conduct man-in-the-middle (MITM) attacks.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://blogs.zdnet.com/security/?p=896">http://blogs.zdnet.com/security/?p=896</ref>
      <ref source="MISC" url="http://blogs.zdnet.com/security/?p=901">http://blogs.zdnet.com/security/?p=901</ref>
      <ref source="FULLDISC" url="http://seclists.org/fulldisclosure/2008/Feb/0402.html">20080221 Cisco and Vocera wireless LAN VoIP devices don't check certificates</ref>
      <ref source="FULLDISC" url="http://seclists.org/fulldisclosure/2008/Feb/0449.html">20080223 Cisco confirms vulnerability in 7921 Wi-Fi IP phone</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019494">1019494</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27935">27935</ref>
    </refs>
    <vuln_soft>
      <prod name="vocera_communications_badge" vendor="vocera_communications">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1114" seq="2008-1114" published="2008-03-03" modified="2013-01-03" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Vocera Communications wireless handsets, when using Protected Extensible Authentication Protocol (PEAP), do not validate server certificates, which allows remote wireless access points to steal hashed passwords and conduct man-in-the-middle (MITM) attacks.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://blogs.zdnet.com/security/?p=896">http://blogs.zdnet.com/security/?p=896</ref>
      <ref source="MISC" url="http://blogs.zdnet.com/security/?p=901">http://blogs.zdnet.com/security/?p=901</ref>
      <ref source="FULLDISC" url="http://seclists.org/fulldisclosure/2008/Feb/0402.html">20080221 Cisco and Vocera wireless LAN VoIP devices don't check certificates</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27935">27935</ref>
      <ref source="CONFIRM" url="http://www.vocera.com/downloads/InfrastructureGuide.pdf">http://www.vocera.com/downloads/InfrastructureGuide.pdf</ref>
    </refs>
    <vuln_soft>
      <prod name="wireless_handset" vendor="vocera">
        <vers num="-"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1115" seq="2008-1115" published="2008-03-03" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.9" CVSS_base_score="4.9" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Sun Solaris 8 directory functions allows local users to cause a denial of service (panic) via an unspecified sequence of system calls or commands.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-66-200163-1" patch="1">200163</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28069">28069</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0644/references">ADV-2008-0644</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5485">oval:org.mitre.oval:def:5485</ref>
    </refs>
    <vuln_soft>
      <prod name="solaris" vendor="sun">
        <vers num="8" edition=":sparc"/>
        <vers num="8" edition=":x86"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1116" seq="2008-1116" published="2008-03-03" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Insecure method vulnerability in the Web Scan Object ActiveX control (OL2005.dll) in Rising Antivirus Online Scanner allows remote attackers to force the download and execution of arbitrary code by setting the BaseURL property and invoking the UpdateEngine method. NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/27997" patch="1">27997</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0683/references">ADV-2008-0683</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40838">risingonline-webscan-code-execution(40838)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5188">5188</ref>
    </refs>
    <vuln_soft>
      <prod name="rising_web_scan_object" vendor="rising_antivirus_international">
        <vers num="18.0.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1117" seq="2008-1117" published="2008-03-14" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in the Notes (aka Flash Notes or instant messages) feature in tb2ftp.dll in Timbuktu Pro 8.6.5 for Windows, and possibly 8.7 for Mac OS X, allows remote attackers to upload files to arbitrary locations via a destination filename with a \ (backslash) character followed by ../ (dot dot slash) sequences. NOTE: this can be leveraged for code execution by writing to a Startup folder.  NOTE: this issue reportedly exists because of an incomplete fix for CVE-2007-4220.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/timbuto-adv.txt">http://aluigi.altervista.org/adv/timbuto-adv.txt</ref>
      <ref source="MISC" url="http://aluigi.org/poc/timbuto.zip">http://aluigi.org/poc/timbuto.zip</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3741">3741</ref>
      <ref source="MISC" url="http://www.coresecurity.com/?action=item&amp;id=2166">http://www.coresecurity.com/?action=item&amp;id=2166</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489360/100/0/threaded">20080310 Vulnerabilities in Timbuktu Pro 8.6.5</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489382/100/0/threaded">20080311 Re: [Full-disclosure] Vulnerabilities in Timbuktu Pro 8.6.5</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489414/100/0/threaded">20080311 CORE-2008-0204: Timbuktu Pro Remote Path Traversal and Log Injection</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28081">28081</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0840">ADV-2008-0840</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4455">4455</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5238">5238</ref>
    </refs>
    <vuln_soft>
      <prod name="timbuktu_pro" vendor="netopia">
        <vers num="8.6.5" edition=":windows"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1118" seq="2008-1118" published="2008-03-14" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Timbuktu Pro 8.6.5 for Windows, and possibly 8.7 for Mac OS X, does not perform input validation before logging information fields taken from packets from a remote peer, which allows remote attackers to generate crafted log entries, and possibly avoid detection of attacks, via modified (1) computer name, (2) user name, and (3) IP address fields.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3742">3742</ref>
      <ref source="MISC" url="http://www.coresecurity.com/?action=item&amp;id=2166">http://www.coresecurity.com/?action=item&amp;id=2166</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489414/100/0/threaded">20080311 CORE-2008-0204: Timbuktu Pro Remote Path Traversal and Log Injection</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28081">28081</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41330">timbuktu-log-security-bypass(41330)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5238">5238</ref>
    </refs>
    <vuln_soft>
      <prod name="timbuktu_pro" vendor="netopia">
        <vers num="8.6.5" edition=":windows"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1119" seq="2008-1119" published="2008-03-03" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in include/doc/get_image.php in Centreon 1.4.2.3 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the img parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.centreon.com/Product/Changelog-Centreon-1.4.x.html">http://www.centreon.com/Product/Changelog-Centreon-1.4.x.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28022" patch="1">28022</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5204">5204</ref>
    </refs>
    <vuln_soft>
      <prod name="centreon" vendor="centreon">
        <vers num="1.4"/>
        <vers num="1.4.1"/>
        <vers num="1.4.2"/>
        <vers num="1.4.2.1"/>
        <vers num="1.4.2.2"/>
        <vers num="1.4.2.3" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1120" seq="2008-1120" published="2008-03-03" modified="2011-03-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Format string vulnerability in the embedded Internet Explorer component for Mirabilis ICQ 6 build 6043 allows remote servers to execute arbitrary code or cause a denial of service (crash) via unspecified vectors related to HTML code generation.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://board.raidrush.ws/showthread.php?t=386983">http://board.raidrush.ws/showthread.php?t=386983</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28027">28027</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0701">ADV-2008-0701</ref>
    </refs>
    <vuln_soft>
      <prod name="mirabilis_icq" vendor="icq">
        <vers num="6" edition="build_6043"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1121" seq="2008-1121" published="2008-03-03" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in eazyPortal 1.0 and earlier allows remote attackers to execute arbitrary SQL commands via the session_vars cookie.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28019">28019</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5196">5196</ref>
    </refs>
    <vuln_soft>
      <prod name="eazyportal" vendor="eazyportal">
        <vers num="1.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1122" seq="2008-1122" published="2008-03-03" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the downloads module in Koobi Pro 5.7 allows remote attackers to execute arbitrary SQL commands via the categ parameter to index.php.  NOTE: it was later reported that this also affects Koobi CMS 4.2.4, 4.2.5, and 4.3.0.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490886/100/0/threaded">20080415 Koobi CMS 4.2.4/4.2.5/4.3.0 Multiple Remote SQL Injection Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28031">28031</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40903">koobi-categ-sql-injection(40903)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5198">5198</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5447">5447</ref>
    </refs>
    <vuln_soft>
      <prod name="koobi_pro" vendor="dream4">
        <vers num="5.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1123" seq="2008-1123" published="2008-03-03" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple PHP remote file inclusion vulnerabilities in SiteBuilder Elite 1.2 allow remote attackers to execute arbitrary PHP code via a URL in the CarpPath parameter to (1) files/carprss.php and (2) files/amazon-bestsellers.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28036">28036</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5199">5199</ref>
    </refs>
    <vuln_soft>
      <prod name="sitebuilder_elite" vendor="sitebuilder">
        <vers num="1.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1124" seq="2008-1124" published="2008-03-03" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple PHP remote file inclusion vulnerabilities in Podcast Generator 1.0 BETA 2 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the absoluteurl parameter to (1) components/xmlparser/loadparser.php; (2) admin.php, (3) categories.php, (4) categories_add.php, (5) categories_remove.php, (6) edit.php, (7) editdel.php, (8) ftpfeature.php, (9) login.php, (10) pgRSSnews.php, (11) showcat.php, and (12) upload.php in core/admin/; and (13) archive_cat.php, (14) archive_nocat.php, and (15) recent_list.php in core/.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28038">28038</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5200">5200</ref>
    </refs>
    <vuln_soft>
      <prod name="podcast_generator" vendor="podcast_generator">
        <vers num="1.0" prev="1" edition="beta_2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1125" seq="2008-1125" published="2008-03-03" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Multiple directory traversal vulnerabilities in Podcast Generator 1.0 BETA 2 and earlier allow remote attackers to read arbitrary files via a .. (dot dot) in the (1) theme_path parameter to core/themes.php and the (2) filename parameter to download.php.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28038">28038</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5200">5200</ref>
    </refs>
    <vuln_soft>
      <prod name="podcast_generator" vendor="podcast_generator">
        <vers num="1.0" prev="1" edition="beta_2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1126" seq="2008-1126" published="2008-03-03" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in main.php in Barryvan Compo Manager 0.3 allows remote attackers to execute arbitrary PHP code via a URL in the pageURL parameter.</descript>
      <descript source="nvd">More information available at:
http://www.securityfocus.com/bid/28035/info</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28035">28035</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5202">5202</ref>
    </refs>
    <vuln_soft>
      <prod name="barryvan_compo_manager" vendor="barryvan_compo">
        <vers num="0.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1127" seq="2008-1127" published="2008-03-03" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.0" CVSS_base_score="6.0" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="6.8" CVSS_vector="(AV:N/AC:M/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Format string vulnerability in the cryactio function in Crysis 1.1.1.5879 allows remote authenticated users to execute arbitrary code via format string specifiers in the user name, which is triggered when the game character is killed.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28039">28039</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0735">ADV-2008-0735</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5201">5201</ref>
    </refs>
    <vuln_soft>
      <prod name="crysis" vendor="crytek">
        <vers num="1.1.1.5879"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1128" seq="2008-1128" published="2008-03-03" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in tourney/index.php in phpMyTourney 2 allows remote attackers to execute arbitrary PHP code via a URL in the page parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3708">3708</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488951/100/0/threaded">20080229 PHPMyTourney Remote file include Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28057">28057</ref>
    </refs>
    <vuln_soft>
      <prod name="phpmytourney" vendor="phpmytourney">
        <vers num="2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1129" seq="2008-1129" published="2008-03-03" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in admin/users/self.php in XRMS CRM allows remote attackers to inject arbitrary web script or HTML via the msg parameter.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3709">3709</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488925/100/0/threaded">20080228 XSS on XRMS- open source CRM</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28041">28041</ref>
    </refs>
    <vuln_soft>
      <prod name="xrms" vendor="xrms_crm">
        <vers num="1.99.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1130" seq="2008-1130" published="2008-03-03" modified="2011-03-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.6" CVSS_base_score="6.6" CVSS_impact_subscore="9.2" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in IBM WebSphere MQ 6.0.x before 6.0.2.2 and 5.3 before Fix Pack 14 allows attackers to bypass access restrictions for a queue manager via a SVRCONN (MQ client) channel.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28046">28046</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019527">1019527</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0719">ADV-2008-0719</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/docview.wss?rs=171&amp;uid=swg1IZ01272">IZ01272</ref>
    </refs>
    <vuln_soft>
      <prod name="websphere_mq" vendor="ibm">
        <vers num="5.3"/>
        <vers num="6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1131" seq="2008-1131" published="2008-03-03" modified="2008-09-05" severity="Low" CVSS_version="2.0" CVSS_score="3.5" CVSS_base_score="3.5" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="6.8" CVSS_vector="(AV:N/AC:M/Au:S/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Drupal 6.0 allows remote authenticated users to inject arbitrary web script or HTML via titles in content edit forms.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://drupal.org/node/227608" patch="1">http://drupal.org/node/227608</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28026" patch="1">28026</ref>
    </refs>
    <vuln_soft>
      <prod name="drupal" vendor="drupal">
        <vers num="6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1132" seq="2008-1132" published="2008-03-03" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="4.7" CVSS_base_score="4.7" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:N/I:C/A:N)">
    <desc>
      <descript source="cve">Untrusted search path vulnerability in src/mainwindow.c in Net Activity Viewer 0.2.1 allows local users with Net Activity Viewer privileges to execute arbitrary code via a malicious gksu program, which is invoked during the Restart As Root action.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=579181" patch="1">http://sourceforge.net/project/shownotes.php?release_id=579181</ref>
    </refs>
    <vuln_soft>
      <prod name="net_activity_viewer" vendor="net_activity_viewer">
        <vers num="0.2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1133" seq="2008-1133" published="2008-03-04" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The Drupal.checkPlain function in Drupal 6.0 only escapes the first instance of a character in ECMAScript, which allows remote attackers to conduct cross-site scripting (XSS) attacks.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://drupal.org/node/227608" patch="1">http://drupal.org/node/227608</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28026" patch="1">28026</ref>
    </refs>
    <vuln_soft>
      <prod name="drupal" vendor="drupal">
        <vers num="6.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1134" seq="2008-1134" published="2008-03-04" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">OMEGA (aka Omegasoft) INterneSErvicesLosungen (INSEL) 7 supports authentication with a cookie that lacks a shared secret, which allows remote attackers to login as an arbitrary user via a modified cookie.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486009/100/0/threaded">20080109 Privileg escalation in Omegasoft Insel 7</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27210">27210</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39575">insel-cookie-weak-security(39575)</ref>
    </refs>
    <vuln_soft>
      <prod name="interneserviceslosungen" vendor="omegasoft">
        <vers num="7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1135" seq="2008-1135" published="2008-03-04" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">OMEGA (aka Omegasoft) INterneSErvicesLosungen (INSEL) 7 generates different responses depending on whether or not a username is valid in a failed login attempt, which allows remote attackers to enumerate valid usernames.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486009/100/0/threaded">20080109 Privileg escalation in Omegasoft Insel 7</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27210">27210</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39574">insel-error-information-disclosure(39574)</ref>
    </refs>
    <vuln_soft>
      <prod name="interneserviceslosungen" vendor="omegasoft">
        <vers num="7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1136" seq="2008-1136" published="2008-03-04" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The Utils::runScripts function in src/utils.cpp in vdccm 0.92 through 0.10.0 in SynCE (SynCE-dccm) allows remote attackers to execute arbitrary commands via shell metacharacters in a certain string to TCP port 5679.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3710">3710</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/forum/forum.php?forum_id=766440">http://sourceforge.net/forum/forum.php?forum_id=766440</ref>
      <ref source="MISC" url="http://www.coresecurity.com/?action=item&amp;id=2070">http://www.coresecurity.com/?action=item&amp;id=2070</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/485884/100/0/threaded">20080107 CORE-2007-1106: SynCE Remote Command Injection</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27178">27178</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28141">28141</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/39506">synce-vdccm-command-execution(39506)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00131.html">FEDORA-2008-0680</ref>
    </refs>
    <vuln_soft>
      <prod name="synce" vendor="synce">
        <vers num="0.10.0"/>
        <vers num="0.92"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1137" seq="2008-1137" published="2008-03-04" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the Garys Cookbook (com_garyscookbook) 1.1.1 and earlier component for Mambo and Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a detail action to index.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488696/100/100/threaded">20080224 joomla com_garyscookbook SQL Injection(id)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27972">27972</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40803">garyscookbook-index-sql-injection(40803)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5178">5178</ref>
    </refs>
    <vuln_soft>
      <prod name="com_garyscookbook" vendor="joomla">
        <vers num="1.1.1"/>
      </prod>
      <prod name="com_garyscookbook" vendor="mambo">
        <vers num="1.1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1138" seq="2008-1138" published="2008-03-04" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.9" CVSS_base_score="4.9" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">DLMFENC.sys 1.0.0.26 in DESlock+ 3.2.6 and earlier allows local users to cause a denial of service (system crash) via a certain ZERO_MEM DLMFENC_IOCTL request to \\.\DLKPFSD_Device, aka the "ring0 link list zero" vulnerability.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0597">ADV-2008-0597</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41204">deslock-dlmfencsys-dos(41204)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5142">5142</ref>
    </refs>
    <vuln_soft>
      <prod name="deslock" vendor="deslock">
        <vers num="3.2.6" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1139" seq="2008-1139" published="2008-03-04" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">DESlock+ 3.2.6 and earlier, when DLMFENC.sys 1.0.0.26 and DLMFDISK.sys 1.2.0.27 are present, allows local users to gain privileges via a certain DLMFENC_IOCTL request to \\.\DLKPFSD_Device that overwrites a pointer, aka the "ring0 link list zero SYSTEM" vulnerability.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0597">ADV-2008-0597</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5143">5143</ref>
    </refs>
    <vuln_soft>
      <prod name="deslock" vendor="deslock">
        <vers num="3.2.6" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1140" seq="2008-1140" published="2008-03-04" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">DLMFDISK.sys 1.2.0.27 in DESlock+ 3.2.6 and earlier allows local users to gain privileges via a certain DLKFDISK_IOCTL request to \\.\DLKFDisk_Control that overwrites a data structure associated with a mounted pseudo-filesystem, aka the "ring0 SYSTEM" vulnerability.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0597">ADV-2008-0597</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5144">5144</ref>
    </refs>
    <vuln_soft>
      <prod name="deslock" vendor="deslock">
        <vers num="3.2.6" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1141" seq="2008-1141" published="2008-03-04" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.9" CVSS_base_score="4.9" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Memory leak in DLMFENC.sys 1.0.0.26 in DESlock+ 3.2.6 and earlier allows local users to cause a denial of service (kernel memory consumption) via a series of DLMFENC_IOCTL requests to \\.\DLKPFSD_Device that allocate "link list structures."</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0597">ADV-2008-0597</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5141">5141</ref>
    </refs>
    <vuln_soft>
      <prod name="deslock" vendor="deslock">
        <vers num="3.2.6" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1142" seq="2008-1142" published="2008-04-07" modified="2009-02-26" severity="Low" CVSS_version="2.0" CVSS_score="3.7" CVSS_base_score="3.7" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="1.9" CVSS_vector="(AV:L/AC:H/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">rxvt 2.6.4 opens a terminal window on :0 if the DISPLAY environment variable is not set, which might allow local users to hijack X11 connections.  NOTE: it was later reported that rxvt-unicode, mrxvt, aterm, multi-aterm, and wterm are also affected.  NOTE: realistic attack scenarios require that the victim enters a command on the wrong machine.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MISC" url="http://article.gmane.org/gmane.comp.security.oss.general/122">http://article.gmane.org/gmane.comp.security.oss.general/122</ref>
      <ref source="CONFIRM" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=469296" adv="1">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=469296</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html">SUSE-SR:2008:017</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200805-03.xml">GLSA-200805-03</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:161">MDVSA-2008:161</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:221">MDVSA-2008:221</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28512" patch="1">28512</ref>
    </refs>
    <vuln_soft>
      <prod name="aterm" vendor="aterm">
        <vers num="0.1.0"/>
        <vers num="0.1.1"/>
        <vers num="0.2.0"/>
        <vers num="0.3.0"/>
        <vers num="0.3.1"/>
        <vers num="0.3.2"/>
        <vers num="0.3.3"/>
        <vers num="0.3.4"/>
        <vers num="0.3.5"/>
        <vers num="0.3.6"/>
        <vers num="0.4.0"/>
        <vers num="0.4.1"/>
        <vers num="0.4.2"/>
        <vers num="1.00" edition="beta1"/>
        <vers num="1.00" edition="beta2"/>
        <vers num="1.00" edition="beta3"/>
        <vers num="1.00" edition="beta4"/>
        <vers num="1.0.0" prev="1"/>
      </prod>
      <prod name="eterm" vendor="eterm">
        <vers num="0.9.2"/>
        <vers num="0.9.3" prev="1"/>
      </prod>
      <prod name="mrxvt" vendor="mrxvt">
        <vers num="0.4.2"/>
        <vers num="0.5.2" prev="1"/>
      </prod>
      <prod name="multi-aterm" vendor="multi-aterm">
        <vers num="0.0.1"/>
        <vers num="0.0.3"/>
        <vers num="0.0.4"/>
        <vers num="0.0.5"/>
        <vers num="0.1"/>
        <vers num="0.2" prev="1"/>
      </prod>
      <prod name="rxvt" vendor="rxvt">
        <vers num="2.6.1"/>
        <vers num="2.6.2"/>
        <vers num="2.6.3"/>
        <vers num="2.6.4"/>
        <vers num="2.7.5"/>
        <vers num="2.7.6"/>
        <vers num="2.7.7"/>
        <vers num="2.7.8"/>
        <vers num="2.7.9" prev="1"/>
      </prod>
      <prod name="rxvt-unicode" vendor="rxvt-unicode">
        <vers num="1.0"/>
        <vers num="1.1"/>
        <vers num="1.2"/>
        <vers num="1.3"/>
        <vers num="1.4"/>
        <vers num="1.5"/>
        <vers num="1.6"/>
        <vers num="1.7"/>
        <vers num="1.8"/>
        <vers num="1.9"/>
        <vers num="1.91"/>
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="2.2"/>
        <vers num="2.3"/>
        <vers num="2.4"/>
        <vers num="2.5"/>
        <vers num="2.6"/>
        <vers num="2.7"/>
        <vers num="2.8"/>
        <vers num="2.9"/>
        <vers num="3.0"/>
        <vers num="3.1"/>
        <vers num="3.2"/>
        <vers num="3.3"/>
        <vers num="3.4"/>
        <vers num="3.5"/>
        <vers num="3.6"/>
        <vers num="3.7"/>
        <vers num="3.8"/>
        <vers num="3.9"/>
        <vers num="4.0"/>
        <vers num="4.1"/>
        <vers num="4.2"/>
        <vers num="4.3"/>
        <vers num="4.4"/>
        <vers num="4.5"/>
        <vers num="4.6"/>
        <vers num="4.7"/>
        <vers num="4.8"/>
        <vers num="4.9"/>
        <vers num="5.0"/>
        <vers num="5.1"/>
        <vers num="5.2"/>
        <vers num="5.3"/>
        <vers num="5.4"/>
        <vers num="5.5"/>
        <vers num="5.6"/>
        <vers num="5.7"/>
        <vers num="5.8"/>
        <vers num="5.9"/>
        <vers num="6.0"/>
        <vers num="6.1"/>
        <vers num="6.2"/>
        <vers num="6.3"/>
        <vers num="7.0"/>
        <vers num="7.1"/>
        <vers num="7.2"/>
        <vers num="7.3"/>
        <vers num="7.4"/>
        <vers num="7.5"/>
        <vers num="7.6"/>
        <vers num="7.7"/>
        <vers num="7.8"/>
        <vers num="7.9"/>
        <vers num="8.0"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="8.3"/>
        <vers num="8.4"/>
        <vers num="8.5"/>
        <vers num="8.5a"/>
        <vers num="8.6"/>
        <vers num="8.7"/>
        <vers num="8.8"/>
        <vers num="8.9"/>
        <vers num="9.0"/>
        <vers num="9.01" prev="1"/>
      </prod>
      <prod name="wterm" vendor="wterm">
        <vers num="6.2.5"/>
        <vers num="6.2.6"/>
        <vers num="6.2.8a2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1144" seq="2008-1144" published="2008-09-05" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.3" CVSS_base_score="6.3" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="6.8" CVSS_vector="(AV:N/AC:M/Au:S/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">The Marvell driver for the Netgear WN802T Wi-Fi access point with firmware 1.3.16 on the Marvell 88W8361P-BEM1 chipset does not properly parse EAPoL-Key packets, which allows remote authenticated users to cause a denial of service (device reboot or hang) or possibly execute arbitrary code via a malformed EAPoL-Key packet with a crafted "advertised length."</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/4227">4227</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/495982/100/0/threaded">20080904 Marvell Driver EAPoL-Key Length Overflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/31013">31013</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/44919">netgear-wn802t-eapolkey-dos(44919)</ref>
    </refs>
    <vuln_soft>
      <prod name="88w8361w-bem1" vendor="marvell">
        <vers num=""/>
      </prod>
      <prod name="wn802t" vendor="netgear">
        <vers num="1.3.16"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1145" seq="2008-1145" published="2008-03-04" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in WEBrick in Ruby 1.8 before 1.8.5-p115 and 1.8.6-p114, and 1.9 through 1.9.0-1, when running on systems that support backslash (\) path separators or case-insensitive file names, allows remote attackers to access arbitrary files via (1) "..%5c" (encoded backslash) sequences or (2) filenames that match patterns in the :NondisclosureName option.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html">APPLE-SA-2008-06-30</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html">SUSE-SR:2008:017</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT2163">http://support.apple.com/kb/HT2163</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0123">http://wiki.rpath.com/Advisories:rPSA-2008-0123</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0123">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0123</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/404515">VU#404515</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:141">MDVSA-2008:141</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:142">MDVSA-2008:142</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0897.html">RHSA-2008:0897</ref>
      <ref source="CONFIRM" url="http://www.ruby-lang.org/en/news/2008/03/03/webrick-file-access-vulnerability/" patch="1">http://www.ruby-lang.org/en/news/2008/03/03/webrick-file-access-vulnerability/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489205/100/0/threaded">20080306 [DSECRG-08-018] Ruby 1.8.6 (Webrick Httpd 1.3.1) Directory traversal file Download Vulnerability</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489218/100/0/threaded">20080306 Re: [DSECRG-08-018] Ruby 1.8.6 (Webrick Httpd 1.3.1) Directory traversal file Download Vulnerability</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490056/100/0/threaded">20080325 rPSA-2008-0123-1 ruby</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28123">28123</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019562">1019562</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0787">ADV-2008-0787</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1981/references">ADV-2008-1981</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41010">ruby-webrick-directory-traversal(41010)</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2338">https://issues.rpath.com/browse/RPL-2338</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10937">oval:org.mitre.oval:def:10937</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5215">5215</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00338.html">FEDORA-2008-2443</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00354.html">FEDORA-2008-2458</ref>
    </refs>
    <vuln_soft>
      <prod name="webrick" vendor="webrick">
        <vers num="1.8" prev="1"/>
        <vers num="1.8_p114" prev="1"/>
        <vers num="1.8_p115" prev="1"/>
        <vers num="1.9" prev="1"/>
        <vers num="1.9_1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1146" seq="2008-1146" published="2008-03-04" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">A certain pseudo-random number generator (PRNG) algorithm that uses XOR and 3-bit random hops (aka "Algorithm X3"), as used in OpenBSD 2.8 through 4.2, allows remote attackers to guess sensitive values such as DNS transaction IDs by observing a sequence of previously generated values.  NOTE: this issue can be leveraged for attacks such as DNS cache poisoning against OpenBSD's modification of BIND.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.securiteam.com/securityreviews/5PP0H0UNGW.html">http://www.securiteam.com/securityreviews/5PP0H0UNGW.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487658">20080206 A paper by Amit Klein (Trusteer): "OpenBSD DNS Cache Poisoning and Multiple O/S Predictable IP ID Vulnerability"</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27647">27647</ref>
      <ref source="MISC" url="http://www.trusteer.com/docs/OpenBSD_DNS_Cache_Poisoning_and_Multiple_OS_Predictable_IP_ID_Vulnerability.pdf">http://www.trusteer.com/docs/OpenBSD_DNS_Cache_Poisoning_and_Multiple_OS_Predictable_IP_ID_Vulnerability.pdf</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40329">openbsd-prng-dns-spoofing(40329)</ref>
    </refs>
    <vuln_soft>
      <prod name="directory_pro" vendor="cosmicperl">
        <vers num="10.0.3"/>
      </prod>
      <prod name="darwin" vendor="darwin">
        <vers num="1.0"/>
        <vers num="9.1"/>
      </prod>
      <prod name="financials_server" vendor="navision">
        <vers num="3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1147" seq="2008-1147" published="2008-03-04" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">A certain pseudo-random number generator (PRNG) algorithm that uses XOR and 2-bit random hops (aka "Algorithm X2"), as used in OpenBSD 2.6 through 3.4, Mac OS X 10 through 10.5.1, FreeBSD 4.4 through 7.0, and DragonFlyBSD 1.0 through 1.10.1, allows remote attackers to guess sensitive values such as IP fragmentation IDs by observing a sequence of previously generated values.  NOTE: this issue can be leveraged for attacks such as injection into TCP packets and OS fingerprinting.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://seclists.org/bugtraq/2008/Feb/0052.html">20080206 Re: A paper by Amit Klein (Trusteer): "OpenBSD DNS Cache Poisoning and Multiple O/S Predictable IP ID Vulnerability"</ref>
      <ref source="BUGTRAQ" url="http://seclists.org/bugtraq/2008/Feb/0063.html">20080206 RE: A paper by Amit Klein (Trusteer): "OpenBSD DNS Cache Poisoning and Multiple O/S Predictable IP ID Vulnerability"</ref>
      <ref source="CONFIRM" url="http://www.freebsd.org/cgi/cvsweb.cgi/src/sys/netinet/ip_id.c?rev=1.10;contenttype=">http://www.freebsd.org/cgi/cvsweb.cgi/src/sys/netinet/ip_id.c?rev=1.10;contenttype=</ref>
      <ref source="MISC" url="http://www.securiteam.com/securityreviews/5PP0H0UNGW.html">http://www.securiteam.com/securityreviews/5PP0H0UNGW.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487658">20080206 A paper by Amit Klein (Trusteer): "OpenBSD DNS Cache Poisoning and Multiple O/S Predictable IP ID Vulnerability"</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27647">27647</ref>
      <ref source="MISC" url="http://www.trusteer.com/docs/OpenBSD_DNS_Cache_Poisoning_and_Multiple_OS_Predictable_IP_ID_Vulnerability.pdf">http://www.trusteer.com/docs/OpenBSD_DNS_Cache_Poisoning_and_Multiple_OS_Predictable_IP_ID_Vulnerability.pdf</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40329">openbsd-prng-dns-spoofing(40329)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41155">openbsd-xor-weak-security(41155)</ref>
    </refs>
    <vuln_soft>
      <prod name="directory_pro" vendor="cosmicperl">
        <vers num="10.0.3"/>
      </prod>
      <prod name="darwin" vendor="darwin">
        <vers num="1.0"/>
        <vers num="9.1"/>
      </prod>
      <prod name="financials_server" vendor="navision">
        <vers num="3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1148" seq="2008-1148" published="2008-03-04" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">A certain pseudo-random number generator (PRNG) algorithm that uses ADD with 0 random hops (aka "Algorithm A0"), as used in OpenBSD 3.5 through 4.2 and NetBSD 1.6.2 through 4.0, allows remote attackers to guess sensitive values such as (1) DNS transaction IDs or (2) IP fragmentation IDs by observing a sequence of previously generated values.  NOTE: this issue can be leveraged for attacks such as DNS cache poisoning, injection into TCP packets, and OS fingerprinting.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.securiteam.com/securityreviews/5PP0H0UNGW.html">http://www.securiteam.com/securityreviews/5PP0H0UNGW.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487658">20080206 A paper by Amit Klein (Trusteer): "OpenBSD DNS Cache Poisoning and Multiple O/S Predictable IP ID Vulnerability"</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27647">27647</ref>
      <ref source="MISC" url="http://www.trusteer.com/docs/OpenBSD_DNS_Cache_Poisoning_and_Multiple_OS_Predictable_IP_ID_Vulnerability.pdf">http://www.trusteer.com/docs/OpenBSD_DNS_Cache_Poisoning_and_Multiple_OS_Predictable_IP_ID_Vulnerability.pdf</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40329">openbsd-prng-dns-spoofing(40329)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41157">openbsd-add-weak-security(41157)</ref>
    </refs>
    <vuln_soft>
      <prod name="directory_pro" vendor="cosmicperl">
        <vers num="10.0.3"/>
      </prod>
      <prod name="darwin" vendor="darwin">
        <vers num="1.0"/>
        <vers num="9.1"/>
      </prod>
      <prod name="financials_server" vendor="navision">
        <vers num="3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1149" seq="2008-1149" published="2008-03-04" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.1" CVSS_base_score="5.1" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">phpMyAdmin before 2.11.5 accesses $_REQUEST to obtain some parameters instead of $_GET and $_POST, which allows attackers in the same domain to override certain variables and conduct SQL injection and Cross-Site Request Forgery (CSRF) attacks by using crafted cookies.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html">SUSE-SR:2008:026</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html">SUSE-SR:2009:003</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1557" patch="1">DSA-1557</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200803-15.xml">GLSA-200803-15</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:131">MDVSA-2008:131</ref>
      <ref source="CONFIRM" url="http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2008-1" adv="1" patch="1">http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2008-1</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28068" patch="1">28068</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0731" adv="1">ADV-2008-0731</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0758" adv="1">ADV-2008-0758</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40968">phpmyadmin-request-sql-injection(40968)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00069.html">FEDORA-2008-2189</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00100.html">FEDORA-2008-2229</ref>
    </refs>
    <vuln_soft>
      <prod name="phpmyadmin" vendor="phpmyadmin">
        <vers num="2.11.0" edition="beta1"/>
        <vers num="2.11.0" edition="rc1"/>
        <vers num="2.11.0.0"/>
        <vers num="2.11.1" edition="rc1"/>
        <vers num="2.11.1.0"/>
        <vers num="2.11.1.1"/>
        <vers num="2.11.1.2"/>
        <vers num="2.11.2"/>
        <vers num="2.11.2.0"/>
        <vers num="2.11.2.1"/>
        <vers num="2.11.2.2"/>
        <vers num="2.11.3" edition="rc1"/>
        <vers num="2.11.3.0"/>
        <vers num="2.11.4" prev="1" edition="rc1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1150" seq="2008-1150" published="2008-03-27" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.1" CVSS_base_score="7.1" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">The virtual private dial-up network (VPDN) component in Cisco IOS before 12.3 allows remote attackers to cause a denial of service (resource exhaustion) via a series of PPTP sessions, related to the persistence of interface descriptor block (IDB) data structures after process termination, aka bug ID CSCdv59309.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019714">1019714</ref>
      <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_advisory09186a0080969862.shtml" patch="1">20080326 Cisco IOS Virtual Private Dial-up Network Denial of Service Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28460">28460</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-087B.html">TA08-087B</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1006/references">ADV-2008-1006</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41484">cisco-ios-vpdn-idb-dos(41484)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5598">oval:org.mitre.oval:def:5598</ref>
    </refs>
    <vuln_soft>
      <prod name="ios" vendor="cisco">
        <vers num="12.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1151" seq="2008-1151" published="2008-03-27" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.1" CVSS_base_score="7.1" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Memory leak in the virtual private dial-up network (VPDN) component in Cisco IOS before 12.3 allows remote attackers to cause a denial of service (memory consumption) via a series of PPTP sessions, related to "dead memory" that remains allocated after process termination, aka bug ID CSCsj58566.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019714">1019714</ref>
      <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_advisory09186a0080969862.shtml">20080326 Cisco IOS Virtual Private Dial-up Network Denial of Service Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28460">28460</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-087B.html">TA08-087B</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1006/references">ADV-2008-1006</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41483">cisco-ios-vpdn-pptp-dos(41483)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5287">oval:org.mitre.oval:def:5287</ref>
    </refs>
    <vuln_soft>
      <prod name="ios" vendor="cisco">
        <vers num="12.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1152" seq="2008-1152" published="2008-03-27" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">The data-link switching (DLSw) component in Cisco IOS 12.0 through 12.4 allows remote attackers to cause a denial of service (device restart or memory consumption) via crafted (1) UDP port 2067 or (2) IP protocol 91 packets.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_advisory09186a0080969866.shtml" patch="1">20080326 Multiple DLSw Denial of Service Vulnerabilities in Cisco IOS</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28465">28465</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019712">1019712</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-087B.html">TA08-087B</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1006/references">ADV-2008-1006</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41482">cisco-ios-dlsw-dos(41482)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5821">oval:org.mitre.oval:def:5821</ref>
    </refs>
    <vuln_soft>
      <prod name="cisco_ios" vendor="cisco">
        <vers num="12.0" edition="da"/>
        <vers num="12.0" edition="db"/>
        <vers num="12.0" edition="dc"/>
        <vers num="12.0" edition="s"/>
        <vers num="12.0" edition="sc"/>
        <vers num="12.0" edition="sl"/>
        <vers num="12.0" edition="sp"/>
        <vers num="12.0" edition="st"/>
        <vers num="12.0" edition="sx"/>
        <vers num="12.0" edition="sy"/>
        <vers num="12.0" edition="sz"/>
        <vers num="12.0" edition="t"/>
        <vers num="12.0" edition="wc"/>
        <vers num="12.0" edition="wt"/>
        <vers num="12.0" edition="xa"/>
        <vers num="12.0" edition="xb"/>
        <vers num="12.0" edition="xc"/>
        <vers num="12.0" edition="xd"/>
        <vers num="12.0" edition="xe"/>
        <vers num="12.0" edition="xf"/>
        <vers num="12.0" edition="xg"/>
        <vers num="12.0" edition="xh"/>
        <vers num="12.0" edition="xi"/>
        <vers num="12.0" edition="xj"/>
        <vers num="12.0" edition="xk"/>
        <vers num="12.0" edition="xl"/>
        <vers num="12.0" edition="xm"/>
        <vers num="12.0" edition="xn"/>
        <vers num="12.0" edition="xo"/>
        <vers num="12.0" edition="xq"/>
        <vers num="12.0" edition="xr"/>
        <vers num="12.0" edition="xs"/>
        <vers num="12.0" edition="xv"/>
        <vers num="12.0" edition="xw"/>
        <vers num="12.1" edition="aa"/>
        <vers num="12.1" edition="ax"/>
        <vers num="12.1" edition="az"/>
        <vers num="12.1" edition="b"/>
        <vers num="12.1" edition="c"/>
        <vers num="12.1" edition="cx"/>
        <vers num="12.1" edition="d"/>
        <vers num="12.1" edition="da"/>
        <vers num="12.1" edition="db"/>
        <vers num="12.1" edition="dc"/>
        <vers num="12.1" edition="e"/>
        <vers num="12.1" edition="ea"/>
        <vers num="12.1" edition="eb"/>
        <vers num="12.1" edition="ec"/>
        <vers num="12.1" edition="eo"/>
        <vers num="12.1" edition="eu"/>
        <vers num="12.1" edition="ew"/>
        <vers num="12.1" edition="ex"/>
        <vers num="12.1" edition="ey"/>
        <vers num="12.1" edition="ez"/>
        <vers num="12.1" edition="ga"/>
        <vers num="12.1" edition="gb"/>
        <vers num="12.1" edition="xa"/>
        <vers num="12.1" edition="xb"/>
        <vers num="12.1" edition="xc"/>
        <vers num="12.1" edition="xd"/>
        <vers num="12.1" edition="xe"/>
        <vers num="12.1" edition="xf"/>
        <vers num="12.1" edition="xg"/>
        <vers num="12.1" edition="xh"/>
        <vers num="12.1" edition="xi"/>
        <vers num="12.1" edition="xj"/>
        <vers num="12.1" edition="xk"/>
        <vers num="12.1" edition="xl"/>
        <vers num="12.1" edition="xm"/>
        <vers num="12.1" edition="xp"/>
        <vers num="12.1" edition="xq"/>
        <vers num="12.1" edition="xr"/>
        <vers num="12.1" edition="xs"/>
        <vers num="12.1" edition="xt"/>
        <vers num="12.1" edition="xv"/>
        <vers num="12.1" edition="xw"/>
        <vers num="12.1" edition="xx"/>
        <vers num="12.1" edition="xy"/>
        <vers num="12.1" edition="xz"/>
        <vers num="12.1" edition="ya"/>
        <vers num="12.1" edition="yb"/>
        <vers num="12.1" edition="yc"/>
        <vers num="12.1" edition="yd"/>
        <vers num="12.1" edition="ye"/>
        <vers num="12.1" edition="yf"/>
        <vers num="12.1" edition="yh"/>
        <vers num="12.1" edition="yi"/>
        <vers num="12.1" edition="yj"/>
        <vers num="12.2" edition="b"/>
        <vers num="12.2" edition="bc"/>
        <vers num="12.2" edition="bw"/>
        <vers num="12.2" edition="by"/>
        <vers num="12.2" edition="bz"/>
        <vers num="12.2" edition="cx"/>
        <vers num="12.2" edition="cy"/>
        <vers num="12.2" edition="da"/>
        <vers num="12.2" edition="dd"/>
        <vers num="12.2" edition="dx"/>
        <vers num="12.2" edition="eu"/>
        <vers num="12.2" edition="ew"/>
        <vers num="12.2" edition="ewa"/>
        <vers num="12.2" edition="ex"/>
        <vers num="12.2" edition="ey"/>
        <vers num="12.2" edition="ez"/>
        <vers num="12.2" edition="fz"/>
        <vers num="12.2" edition="ixa"/>
        <vers num="12.2" edition="ixb"/>
        <vers num="12.2" edition="ixc"/>
        <vers num="12.2" edition="ixd"/>
        <vers num="12.2" edition="ja"/>
        <vers num="12.2" edition="mb"/>
        <vers num="12.2" edition="mc"/>
        <vers num="12.2" edition="s"/>
        <vers num="12.2" edition="sb"/>
        <vers num="12.2" edition="sbc"/>
        <vers num="12.2" edition="se"/>
        <vers num="12.2" edition="sea"/>
        <vers num="12.2" edition="seb"/>
        <vers num="12.2" edition="sec"/>
        <vers num="12.2" edition="sed"/>
        <vers num="12.2" edition="see"/>
        <vers num="12.2" edition="sef"/>
        <vers num="12.2" edition="seg"/>
        <vers num="12.2" edition="sg"/>
        <vers num="12.2" edition="sga"/>
        <vers num="12.2" edition="sm"/>
        <vers num="12.2" edition="so"/>
        <vers num="12.2" edition="sra"/>
        <vers num="12.2" edition="srb"/>
        <vers num="12.2" edition="st"/>
        <vers num="12.2" edition="su"/>
        <vers num="12.2" edition="sv"/>
        <vers num="12.2" edition="sw"/>
        <vers num="12.2" edition="sxa"/>
        <vers num="12.2" edition="sxb"/>
        <vers num="12.2" edition="sxd"/>
        <vers num="12.2" edition="sy"/>
        <vers num="12.2" edition="sz"/>
        <vers num="12.2" edition="t"/>
        <vers num="12.2" edition="tpc"/>
        <vers num="12.2" edition="uz"/>
        <vers num="12.2" edition="xa"/>
        <vers num="12.2" edition="xb"/>
        <vers num="12.2" edition="xc"/>
        <vers num="12.2" edition="xd"/>
        <vers num="12.2" edition="xe"/>
        <vers num="12.2" edition="xf"/>
        <vers num="12.2" edition="xg"/>
        <vers num="12.2" edition="xh"/>
        <vers num="12.2" edition="xi"/>
        <vers num="12.2" edition="xj"/>
        <vers num="12.2" edition="xk"/>
        <vers num="12.2" edition="xl"/>
        <vers num="12.2" edition="xm"/>
        <vers num="12.2" edition="xn"/>
        <vers num="12.2" edition="xq"/>
        <vers num="12.2" edition="xr"/>
        <vers num="12.2" edition="xs"/>
        <vers num="12.2" edition="xt"/>
        <vers num="12.2" edition="xu"/>
        <vers num="12.2" edition="xv"/>
        <vers num="12.2" edition="xw"/>
        <vers num="12.2" edition="ya"/>
        <vers num="12.2" edition="yb"/>
        <vers num="12.2" edition="yc"/>
        <vers num="12.2" edition="ye"/>
        <vers num="12.2" edition="yj"/>
        <vers num="12.2" edition="yk"/>
        <vers num="12.2" edition="yl"/>
        <vers num="12.2" edition="ym"/>
        <vers num="12.2" edition="yn"/>
        <vers num="12.2" edition="yo"/>
        <vers num="12.2" edition="yp"/>
        <vers num="12.2" edition="yq"/>
        <vers num="12.2" edition="yr"/>
        <vers num="12.2" edition="ys"/>
        <vers num="12.2" edition="yt"/>
        <vers num="12.2" edition="yu"/>
        <vers num="12.2" edition="yv"/>
        <vers num="12.2" edition="yx"/>
        <vers num="12.2" edition="yy"/>
        <vers num="12.2" edition="za"/>
        <vers num="12.2" edition="zb"/>
        <vers num="12.2" edition="zc"/>
        <vers num="12.2" edition="zd"/>
        <vers num="12.2" edition="ze"/>
        <vers num="12.2" edition="zf"/>
        <vers num="12.2" edition="zg"/>
        <vers num="12.2" edition="zh"/>
        <vers num="12.2" edition="zj"/>
        <vers num="12.2" edition="zl"/>
        <vers num="12.2" edition="zp"/>
        <vers num="12.2" edition="zy"/>
        <vers num="12.3" edition="b"/>
        <vers num="12.3" edition="bc"/>
        <vers num="12.3" edition="bw"/>
        <vers num="12.3" edition="eu"/>
        <vers num="12.3" edition="ja"/>
        <vers num="12.3" edition="jea"/>
        <vers num="12.3" edition="jeb"/>
        <vers num="12.3" edition="jec"/>
        <vers num="12.3" edition="jl"/>
        <vers num="12.3" edition="jx"/>
        <vers num="12.3" edition="t"/>
        <vers num="12.3" edition="tpc"/>
        <vers num="12.3" edition="va"/>
        <vers num="12.3" edition="xa"/>
        <vers num="12.3" edition="xb"/>
        <vers num="12.3" edition="xc"/>
        <vers num="12.3" edition="xd"/>
        <vers num="12.3" edition="xe"/>
        <vers num="12.3" edition="xf"/>
        <vers num="12.3" edition="xg"/>
        <vers num="12.3" edition="xh"/>
        <vers num="12.3" edition="xi"/>
        <vers num="12.3" edition="xj"/>
        <vers num="12.3" edition="xk"/>
        <vers num="12.3" edition="xq"/>
        <vers num="12.3" edition="xr"/>
        <vers num="12.3" edition="xs"/>
        <vers num="12.3" edition="xu"/>
        <vers num="12.3" edition="xw"/>
        <vers num="12.3" edition="xy"/>
        <vers num="12.3" edition="ya"/>
        <vers num="12.3" edition="yd"/>
        <vers num="12.3" edition="yf"/>
        <vers num="12.3" edition="yg"/>
        <vers num="12.3" edition="yh"/>
        <vers num="12.3" edition="yi"/>
        <vers num="12.3" edition="yj"/>
        <vers num="12.3" edition="yk"/>
        <vers num="12.3" edition="ym"/>
        <vers num="12.3" edition="yq"/>
        <vers num="12.3" edition="ys"/>
        <vers num="12.3" edition="yt"/>
        <vers num="12.3" edition="yu"/>
        <vers num="12.3" edition="yx"/>
        <vers num="12.3" edition="yz"/>
        <vers num="12.4" edition="ja"/>
        <vers num="12.4" edition="jk"/>
        <vers num="12.4" edition="jma"/>
        <vers num="12.4" edition="jmb"/>
        <vers num="12.4" edition="jmc"/>
        <vers num="12.4" edition="jx"/>
        <vers num="12.4" edition="md"/>
        <vers num="12.4" edition="mr"/>
        <vers num="12.4" edition="sw"/>
        <vers num="12.4" edition="t"/>
        <vers num="12.4" edition="xa"/>
        <vers num="12.4" edition="xb"/>
        <vers num="12.4" edition="xc"/>
        <vers num="12.4" edition="xd"/>
        <vers num="12.4" edition="xe"/>
        <vers num="12.4" edition="xf"/>
        <vers num="12.4" edition="xg"/>
        <vers num="12.4" edition="xj"/>
        <vers num="12.4" edition="xk"/>
        <vers num="12.4" edition="xl"/>
        <vers num="12.4" edition="xm"/>
        <vers num="12.4" edition="xn"/>
        <vers num="12.4" edition="xt"/>
        <vers num="12.4" edition="xv"/>
        <vers num="12.4" edition="xw"/>
        <vers num="12.4" edition="xy"/>
      </prod>
      <prod name="ios" vendor="cisco">
        <vers num="12.0"/>
        <vers num="12.2yd"/>
        <vers num="12.2yf"/>
        <vers num="12.2yg"/>
        <vers num="12.2yh"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1153" seq="2008-1153" published="2008-03-27" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.1" CVSS_base_score="7.1" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Cisco IOS 12.1, 12.2, 12.3, and 12.4, with IPv4 UDP services and the IPv6 protocol enabled, allows remote attackers to cause a denial of service (device crash and possible blocked interface) via a crafted IPv6 packet to the device.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CISCO" url="http://www.cisco.com/warp/public/707/cisco-sa-20080326-IPv4IPv6.shtml" patch="1">20080326 Cisco IOS User Datagram Protocol Delivery Issue For IPv4/IPv6 Dual-stack Routers</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/936177">VU#936177</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28461">28461</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019713">1019713</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-087B.html">TA08-087B</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1006/references">ADV-2008-1006</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41475">cisco-ios-ipv6-dualstack-dos(41475)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5860">oval:org.mitre.oval:def:5860</ref>
    </refs>
    <vuln_soft>
      <prod name="cisco_ios" vendor="cisco">
        <vers num="12.3"/>
        <vers num="12.4"/>
      </prod>
      <prod name="ios" vendor="cisco">
        <vers num="12.1"/>
        <vers num="12.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1154" seq="2008-1154" published="2008-04-04" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The Disaster Recovery Framework (DRF) master server in Cisco Unified Communications products, including Unified Communications Manager (CUCM) 5.x and 6.x, Unified Presence 1.x and 6.x, Emergency Responder 2.x, and Mobility Manager 2.x, does not require authentication for requests received from the network, which allows remote attackers to execute arbitrary code via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019768">1019768</ref>
      <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_advisory09186a008096fd9a.shtml" patch="1">20080403 Cisco Unified Communications Disaster Recovery Framework Command Execution Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28591">28591</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1093">ADV-2008-1093</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41632">cisco-drf-command-execution(41632)</ref>
    </refs>
    <vuln_soft>
      <prod name="emergency_responder" vendor="cisco">
        <vers num="2.0"/>
      </prod>
      <prod name="mobility_manager" vendor="cisco">
        <vers num="2.0"/>
      </prod>
      <prod name="unified_communications_manager" vendor="cisco">
        <vers num="5.0"/>
        <vers num="5.1"/>
        <vers num="6.0"/>
        <vers num="6.1"/>
      </prod>
      <prod name="unified_presence" vendor="cisco">
        <vers num="1.0"/>
        <vers num="6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1155" seq="2008-1155" published="2008-04-16" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Cisco Network Admission Control (NAC) Appliance 3.5.x, 3.6.x before 3.6.4.4, 4.0.x before 4.0.6, and 4.1.x before 4.1.2 allows remote attackers to obtain the shared secret for the Clean Access Server (CAS) and Clean Access Manager (CAM) by sniffing error logs.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_advisory09186a008097bea0.shtml" adv="1" patch="1">20080416 Cisco Network Admission Control Shared Secret Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28807">28807</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019859">1019859</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1248/references">ADV-2008-1248</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41849">cisco-nac-unauthorized-access(41849)</ref>
    </refs>
    <vuln_soft>
      <prod name="network_admission_control" vendor="cisco">
        <vers num="3.5"/>
        <vers num="3.6"/>
        <vers num="3.6.0"/>
        <vers num="3.6.0.1"/>
        <vers num="3.6.1.1"/>
        <vers num="3.6.2.1"/>
        <vers num="3.6.2.2"/>
        <vers num="3.6.4.1"/>
        <vers num="3.6.4.2"/>
        <vers num="3.6.4.3" prev="1"/>
        <vers num="4.0"/>
        <vers num="4.0.0.1"/>
        <vers num="4.0.2.1"/>
        <vers num="4.0.2.2"/>
        <vers num="4.0.3.1"/>
        <vers num="4.0.3.2"/>
        <vers num="4.0.3.3"/>
        <vers num="4.0.5.0"/>
        <vers num="4.0.5.1" prev="1"/>
        <vers num="4.1"/>
        <vers num="4.1.0"/>
        <vers num="4.1.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1156" seq="2008-1156" published="2008-03-27" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="5.1" CVSS_base_score="5.1" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Multicast Virtual Private Network (MVPN) implementation in Cisco IOS 12.0, 12.2, 12.3, and 12.4 allows remote attackers to create "extra multicast states on the core routers" via a crafted Multicast Distribution Tree (MDT) Data Join message.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CISCO" url="http://www.cisco.com/warp/public/707/cisco-sa-20080326-mvpn.shtml" patch="1">20080326 Cisco IOS Multicast Virtual Private Network (MVPN) Data Leak</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28464">28464</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019715">1019715</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-087B.html">TA08-087B</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1006/references">ADV-2008-1006</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41468">cisco-ios-mvpm-information-disclosure(41468)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5648">oval:org.mitre.oval:def:5648</ref>
    </refs>
    <vuln_soft>
      <prod name="cisco_ios" vendor="cisco">
        <vers num="12.3"/>
        <vers num="12.4"/>
      </prod>
      <prod name="ios" vendor="cisco">
        <vers num="12.0"/>
        <vers num="12.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1157" seq="2008-1157" published="2008-03-14" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Cisco CiscoWorks Internetwork Performance Monitor (IPM) 2.6 creates a process that executes a command shell and listens on a randomly chosen TCP port, which allows remote attackers to execute arbitrary commands.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CISCO" url="http://www.cisco.com/warp/public/707/cisco-sa-20080313-ipm.shtml" adv="1" patch="1">20080313 CiscoWorks Internetwork Performance Monitor Remote Command Execution Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28249" patch="1">28249</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019611">1019611</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0876/references">ADV-2008-0876</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41208">cisco-ciscoworks-ipm-command-execution(41208)</ref>
    </refs>
    <vuln_soft>
      <prod name="ciscoworks_internetwork_performance_monitor" vendor="cisco">
        <vers num="2.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1158" seq="2008-1158" published="2008-05-16" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">The Presence Engine (PE) service in Cisco Unified Presence before 6.0(1) allows remote attackers to cause a denial of service (core dump and service interruption) via malformed packets, aka Bug ID CSCsh50164.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020023">1020023</ref>
      <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_advisory09186a0080995682.shtml">20080514 Cisco Unified Presence Denial of Service Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29219">29219</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1534">ADV-2008-1534</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42412">cisco-unifiedpresence-presenceengine-dos(42412)</ref>
    </refs>
    <vuln_soft>
      <prod name="unified_presence" vendor="cisco">
        <vers num="6.0"/>
      </prod>
      <prod name="unified_presence_server" vendor="cisco">
        <vers num="1.0"/>
        <vers num="1.0(1)"/>
        <vers num="1.0(2)"/>
        <vers num="1.0(3)"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1159" seq="2008-1159" published="2008-05-22" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.1" CVSS_base_score="7.1" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Multiple unspecified vulnerabilities in the SSH server in Cisco IOS 12.4 allow remote attackers to cause a denial of service (device restart) via unknown vectors, aka Bug ID (1) CSCsk42419, (2) CSCsk60020, and (3) CSCsh51293.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020073">1020073</ref>
      <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_advisory09186a008099567f.shtml" patch="1">20080521 Cisco IOS Secure Shell Denial of Service Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29314">29314</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1605/references">ADV-2008-1605</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42563">cisco-ios-ssh-multiple-dos(42563)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5486">oval:org.mitre.oval:def:5486</ref>
    </refs>
    <vuln_soft>
      <prod name="ios_s" vendor="cisco">
        <vers num="12.4"/>
      </prod>
      <prod name="ios_t" vendor="cisco">
        <vers num="12.4"/>
      </prod>
      <prod name="ios_xr" vendor="cisco">
        <vers num="12.4"/>
      </prod>
      <prod name="ios_xr" vendor="cisco">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1160" seq="2008-1160" published="2008-03-24" modified="2018-08-13" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">ZyXEL ZyWALL 1050 has a hard-coded password for the Quagga and Zebra processes that is not changed when it is set by a user, which allows remote attackers to gain privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://packetstormsecurity.org/0803-exploits/ZyWALL.pdf">http://packetstormsecurity.org/0803-exploits/ZyWALL.pdf</ref>
      <ref source="MISC" url="http://www.secumania.org/exploits/remote/zyxel-zywall-quagga_zebra-(default-pass)-remote-root-vulnerability-2008032143791/">http://www.secumania.org/exploits/remote/zyxel-zywall-quagga_zebra-(default-pass)-remote-root-vulnerability-2008032143791/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28184">28184</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0990/references" adv="1">ADV-2008-0990</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41424">zywall-quagga-zebra-default-password(41424)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5289">5289</ref>
    </refs>
    <vuln_soft>
      <prod name="zywall" vendor="zyxel">
        <vers num="1050"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1161" seq="2008-1161" published="2008-03-10" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the Matroska demuxer (demuxers/demux_matroska.c) in xine-lib before 1.1.10.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a Matroska file with invalid frame sizes.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://hg.debian.org/hg/xine-lib/xine-lib?cmd=changeset;node=a62d6f482a69;style=gitweb">http://hg.debian.org/hg/xine-lib/xine-lib?cmd=changeset;node=a62d6f482a69;style=gitweb</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html">SUSE-SR:2008:006</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1536">DSA-1536</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:178">MDVSA-2008:178</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28543">28543</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-635-1">USN-635-1</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41172">xinelib-demuxer-bo(41172)</ref>
    </refs>
    <vuln_soft>
      <prod name="demuxer" vendor="matroska">
        <vers num="1.1.10" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1162" seq="2008-1162" published="2008-03-05" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in album.php in PHP WEB SCRIPT Dynamic Photo Gallery 1.02 allows remote attackers to execute arbitrary SQL commands via the albumID parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://forum.aria-security.net/showthread.php?p=1521">http://forum.aria-security.net/showthread.php?p=1521</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489017/100/0/threaded">20080302 Dynamic photo gallery V1.02 SQL Injection</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28067">28067</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5211">5211</ref>
    </refs>
    <vuln_soft>
      <prod name="dynamic_photo_gallery" vendor="php_web_scripts">
        <vers num="1.0.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1163" seq="2008-1163" published="2008-03-05" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in phpArcadeScript 1.0 through 3.0 RC2 allows remote attackers to execute arbitrary SQL commands via the userid parameter in a profile action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28065">28065</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5208">5208</ref>
    </refs>
    <vuln_soft>
      <prod name="phparcadescript" vendor="phparcadescript">
        <vers num="1.0"/>
        <vers num="2.0"/>
        <vers num="3.0" edition="rc1"/>
        <vers num="3.0" edition="rc2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1164" seq="2008-1164" published="2008-03-05" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in phpComasy 0.8 allows remote attackers to execute arbitrary SQL commands via the mod_project_id parameter in a project_detail action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28064">28064</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5209">5209</ref>
    </refs>
    <vuln_soft>
      <prod name="phpcomasy" vendor="phpcomasy">
        <vers num="0.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1165" seq="2008-1165" published="2008-03-05" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in Flyspray 0.9.9 through 0.9.9.4 allow remote attackers to inject arbitrary web script or HTML via (1) a forced SQL error message or (2) old_value and new_value database fields in task summaries, related to the item_summary parameter in a details action in index.php.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://flyspray.org/fsa:3">http://flyspray.org/fsa:3</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40963">flyspray-itemsummary-xss(40963)</ref>
    </refs>
    <vuln_soft>
      <prod name="flyspray" vendor="flyspray">
        <vers num="0.9.9"/>
        <vers num="0.9.9.1"/>
        <vers num="0.9.9.2"/>
        <vers num="0.9.9.3"/>
        <vers num="0.9.9.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1166" seq="2008-1166" published="2008-03-05" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Flyspray 0.9.9.4 generates different error messages depending on whether the username is valid or invalid, which allows remote attackers to enumerate usernames.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489020/100/0/threaded">20080303 [DSECRG-08-017] Flyspray 0.9.9.4 Multiple Security Vulnerabilities</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40964">flyspray-username-information-disclosure(40964)</ref>
    </refs>
    <vuln_soft>
      <prod name="flyspray" vendor="flyspray">
        <vers num="0.9.9"/>
        <vers num="0.9.9.1"/>
        <vers num="0.9.9.2"/>
        <vers num="0.9.9.3"/>
        <vers num="0.9.9.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1167" seq="2008-1167" published="2008-03-05" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the useragent function in useragent.c in Squid Analysis Report Generator (Sarg) 2.2.3.1 allows remote attackers to execute arbitrary code via a long Squid proxy server User-Agent header.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html">SUSE-SR:2008:006</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=581212">http://sourceforge.net/project/shownotes.php?release_id=581212</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200803-21.xml">GLSA-200803-21</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:079">MDVSA-2008:079</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489018/100/0/threaded">20080302 Squid Analysis Report Generator &lt;= 2.2.3.1 buffer overflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28077">28077</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019536">1019536</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0749">ADV-2008-0749</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40970">sarg-useragent-bo(40970)</ref>
    </refs>
    <vuln_soft>
      <prod name="squid_analysis_report_generator" vendor="sarg">
        <vers num="2.2.3.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1168" seq="2008-1168" published="2008-03-05" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Squid Analysis Report Generator (Sarg) 2.2.3.1 allows remote attackers to inject arbitrary web script or HTML via the User-Agent header, which is not properly handled when displaying the Squid proxy log.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://sourceforge.net/project/shownotes.php?release_id=581509">http://sourceforge.net/project/shownotes.php?release_id=581509</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200803-21.xml">GLSA-200803-21</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:079">MDVSA-2008:079</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28077">28077</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0750/references">ADV-2008-0750</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40972">sarg-useragent-xss(40972)</ref>
    </refs>
    <vuln_soft>
      <prod name="squid_analysis_report_generator" vendor="sarg">
        <vers num="2.2.3.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1169" seq="2008-1169" published="2008-03-05" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in the embedded HTTP server in SCI Photo Chat Server 3.4.9 and earlier allows remote attackers to read arbitrary files via a "..\" (dot dot backslash) or "../" (dot dot forward slash) in the GET command.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/scichatdt-adv.txt">http://aluigi.altervista.org/adv/scichatdt-adv.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27872">27872</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0614">ADV-2008-0614</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40655">photochat-get-directory-traversal(40655)</ref>
    </refs>
    <vuln_soft>
      <prod name="sci_photo_chat" vendor="simm-comm">
        <vers num="3.4.9" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1170" seq="2008-1170" published="2008-03-05" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple PHP remote file inclusion vulnerabilities in KCWiki 1.0 allow remote attackers to execute arbitrary PHP code via a URL in the page parameter to (1) minimal/wiki.php and (2) simplest/wiki.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3714">3714</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489024/100/0/threaded">20080302 kcwiki 1.0 multiple remote file inclusion vulnerabilities.</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28074">28074</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40976">kcwiki-wiki-file-include(40976)</ref>
    </refs>
    <vuln_soft>
      <prod name="kcwiki" vendor="kcwiki">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1171" seq="2008-1171" published="2008-03-05" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">** DISPUTED **  Multiple PHP remote file inclusion vulnerabilities in the 123 Flash Chat Module for phpBB allow remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter to (1) 123flashchat.php and (2) phpbb_login_chat.php.  NOTE: CVE disputes this issue because $phpbb_root_path is explicitly set to "./" in both programs.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3716">3716</ref>
      <ref source="VIM" url="http://www.attrition.org/pipermail/vim/2008-March/001913.html">20080305 false: 123 Flash Chat RFI</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488914/100/0/threaded">20080228 123 Flash Chat Module for phpBB</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488922/100/0/threaded">20080228 Re: 123 Flash Chat Module for phpBB</ref>
    </refs>
    <vuln_soft>
      <prod name="123_flash_chat_module" vendor="phpbb">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1172" seq="2008-1172" published="2008-03-05" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site request forgery (CSRF) vulnerabilities in account-inbox.php in TorrentTrader Classic 1.08 allow remote attackers to perform certain actions as other users, as demonstrated by sending messages.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3713">3713</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489039/100/0/threaded">20080303 Cross-site Scripting and CSRF in TorrentTrader Classic v1.08</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40981">torrenttraderclassic-accountinbox-csrf(40981)</ref>
    </refs>
    <vuln_soft>
      <prod name="torrenttrader" vendor="torrenttrader">
        <vers num="1.08"/>
      </prod>
      <prod name="torrenttrader_classic" vendor="torrenttrader">
        <vers num="1.08"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1173" seq="2008-1173" published="2008-03-05" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in account-inbox.php in TorrentTrader Classic 1.08 allows remote attackers to inject arbitrary web script or HTML via the msg parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3713">3713</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489039/100/0/threaded">20080303 Cross-site Scripting and CSRF in TorrentTrader Classic v1.08</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28082">28082</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40980">torrenttraderclassic-accountinbox-xss(40980)</ref>
    </refs>
    <vuln_soft>
      <prod name="torrenttrader" vendor="torrenttrader">
        <vers num="1.08"/>
      </prod>
      <prod name="torrenttrader_classic" vendor="torrenttrader">
        <vers num="1.08"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1174" seq="2008-1174" published="2008-03-05" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in editUser.asp in AuthentiX 6.3b1 Trial allows remote attackers to inject arbitrary web script or HTML via the username parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://marc.info/?l=full-disclosure&amp;m=120410229721185&amp;w=2">20080226 XSS Vulnerability in AuthentiX</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019520">1019520</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28040">28040</ref>
    </refs>
    <vuln_soft>
      <prod name="authentix" vendor="flicks_software">
        <vers num="6.3b1" edition=":trial"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1175" seq="2008-1175" published="2008-03-05" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in AuthentiX 6.3b1 Trial allows remote attackers to inject arbitrary web script or HTML via the username parameter to aspAdmin/deleteUser.asp, a different vector than CVE-2008-1174.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs/>
    <vuln_soft>
      <prod name="authentix" vendor="flicks_software">
        <vers num="6.3b1" edition=":trial"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1176" seq="2008-1176" published="2008-03-05" modified="2017-09-28" severity="Low" CVSS_version="2.0" CVSS_score="2.6" CVSS_base_score="2.6" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in function/sideblock.php in Affiliate Market (affmarket) 0.1 BETA allows remote attackers to inject arbitrary web script or HTML via the sideblock4 parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40514">affiliatemarket-sideblock-xss(40514)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5114">5114</ref>
    </refs>
    <vuln_soft>
      <prod name="affiliate_market" vendor="affiliate_market">
        <vers num="0.1_beta"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1177" seq="2008-1177" published="2008-03-05" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in shop/detail.php in Affiliate Market (affmarket) 0.1 BETA allows remote attackers to execute arbitrary SQL commands via the id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40515">affiliatemarket-detail-sql-injection(40515)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5114">5114</ref>
    </refs>
    <vuln_soft>
      <prod name="affiliate_market" vendor="affiliate_market">
        <vers num="0.1_beta"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1178" seq="2008-1178" published="2008-03-05" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in include/doc/index.php in Centreon 1.4.2.3 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the page parameter, a different vector than CVE-2008-1119.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3715">3715</ref>
      <ref source="CONFIRM" url="http://www.centreon.com/Product/Changelog-Centreon-1.4.x.html">http://www.centreon.com/Product/Changelog-Centreon-1.4.x.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488956/100/0/threaded">20080229 Centreon &lt;= 1.4.2.3 (index.php) Remote File Disclosure</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28052">28052</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40950">centreon-index-file-include(40950)</ref>
    </refs>
    <vuln_soft>
      <prod name="centreon" vendor="centreon">
        <vers num="1.4"/>
        <vers num="1.4.1"/>
        <vers num="1.4.2"/>
        <vers num="1.4.2.1"/>
        <vers num="1.4.2.2"/>
        <vers num="1.4.2.3" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1179" seq="2008-1179" published="2008-03-05" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in include/common/javascript/color_picker.php in Centreon 1.4.2.3 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) name and (2) title parameters.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.centreon.com/Product/Changelog-Centreon-1.4.x.html">http://www.centreon.com/Product/Changelog-Centreon-1.4.x.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28043">28043</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40924">centreon-colorpicker-xss(40924)</ref>
    </refs>
    <vuln_soft>
      <prod name="centreon" vendor="centreon">
        <vers num="1.4"/>
        <vers num="1.4.1"/>
        <vers num="1.4.2"/>
        <vers num="1.4.2.1"/>
        <vers num="1.4.2.2"/>
        <vers num="1.4.2.3" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1180" seq="2008-1180" published="2008-03-05" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in dana-na/auth/rdremediate.cgi in Juniper Networks Secure Access 2000 5.5 R1 build 11711 allows remote attackers to inject arbitrary web script or HTML via the delivery_mode parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3720">3720</ref>
      <ref source="MISC" url="http://www.procheckup.com/Vulnerability_PR07-41.php">http://www.procheckup.com/Vulnerability_PR07-41.php</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488918/100/0/threaded">20080228 PR07-41: XSS on Juniper Networks Secure Access 2000</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28034">28034</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0762">ADV-2008-0762</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40916">junipernetworks-rdremediate-xss(40916)</ref>
    </refs>
    <vuln_soft>
      <prod name="secure_access_2000" vendor="juniper">
        <vers num="5.5" edition="r1:build_11711"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1181" seq="2008-1181" published="2008-03-05" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Juniper Networks Secure Access 2000 5.5 R1 (build 11711) allows remote attackers to obtain sensitive information via a direct request for remediate.cgi without certain parameters, which reveals the path in an "Execute failed" error message.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3719">3719</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488919/100/0/threaded">20080228 PR07-42: Webroot disclosure on Juniper Networks Secure Access 2000</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28037">28037</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019526">1019526</ref>
    </refs>
    <vuln_soft>
      <prod name="secure_access_2000" vendor="juniper">
        <vers num="5.5" edition="r1:build_11711"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1182" seq="2008-1182" published="2008-03-05" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in BSD Perimeter pfSense before 1.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://blog.pfsense.org/?p=170">http://blog.pfsense.org/?p=170</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28072">28072</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40967">pfsense-unspecified-xss(40967)</ref>
    </refs>
    <vuln_soft>
      <prod name="pfsense" vendor="bsd_perimeter">
        <vers num="1.0.1"/>
        <vers num="1.2" edition="rc1"/>
        <vers num="1.2" edition="rc2"/>
        <vers num="1.2" edition="rc3"/>
        <vers num="1.2" edition="rc4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1183" seq="2008-1183" published="2008-03-05" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in Crafty Syntax Live Help (CSLH) before 2.14.6 allow remote attackers to inject arbitrary web script or HTML via unspecified parameters to (1) livehelp.php, (2) user_questions.php, and (3) leavemessage.php.  NOTE: the lostsheep.php vector is covered by CVE-2008-0848.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=580994">http://sourceforge.net/project/shownotes.php?release_id=580994</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28071" patch="1">28071</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40636">cslh-multiple-xss(40636)</ref>
    </refs>
    <vuln_soft>
      <prod name="crafty_syntax_live_help" vendor="crafty_syntax_live_help">
        <vers num="2.4.13"/>
        <vers num="2.4.14"/>
        <vers num="2.4.15"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1184" seq="2008-1184" published="2008-03-05" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The DNSSEC validation library (libval) library in dnssec-tools before 1.3.1 does not properly check that the signing key is the APEX trust anchor, which might allow attackers to conduct unspecified attacks.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/mailarchive/forum.php?thread_name=sdlk5lolzj.fsf%40wes.hardakers.net&amp;forum_name=dnssec-tools-users">http://sourceforge.net/mailarchive/forum.php?thread_name=sdlk5lolzj.fsf%40wes.hardakers.net&amp;forum_name=dnssec-tools-users</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27998">27998</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0673/references">ADV-2008-0673</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40836">dnssectools-libval-security-bypass(40836)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00820.html">FEDORA-2008-1758</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00845.html">FEDORA-2008-1771</ref>
    </refs>
    <vuln_soft>
      <prod name="dnssec-tools" vendor="dnssec-tools">
        <vers num="1.3.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1185" seq="2008-1185" published="2008-03-06" modified="2019-07-31" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Virtual Machine for Sun Java Runtime Environment (JRE) and JDK 6 Update 4 and earlier, 5.0 Update 14 and earlier, and SDK/JRE 1.4.2_16 and earlier allows remote attackers to gain privileges via an untrusted application or applet, a different issue than CVE-2008-1186, aka "the first issue."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Sep/msg00008.html" adv="1">APPLE-SA-2008-09-24</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00000.html" adv="1">SUSE-SA:2008:018</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200804-28.xml" adv="1">GLSA-200804-28</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019555" adv="1">1019555</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-233321-1" adv="1" patch="1">233321</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3178" adv="1">http://support.apple.com/kb/HT3178</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3179" adv="1">http://support.apple.com/kb/HT3179</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200804-20.xml" adv="1">GLSA-200804-20</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200806-11.xml" adv="1">GLSA-200806-11</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0186.html" adv="1">RHSA-2008:0186</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-066A.html" adv="1">TA08-066A</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2008-0010.html" adv="1">http://www.vmware.com/security/advisories/VMSA-2008-0010.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0770/references" adv="1">ADV-2008-0770</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1856/references" adv="1">ADV-2008-1856</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41025" adv="1">java-virtualmachine-multiple-priv-escalation(41025)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41138" adv="1">sun-jre-unspecified-priv-escalation(41138)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9672" adv="1">oval:org.mitre.oval:def:9672</ref>
    </refs>
    <vuln_soft>
      <prod name="jdk" vendor="sun">
        <vers num="1.5.0" edition="update1"/>
        <vers num="1.5.0" edition="update10"/>
        <vers num="1.5.0" edition="update11"/>
        <vers num="1.5.0" edition="update12"/>
        <vers num="1.5.0" edition="update13"/>
        <vers num="1.5.0" edition="update14"/>
        <vers num="1.5.0" edition="update2"/>
        <vers num="1.5.0" edition="update3"/>
        <vers num="1.5.0" edition="update4"/>
        <vers num="1.5.0" edition="update5"/>
        <vers num="1.5.0" edition="update6"/>
        <vers num="1.5.0" edition="update7"/>
        <vers num="1.5.0" edition="update8"/>
        <vers num="1.5.0" edition="update9"/>
        <vers num="1.6.0" edition="update_3"/>
        <vers num="1.6.0" edition="update_4"/>
      </prod>
      <prod name="jre" vendor="sun">
        <vers num="1.4.2"/>
        <vers num="1.4.2_1"/>
        <vers num="1.4.2_2"/>
        <vers num="1.4.2_3"/>
        <vers num="1.4.2_4"/>
        <vers num="1.4.2_5"/>
        <vers num="1.4.2_6"/>
        <vers num="1.4.2_7"/>
        <vers num="1.4.2_8"/>
        <vers num="1.4.2_9"/>
        <vers num="1.4.2_10"/>
        <vers num="1.4.2_11"/>
        <vers num="1.4.2_12"/>
        <vers num="1.4.2_13"/>
        <vers num="1.4.2_14"/>
        <vers num="1.4.2_15"/>
        <vers num="1.4.2_16"/>
        <vers num="1.5.0" edition="update1"/>
        <vers num="1.5.0" edition="update10"/>
        <vers num="1.5.0" edition="update11"/>
        <vers num="1.5.0" edition="update12"/>
        <vers num="1.5.0" edition="update13"/>
        <vers num="1.5.0" edition="update14"/>
        <vers num="1.5.0" edition="update2"/>
        <vers num="1.5.0" edition="update3"/>
        <vers num="1.5.0" edition="update4"/>
        <vers num="1.5.0" edition="update5"/>
        <vers num="1.5.0" edition="update6"/>
        <vers num="1.5.0" edition="update7"/>
        <vers num="1.5.0" edition="update8"/>
        <vers num="1.5.0" edition="update9"/>
        <vers num="1.6.0" edition="update_1"/>
        <vers num="1.6.0" edition="update_2"/>
        <vers num="1.6.0" edition="update_3"/>
        <vers num="1.6.0" edition="update_4"/>
      </prod>
      <prod name="sdk" vendor="sun">
        <vers num="1.4.2"/>
        <vers num="1.4.2_1"/>
        <vers num="1.4.2_2"/>
        <vers num="1.4.2_3"/>
        <vers num="1.4.2_4"/>
        <vers num="1.4.2_5"/>
        <vers num="1.4.2_6"/>
        <vers num="1.4.2_7"/>
        <vers num="1.4.2_8"/>
        <vers num="1.4.2_9"/>
        <vers num="1.4.2_10"/>
        <vers num="1.4.2_11"/>
        <vers num="1.4.2_12"/>
        <vers num="1.4.2_13"/>
        <vers num="1.4.2_14"/>
        <vers num="1.4.2_15"/>
        <vers num="1.4.2_16"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1186" seq="2008-1186" published="2008-03-06" modified="2019-07-31" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Virtual Machine for Sun Java Runtime Environment (JRE) and JDK 5.0 Update 13 and earlier, and SDK/JRE 1.4.2_16 and earlier, allows remote attackers to gain privileges via an untrusted application or applet, a different issue than CVE-2008-1185, aka "the second issue."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Sep/msg00008.html" adv="1">APPLE-SA-2008-09-24</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00000.html" adv="1">SUSE-SA:2008:018</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200804-28.xml" adv="1">GLSA-200804-28</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019555" adv="1">1019555</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-233321-1" adv="1" patch="1">233321</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3178" adv="1">http://support.apple.com/kb/HT3178</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3179" adv="1">http://support.apple.com/kb/HT3179</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200804-20.xml" adv="1">GLSA-200804-20</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200806-11.xml" adv="1">GLSA-200806-11</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0186.html" adv="1">RHSA-2008:0186</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-066A.html" adv="1">TA08-066A</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2008-0010.html" adv="1">http://www.vmware.com/security/advisories/VMSA-2008-0010.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0770/references" adv="1">ADV-2008-0770</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1856/references" adv="1">ADV-2008-1856</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41025" adv="1">java-virtualmachine-multiple-priv-escalation(41025)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41138" adv="1">sun-jre-unspecified-priv-escalation(41138)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9585" adv="1">oval:org.mitre.oval:def:9585</ref>
    </refs>
    <vuln_soft>
      <prod name="jdk" vendor="sun">
        <vers num="1.5.0" edition="update1"/>
        <vers num="1.5.0" edition="update10"/>
        <vers num="1.5.0" edition="update11"/>
        <vers num="1.5.0" edition="update12"/>
        <vers num="1.5.0" edition="update13"/>
        <vers num="1.5.0" edition="update2"/>
        <vers num="1.5.0" edition="update3"/>
        <vers num="1.5.0" edition="update4"/>
        <vers num="1.5.0" edition="update5"/>
        <vers num="1.5.0" edition="update6"/>
        <vers num="1.5.0" edition="update7"/>
        <vers num="1.5.0" edition="update8"/>
        <vers num="1.5.0" edition="update9"/>
      </prod>
      <prod name="jre" vendor="sun">
        <vers num="1.4.2"/>
        <vers num="1.4.2_1"/>
        <vers num="1.4.2_2"/>
        <vers num="1.4.2_3"/>
        <vers num="1.4.2_4"/>
        <vers num="1.4.2_5"/>
        <vers num="1.4.2_6"/>
        <vers num="1.4.2_7"/>
        <vers num="1.4.2_8"/>
        <vers num="1.4.2_9"/>
        <vers num="1.4.2_10"/>
        <vers num="1.4.2_11"/>
        <vers num="1.4.2_12"/>
        <vers num="1.4.2_13"/>
        <vers num="1.4.2_14"/>
        <vers num="1.4.2_15"/>
        <vers num="1.4.2_16"/>
        <vers num="1.5.0" edition="update1"/>
        <vers num="1.5.0" edition="update10"/>
        <vers num="1.5.0" edition="update11"/>
        <vers num="1.5.0" edition="update12"/>
        <vers num="1.5.0" edition="update13"/>
        <vers num="1.5.0" edition="update2"/>
        <vers num="1.5.0" edition="update3"/>
        <vers num="1.5.0" edition="update4"/>
        <vers num="1.5.0" edition="update5"/>
        <vers num="1.5.0" edition="update6"/>
        <vers num="1.5.0" edition="update7"/>
        <vers num="1.5.0" edition="update8"/>
        <vers num="1.5.0" edition="update9"/>
      </prod>
      <prod name="sdk" vendor="sun">
        <vers num="1.4.2"/>
        <vers num="1.4.2_1"/>
        <vers num="1.4.2_2"/>
        <vers num="1.4.2_3"/>
        <vers num="1.4.2_4"/>
        <vers num="1.4.2_5"/>
        <vers num="1.4.2_6"/>
        <vers num="1.4.2_7"/>
        <vers num="1.4.2_8"/>
        <vers num="1.4.2_9"/>
        <vers num="1.4.2_10"/>
        <vers num="1.4.2_11"/>
        <vers num="1.4.2_12"/>
        <vers num="1.4.2_13"/>
        <vers num="1.4.2_14"/>
        <vers num="1.4.2_15"/>
        <vers num="1.4.2_16"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1187" seq="2008-1187" published="2008-03-06" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Sun Java Runtime Environment (JRE) and JDK 6 Update 4 and earlier, 5.0 Update 14 and earlier, and SDK/JRE 1.4.2_16 and earlier allows remote attackers to cause a denial of service (JRE crash) and possibly execute arbitrary code via unknown vectors related to XSLT transforms.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BEA" url="http://dev2dev.bea.com/pub/advisory/277">BEA08-201.00</ref>
      <ref source="CONFIRM" url="http://download.novell.com/Download?buildid=q5exhSqeBjA~" patch="1">http://download.novell.com/Download?buildid=q5exhSqeBjA~</ref>
      <ref source="JVN" url="http://jvn.jp/en/jp/JVN04032535/index.html">JVN#04032535</ref>
      <ref source="JVNDB" url="http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000016.html">JVNDB-2008-000016</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Sep/msg00008.html">APPLE-SA-2008-09-24</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00000.html">SUSE-SA:2008:018</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.html">SUSE-SA:2008:025</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200804-28.xml">GLSA-200804-28</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-233322-1" adv="1" patch="1">233322</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3178">http://support.apple.com/kb/HT3178</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3179">http://support.apple.com/kb/HT3179</ref>
      <ref source="CONFIRM" url="http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5033642.html">http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5033642.html</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200804-20.xml">GLSA-200804-20</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200806-11.xml">GLSA-200806-11</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0186.html">RHSA-2008:0186</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0210.html">RHSA-2008:0210</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0243.html">RHSA-2008:0243</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0244.html">RHSA-2008:0244</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0245.html">RHSA-2008:0245</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0267.html">RHSA-2008:0267</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0555.html">RHSA-2008:0555</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019548">1019548</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-066A.html">TA08-066A</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2008-0010.html" patch="1">http://www.vmware.com/security/advisories/VMSA-2008-0010.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0770/references" adv="1">ADV-2008-0770</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1252" adv="1">ADV-2008-1252</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1856/references" adv="1">ADV-2008-1856</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41025">java-virtualmachine-multiple-priv-escalation(41025)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10278">oval:org.mitre.oval:def:10278</ref>
    </refs>
    <vuln_soft>
      <prod name="jdk" vendor="sun">
        <vers num="5.0" prev="1" edition="update_1"/>
        <vers num="5.0" prev="1" edition="update_10"/>
        <vers num="5.0" prev="1" edition="update_11"/>
        <vers num="5.0" prev="1" edition="update_12"/>
        <vers num="5.0" prev="1" edition="update_13"/>
        <vers num="5.0" prev="1" edition="update_14"/>
        <vers num="5.0" prev="1" edition="update_2"/>
        <vers num="5.0" prev="1" edition="update_3"/>
        <vers num="5.0" prev="1" edition="update_4"/>
        <vers num="5.0" prev="1" edition="update_5"/>
        <vers num="5.0" prev="1" edition="update_6"/>
        <vers num="5.0" prev="1" edition="update_7"/>
        <vers num="5.0" prev="1" edition="update_8"/>
        <vers num="5.0" prev="1" edition="update_9"/>
        <vers num="6" prev="1" edition="update_1"/>
        <vers num="6" prev="1" edition="update_2"/>
        <vers num="6" prev="1" edition="update_3"/>
        <vers num="6" prev="1" edition="update_4"/>
      </prod>
      <prod name="jre" vendor="sun">
        <vers num="1.4.2_01"/>
        <vers num="1.4.2_02"/>
        <vers num="1.4.2_03"/>
        <vers num="1.4.2_04"/>
        <vers num="1.4.2_05"/>
        <vers num="1.4.2_06"/>
        <vers num="1.4.2_07"/>
        <vers num="1.4.2_10"/>
        <vers num="1.4.2_11"/>
        <vers num="1.4.2_12"/>
        <vers num="1.4.2_13"/>
        <vers num="1.4.2_14" prev="1"/>
        <vers num="5.0" prev="1" edition="update_1"/>
        <vers num="5.0" prev="1" edition="update_10"/>
        <vers num="5.0" prev="1" edition="update_11"/>
        <vers num="5.0" prev="1" edition="update_12"/>
        <vers num="5.0" prev="1" edition="update_13"/>
        <vers num="5.0" prev="1" edition="update_14"/>
        <vers num="5.0" prev="1" edition="update_2"/>
        <vers num="5.0" prev="1" edition="update_3"/>
        <vers num="5.0" prev="1" edition="update_4"/>
        <vers num="5.0" prev="1" edition="update_5"/>
        <vers num="5.0" prev="1" edition="update_6"/>
        <vers num="5.0" prev="1" edition="update_7"/>
        <vers num="5.0" prev="1" edition="update_8"/>
        <vers num="5.0" prev="1" edition="update_9"/>
        <vers num="6" prev="1" edition="update_1"/>
        <vers num="6" prev="1" edition="update_2"/>
        <vers num="6" prev="1" edition="update_3"/>
        <vers num="6" prev="1" edition="update_4"/>
      </prod>
      <prod name="sdk" vendor="sun">
        <vers num="1.4.2"/>
        <vers num="1.4.2_01"/>
        <vers num="1.4.2_02"/>
        <vers num="1.4.2_03"/>
        <vers num="1.4.2_04"/>
        <vers num="1.4.2_05"/>
        <vers num="1.4.2_06"/>
        <vers num="1.4.2_07"/>
        <vers num="1.4.2_08"/>
        <vers num="1.4.2_09"/>
        <vers num="1.4.2_10"/>
        <vers num="1.4.2_11"/>
        <vers num="1.4.2_12"/>
        <vers num="1.4.2_13"/>
        <vers num="1.4.2_14"/>
        <vers num="1.4.2_15"/>
        <vers num="1.4.2_16" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1188" seq="2008-1188" published="2008-03-06" modified="2019-07-31" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple buffer overflows in the useEncodingDecl function in Java Web Start in Sun JDK and JRE 6 Update 4 and earlier, and 5.0 Update 14 and earlier, allow remote attackers to execute arbitrary code via a JNLP file with (1) a long key name in the xml header or (2) a long charset value, different issues than CVE-2008-1189, aka "The first two issues."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Sep/msg00008.html" adv="1">APPLE-SA-2008-09-24</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00000.html" adv="1">SUSE-SA:2008:018</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.html" adv="1">SUSE-SA:2008:025</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200804-28.xml" adv="1">GLSA-200804-28</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-233323-1" adv="1" patch="1">233323</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3178" adv="1">http://support.apple.com/kb/HT3178</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3179" adv="1">http://support.apple.com/kb/HT3179</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200804-20.xml" adv="1">GLSA-200804-20</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200806-11.xml" adv="1">GLSA-200806-11</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0186.html" adv="1">RHSA-2008:0186</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0210.html" adv="1">RHSA-2008:0210</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0267.html" adv="1">RHSA-2008:0267</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019549" adv="1">1019549</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-066A.html" adv="1">TA08-066A</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2008-0010.html" adv="1">http://www.vmware.com/security/advisories/VMSA-2008-0010.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0770/references" adv="1">ADV-2008-0770</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1856/references" adv="1">ADV-2008-1856</ref>
      <ref source="MISC" url="http://www.zerodayinitiative.com/advisories/ZDI-08-009/" adv="1">http://www.zerodayinitiative.com/advisories/ZDI-08-009/</ref>
      <ref source="MISC" url="http://www.zerodayinitiative.com/advisories/ZDI-08-010/" adv="1">http://www.zerodayinitiative.com/advisories/ZDI-08-010/</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41029" adv="1">javawebstart-application-priv-escalation(41029)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41133" adv="1">javawebstart-multiple-unspecified-bo(41133)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11209" adv="1">oval:org.mitre.oval:def:11209</ref>
    </refs>
    <vuln_soft>
      <prod name="jdk" vendor="sun">
        <vers num="1.5.0" edition="-"/>
        <vers num="1.5.0" edition="update1"/>
        <vers num="1.5.0" edition="update10"/>
        <vers num="1.5.0" edition="update11"/>
        <vers num="1.5.0" edition="update12"/>
        <vers num="1.5.0" edition="update13"/>
        <vers num="1.5.0" edition="update14"/>
        <vers num="1.5.0" edition="update2"/>
        <vers num="1.5.0" edition="update3"/>
        <vers num="1.5.0" edition="update4"/>
        <vers num="1.5.0" edition="update5"/>
        <vers num="1.5.0" edition="update6"/>
        <vers num="1.5.0" edition="update7"/>
        <vers num="1.5.0" edition="update8"/>
        <vers num="1.5.0" edition="update9"/>
        <vers num="1.6.0" edition="-"/>
        <vers num="1.6.0" edition="update_3"/>
        <vers num="1.6.0" edition="update_4"/>
      </prod>
      <prod name="jre" vendor="sun">
        <vers num="1.5.0" edition="-"/>
        <vers num="1.5.0" edition="update1"/>
        <vers num="1.5.0" edition="update10"/>
        <vers num="1.5.0" edition="update11"/>
        <vers num="1.5.0" edition="update12"/>
        <vers num="1.5.0" edition="update13"/>
        <vers num="1.5.0" edition="update14"/>
        <vers num="1.5.0" edition="update2"/>
        <vers num="1.5.0" edition="update3"/>
        <vers num="1.5.0" edition="update4"/>
        <vers num="1.5.0" edition="update5"/>
        <vers num="1.5.0" edition="update6"/>
        <vers num="1.5.0" edition="update7"/>
        <vers num="1.5.0" edition="update8"/>
        <vers num="1.5.0" edition="update9"/>
        <vers num="1.6.0" edition="-"/>
        <vers num="1.6.0" edition="update_1"/>
        <vers num="1.6.0" edition="update_2"/>
        <vers num="1.6.0" edition="update_3"/>
        <vers num="1.6.0" edition="update_4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1189" seq="2008-1189" published="2008-03-06" modified="2019-07-31" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in Java Web Start in Sun JDK and JRE 6 Update 4 and earlier, 5.0 Update 14 and earlier, and SDK/JRE 1.4.2_16 and earlier allows remote attackers to execute arbitrary code via unknown vectors, a different issue than CVE-2008-1188, aka the "third" issue.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Sep/msg00008.html" adv="1">APPLE-SA-2008-09-24</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00000.html" adv="1">SUSE-SA:2008:018</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.html" adv="1">SUSE-SA:2008:025</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200804-28.xml" adv="1">GLSA-200804-28</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-233323-1" adv="1" patch="1">233323</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3178" adv="1">http://support.apple.com/kb/HT3178</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3179" adv="1">http://support.apple.com/kb/HT3179</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200804-20.xml" adv="1">GLSA-200804-20</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200806-11.xml" adv="1">GLSA-200806-11</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0186.html" adv="1">RHSA-2008:0186</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0210.html" adv="1">RHSA-2008:0210</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0267.html" adv="1">RHSA-2008:0267</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019549" adv="1">1019549</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-066A.html" adv="1">TA08-066A</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2008-0010.html" adv="1">http://www.vmware.com/security/advisories/VMSA-2008-0010.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0770/references" adv="1">ADV-2008-0770</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1856/references" adv="1">ADV-2008-1856</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41029" adv="1">javawebstart-application-priv-escalation(41029)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41133" adv="1">javawebstart-multiple-unspecified-bo(41133)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41135" adv="1">javawebstart-unspecified-bo(41135)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9582" adv="1">oval:org.mitre.oval:def:9582</ref>
    </refs>
    <vuln_soft>
      <prod name="jdk" vendor="sun">
        <vers num="1.5.0" edition="-"/>
        <vers num="1.5.0" edition="update1"/>
        <vers num="1.5.0" edition="update10"/>
        <vers num="1.5.0" edition="update11"/>
        <vers num="1.5.0" edition="update12"/>
        <vers num="1.5.0" edition="update13"/>
        <vers num="1.5.0" edition="update14"/>
        <vers num="1.5.0" edition="update2"/>
        <vers num="1.5.0" edition="update3"/>
        <vers num="1.5.0" edition="update4"/>
        <vers num="1.5.0" edition="update5"/>
        <vers num="1.5.0" edition="update6"/>
        <vers num="1.5.0" edition="update7"/>
        <vers num="1.5.0" edition="update8"/>
        <vers num="1.5.0" edition="update9"/>
        <vers num="1.6.0" edition="-"/>
        <vers num="1.6.0" edition="update_3"/>
        <vers num="1.6.0" edition="update_4"/>
      </prod>
      <prod name="jre" vendor="sun">
        <vers num="1.4.2"/>
        <vers num="1.4.2_1"/>
        <vers num="1.4.2_2"/>
        <vers num="1.4.2_3"/>
        <vers num="1.4.2_4"/>
        <vers num="1.4.2_5"/>
        <vers num="1.4.2_6"/>
        <vers num="1.4.2_7"/>
        <vers num="1.4.2_8"/>
        <vers num="1.4.2_9"/>
        <vers num="1.4.2_10"/>
        <vers num="1.4.2_11"/>
        <vers num="1.4.2_12"/>
        <vers num="1.4.2_13"/>
        <vers num="1.4.2_14"/>
        <vers num="1.4.2_15"/>
        <vers num="1.4.2_16"/>
        <vers num="1.5.0" edition="-"/>
        <vers num="1.5.0" edition="update1"/>
        <vers num="1.5.0" edition="update10"/>
        <vers num="1.5.0" edition="update11"/>
        <vers num="1.5.0" edition="update12"/>
        <vers num="1.5.0" edition="update13"/>
        <vers num="1.5.0" edition="update14"/>
        <vers num="1.5.0" edition="update2"/>
        <vers num="1.5.0" edition="update3"/>
        <vers num="1.5.0" edition="update4"/>
        <vers num="1.5.0" edition="update5"/>
        <vers num="1.5.0" edition="update6"/>
        <vers num="1.5.0" edition="update7"/>
        <vers num="1.5.0" edition="update8"/>
        <vers num="1.5.0" edition="update9"/>
        <vers num="1.6.0" edition="update_1"/>
        <vers num="1.6.0" edition="update_2"/>
        <vers num="1.6.0" edition="update_3"/>
        <vers num="1.6.0" edition="update_4"/>
      </prod>
      <prod name="sdk" vendor="sun">
        <vers num="1.4.2"/>
        <vers num="1.4.2_1"/>
        <vers num="1.4.2_2"/>
        <vers num="1.4.2_3"/>
        <vers num="1.4.2_4"/>
        <vers num="1.4.2_5"/>
        <vers num="1.4.2_6"/>
        <vers num="1.4.2_7"/>
        <vers num="1.4.2_8"/>
        <vers num="1.4.2_9"/>
        <vers num="1.4.2_10"/>
        <vers num="1.4.2_11"/>
        <vers num="1.4.2_12"/>
        <vers num="1.4.2_13"/>
        <vers num="1.4.2_14"/>
        <vers num="1.4.2_15"/>
        <vers num="1.4.2_16"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1190" seq="2008-1190" published="2008-03-06" modified="2019-07-31" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Java Web Start in Sun JDK and JRE 6 Update 4 and earlier, 5.0 Update 14 and earlier, and SDK/JRE 1.4.2_16 and earlier allows remote attackers to gain privileges via an untrusted application, a different issue than CVE-2008-1191, aka the "fourth" issue.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Sep/msg00008.html" adv="1">APPLE-SA-2008-09-24</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00000.html" adv="1">SUSE-SA:2008:018</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.html" adv="1">SUSE-SA:2008:025</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200804-28.xml" adv="1">GLSA-200804-28</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-233323-1" adv="1">233323</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3178" adv="1">http://support.apple.com/kb/HT3178</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3179" adv="1">http://support.apple.com/kb/HT3179</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200804-20.xml" adv="1">GLSA-200804-20</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200806-11.xml" adv="1">GLSA-200806-11</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0186.html" adv="1">RHSA-2008:0186</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0210.html" adv="1">RHSA-2008:0210</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0267.html" adv="1">RHSA-2008:0267</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019549" adv="1">1019549</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-066A.html" adv="1">TA08-066A</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2008-0010.html" adv="1">http://www.vmware.com/security/advisories/VMSA-2008-0010.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0770/references" adv="1">ADV-2008-0770</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1856/references" adv="1">ADV-2008-1856</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41029" adv="1">javawebstart-application-priv-escalation(41029)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9914" adv="1">oval:org.mitre.oval:def:9914</ref>
    </refs>
    <vuln_soft>
      <prod name="jdk" vendor="sun">
        <vers num="1.5.0" edition="-"/>
        <vers num="1.5.0" edition="update1"/>
        <vers num="1.5.0" edition="update10"/>
        <vers num="1.5.0" edition="update11"/>
        <vers num="1.5.0" edition="update12"/>
        <vers num="1.5.0" edition="update13"/>
        <vers num="1.5.0" edition="update14"/>
        <vers num="1.5.0" edition="update2"/>
        <vers num="1.5.0" edition="update3"/>
        <vers num="1.5.0" edition="update4"/>
        <vers num="1.5.0" edition="update5"/>
        <vers num="1.5.0" edition="update6"/>
        <vers num="1.5.0" edition="update7"/>
        <vers num="1.5.0" edition="update8"/>
        <vers num="1.5.0" edition="update9"/>
        <vers num="1.6.0" edition="-"/>
        <vers num="1.6.0" edition="update_3"/>
        <vers num="1.6.0" edition="update_4"/>
      </prod>
      <prod name="jre" vendor="sun">
        <vers num="1.4.2"/>
        <vers num="1.4.2_1"/>
        <vers num="1.4.2_2"/>
        <vers num="1.4.2_3"/>
        <vers num="1.4.2_4"/>
        <vers num="1.4.2_5"/>
        <vers num="1.4.2_6"/>
        <vers num="1.4.2_7"/>
        <vers num="1.4.2_8"/>
        <vers num="1.4.2_9"/>
        <vers num="1.4.2_10"/>
        <vers num="1.4.2_11"/>
        <vers num="1.4.2_12"/>
        <vers num="1.4.2_13"/>
        <vers num="1.4.2_14"/>
        <vers num="1.4.2_15"/>
        <vers num="1.4.2_16"/>
        <vers num="1.5.0" edition="-"/>
        <vers num="1.5.0" edition="update1"/>
        <vers num="1.5.0" edition="update10"/>
        <vers num="1.5.0" edition="update11"/>
        <vers num="1.5.0" edition="update12"/>
        <vers num="1.5.0" edition="update13"/>
        <vers num="1.5.0" edition="update14"/>
        <vers num="1.5.0" edition="update2"/>
        <vers num="1.5.0" edition="update3"/>
        <vers num="1.5.0" edition="update4"/>
        <vers num="1.5.0" edition="update5"/>
        <vers num="1.5.0" edition="update6"/>
        <vers num="1.5.0" edition="update7"/>
        <vers num="1.5.0" edition="update8"/>
        <vers num="1.5.0" edition="update9"/>
        <vers num="1.6.0" edition="-"/>
        <vers num="1.6.0" edition="update_1"/>
        <vers num="1.6.0" edition="update_2"/>
        <vers num="1.6.0" edition="update_3"/>
        <vers num="1.6.0" edition="update_4"/>
      </prod>
      <prod name="sdk" vendor="sun">
        <vers num="1.4.2"/>
        <vers num="1.4.2_1"/>
        <vers num="1.4.2_2"/>
        <vers num="1.4.2_3"/>
        <vers num="1.4.2_4"/>
        <vers num="1.4.2_5"/>
        <vers num="1.4.2_6"/>
        <vers num="1.4.2_7"/>
        <vers num="1.4.2_8"/>
        <vers num="1.4.2_9"/>
        <vers num="1.4.2_10"/>
        <vers num="1.4.2_11"/>
        <vers num="1.4.2_12"/>
        <vers num="1.4.2_13"/>
        <vers num="1.4.2_14"/>
        <vers num="1.4.2_15"/>
        <vers num="1.4.2_16"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1191" seq="2008-1191" published="2008-03-06" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Java Web Start in Sun JDK and JRE 6 Update 4 and earlier allows remote attackers to create arbitrary files via an untrusted application, a different issue than CVE-2008-1190, aka "The fifth issue."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Sep/msg00008.html">APPLE-SA-2008-09-24</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00000.html">SUSE-SA:2008:018</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200804-28.xml">GLSA-200804-28</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-233323-1" adv="1" patch="1">233323</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3178">http://support.apple.com/kb/HT3178</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3179">http://support.apple.com/kb/HT3179</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200804-20.xml">GLSA-200804-20</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200806-11.xml">GLSA-200806-11</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0186.html">RHSA-2008:0186</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0267.html">RHSA-2008:0267</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019549">1019549</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-066A.html">TA08-066A</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2008-0010.html">http://www.vmware.com/security/advisories/VMSA-2008-0010.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0770/references" adv="1">ADV-2008-0770</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1856/references" adv="1">ADV-2008-1856</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41029">javawebstart-application-priv-escalation(41029)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41136">javawebstart-unspecified-priv-escalation(41136)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10167">oval:org.mitre.oval:def:10167</ref>
    </refs>
    <vuln_soft>
      <prod name="jdk" vendor="sun">
        <vers num="6_update_4" prev="1"/>
      </prod>
      <prod name="jre" vendor="sun">
        <vers num="6_update_4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1192" seq="2008-1192" published="2008-03-06" modified="2019-07-31" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Java Plug-in for Sun JDK and JRE 6 Update 4 and earlier, and 5.0 Update 14 and earlier; and SDK and JRE 1.4.2_16 and earlier, and 1.3.1_21 and earlier; allows remote attackers to bypass the same origin policy and "execute local applications" via unknown vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BEA" url="http://dev2dev.bea.com/pub/advisory/277" adv="1">BEA08-201.00</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Sep/msg00008.html" adv="1">APPLE-SA-2008-09-24</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00000.html" adv="1">SUSE-SA:2008:018</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.html" adv="1">SUSE-SA:2008:025</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200804-28.xml" adv="1">GLSA-200804-28</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-233324-1" adv="1" patch="1">233324</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3178" adv="1">http://support.apple.com/kb/HT3178</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3179" adv="1">http://support.apple.com/kb/HT3179</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200804-20.xml" adv="1">GLSA-200804-20</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200806-11.xml" adv="1">GLSA-200806-11</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0186.html" adv="1">RHSA-2008:0186</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0210.html" adv="1">RHSA-2008:0210</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0267.html" adv="1">RHSA-2008:0267</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019550" adv="1">1019550</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-066A.html" adv="1">TA08-066A</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2008-0010.html" adv="1">http://www.vmware.com/security/advisories/VMSA-2008-0010.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0770/references" adv="1">ADV-2008-0770</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1252" adv="1">ADV-2008-1252</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1856/references" adv="1">ADV-2008-1856</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41031" adv="1">java-plugin-unspecified-security-bypass(41031)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11813" adv="1">oval:org.mitre.oval:def:11813</ref>
    </refs>
    <vuln_soft>
      <prod name="jdk" vendor="sun">
        <vers num="1.5.0" edition="-"/>
        <vers num="1.5.0" edition="update1"/>
        <vers num="1.5.0" edition="update10"/>
        <vers num="1.5.0" edition="update11"/>
        <vers num="1.5.0" edition="update12"/>
        <vers num="1.5.0" edition="update13"/>
        <vers num="1.5.0" edition="update14"/>
        <vers num="1.5.0" edition="update2"/>
        <vers num="1.5.0" edition="update3"/>
        <vers num="1.5.0" edition="update4"/>
        <vers num="1.5.0" edition="update5"/>
        <vers num="1.5.0" edition="update6"/>
        <vers num="1.5.0" edition="update7"/>
        <vers num="1.5.0" edition="update8"/>
        <vers num="1.5.0" edition="update9"/>
        <vers num="1.6.0" edition="-"/>
        <vers num="1.6.0" edition="update_3"/>
        <vers num="1.6.0" edition="update_4"/>
      </prod>
      <prod name="jre" vendor="sun">
        <vers num="1.3.1"/>
        <vers num="1.3.1_2"/>
        <vers num="1.3.1_03"/>
        <vers num="1.3.1_04"/>
        <vers num="1.3.1_05"/>
        <vers num="1.3.1_06"/>
        <vers num="1.3.1_07"/>
        <vers num="1.3.1_08"/>
        <vers num="1.3.1_09"/>
        <vers num="1.3.1_10"/>
        <vers num="1.3.1_11"/>
        <vers num="1.3.1_12"/>
        <vers num="1.3.1_13"/>
        <vers num="1.3.1_14"/>
        <vers num="1.3.1_15"/>
        <vers num="1.3.1_16"/>
        <vers num="1.3.1_17"/>
        <vers num="1.3.1_18"/>
        <vers num="1.3.1_19"/>
        <vers num="1.3.1_20"/>
        <vers num="1.3.1_21"/>
        <vers num="1.4.2"/>
        <vers num="1.4.2_1"/>
        <vers num="1.4.2_2"/>
        <vers num="1.4.2_3"/>
        <vers num="1.4.2_4"/>
        <vers num="1.4.2_5"/>
        <vers num="1.4.2_6"/>
        <vers num="1.4.2_7"/>
        <vers num="1.4.2_8"/>
        <vers num="1.4.2_9"/>
        <vers num="1.4.2_10"/>
        <vers num="1.4.2_11"/>
        <vers num="1.4.2_12"/>
        <vers num="1.4.2_13"/>
        <vers num="1.4.2_14"/>
        <vers num="1.4.2_15"/>
        <vers num="1.4.2_16"/>
        <vers num="1.5.0" edition="-"/>
        <vers num="1.5.0" edition="update1"/>
        <vers num="1.5.0" edition="update10"/>
        <vers num="1.5.0" edition="update11"/>
        <vers num="1.5.0" edition="update12"/>
        <vers num="1.5.0" edition="update13"/>
        <vers num="1.5.0" edition="update14"/>
        <vers num="1.5.0" edition="update2"/>
        <vers num="1.5.0" edition="update3"/>
        <vers num="1.5.0" edition="update4"/>
        <vers num="1.5.0" edition="update5"/>
        <vers num="1.5.0" edition="update6"/>
        <vers num="1.5.0" edition="update7"/>
        <vers num="1.5.0" edition="update8"/>
        <vers num="1.5.0" edition="update9"/>
        <vers num="1.6.0" edition="-"/>
        <vers num="1.6.0" edition="update_1"/>
        <vers num="1.6.0" edition="update_2"/>
        <vers num="1.6.0" edition="update_3"/>
        <vers num="1.6.0" edition="update_4"/>
      </prod>
      <prod name="sdk" vendor="sun">
        <vers num="1.3.1"/>
        <vers num="1.3.1_01"/>
        <vers num="1.3.1_01a"/>
        <vers num="1.3.1_02"/>
        <vers num="1.3.1_03"/>
        <vers num="1.3.1_04"/>
        <vers num="1.3.1_05"/>
        <vers num="1.3.1_06"/>
        <vers num="1.3.1_07"/>
        <vers num="1.3.1_08"/>
        <vers num="1.3.1_09"/>
        <vers num="1.3.1_10"/>
        <vers num="1.3.1_11"/>
        <vers num="1.3.1_12"/>
        <vers num="1.3.1_13"/>
        <vers num="1.3.1_14"/>
        <vers num="1.3.1_15"/>
        <vers num="1.3.1_16"/>
        <vers num="1.3.1_17"/>
        <vers num="1.3.1_18"/>
        <vers num="1.3.1_19"/>
        <vers num="1.3.1_20"/>
        <vers num="1.3.1_21"/>
        <vers num="1.4.2"/>
        <vers num="1.4.2_1"/>
        <vers num="1.4.2_2"/>
        <vers num="1.4.2_3"/>
        <vers num="1.4.2_4"/>
        <vers num="1.4.2_5"/>
        <vers num="1.4.2_6"/>
        <vers num="1.4.2_7"/>
        <vers num="1.4.2_8"/>
        <vers num="1.4.2_9"/>
        <vers num="1.4.2_10"/>
        <vers num="1.4.2_11"/>
        <vers num="1.4.2_12"/>
        <vers num="1.4.2_13"/>
        <vers num="1.4.2_14"/>
        <vers num="1.4.2_15"/>
        <vers num="1.4.2_16"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1193" seq="2008-1193" published="2008-03-06" modified="2019-07-31" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Java Runtime Environment Image Parsing Library in Sun JDK and JRE 6 Update 4 and earlier, and 5.0 Update 14 and earlier, allows remote attackers to gain privileges via an untrusted application.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BEA" url="http://dev2dev.bea.com/pub/advisory/277" adv="1">BEA08-201.00</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Sep/msg00008.html" adv="1">APPLE-SA-2008-09-24</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00000.html" adv="1">SUSE-SA:2008:018</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.html" adv="1">SUSE-SA:2008:025</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200804-28.xml" adv="1">GLSA-200804-28</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-233325-1" adv="1" patch="1">233325</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3178" adv="1">http://support.apple.com/kb/HT3178</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3179" adv="1">http://support.apple.com/kb/HT3179</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200804-20.xml" adv="1">GLSA-200804-20</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200806-11.xml" adv="1">GLSA-200806-11</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0186.html" adv="1">RHSA-2008:0186</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0210.html" adv="1">RHSA-2008:0210</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0244.html" adv="1">RHSA-2008:0244</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0245.html" adv="1">RHSA-2008:0245</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0267.html" adv="1">RHSA-2008:0267</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28125" adv="1">28125</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019551" adv="1">1019551</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-066A.html" adv="1">TA08-066A</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2008-0010.html" adv="1">http://www.vmware.com/security/advisories/VMSA-2008-0010.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0770/references" adv="1">ADV-2008-0770</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1252" adv="1">ADV-2008-1252</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1856/references" adv="1">ADV-2008-1856</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41028" adv="1">sun-jre-imagelibrary-privilege-escalation(41028)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11409" adv="1">oval:org.mitre.oval:def:11409</ref>
    </refs>
    <vuln_soft>
      <prod name="jdk" vendor="sun">
        <vers num="1.5.0" edition="-"/>
        <vers num="1.5.0" edition="update1"/>
        <vers num="1.5.0" edition="update10"/>
        <vers num="1.5.0" edition="update11"/>
        <vers num="1.5.0" edition="update12"/>
        <vers num="1.5.0" edition="update13"/>
        <vers num="1.5.0" edition="update14"/>
        <vers num="1.5.0" edition="update2"/>
        <vers num="1.5.0" edition="update3"/>
        <vers num="1.5.0" edition="update4"/>
        <vers num="1.5.0" edition="update5"/>
        <vers num="1.5.0" edition="update6"/>
        <vers num="1.5.0" edition="update7"/>
        <vers num="1.5.0" edition="update8"/>
        <vers num="1.5.0" edition="update9"/>
        <vers num="1.6.0" edition="-"/>
        <vers num="1.6.0" edition="update_3"/>
        <vers num="1.6.0" edition="update_4"/>
      </prod>
      <prod name="jre" vendor="sun">
        <vers num="1.5.0" edition="-"/>
        <vers num="1.5.0" edition="update1"/>
        <vers num="1.5.0" edition="update10"/>
        <vers num="1.5.0" edition="update11"/>
        <vers num="1.5.0" edition="update12"/>
        <vers num="1.5.0" edition="update13"/>
        <vers num="1.5.0" edition="update14"/>
        <vers num="1.5.0" edition="update2"/>
        <vers num="1.5.0" edition="update3"/>
        <vers num="1.5.0" edition="update4"/>
        <vers num="1.5.0" edition="update5"/>
        <vers num="1.5.0" edition="update6"/>
        <vers num="1.5.0" edition="update7"/>
        <vers num="1.5.0" edition="update8"/>
        <vers num="1.5.0" edition="update9"/>
        <vers num="1.6.0" edition="-"/>
        <vers num="1.6.0" edition="update_1"/>
        <vers num="1.6.0" edition="update_2"/>
        <vers num="1.6.0" edition="update_3"/>
        <vers num="1.6.0" edition="update_4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1194" seq="2008-1194" published="2008-03-06" modified="2019-07-31" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Multiple unspecified vulnerabilities in the color management library in Sun JDK and JRE 6 Update 4 and earlier, and 5.0 Update 14 and earlier, allows remote attackers to cause a denial of service (crash) via unknown vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BEA" url="http://dev2dev.bea.com/pub/advisory/277" adv="1">BEA08-201.00</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Sep/msg00008.html" adv="1">APPLE-SA-2008-09-24</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00000.html" adv="1">SUSE-SA:2008:018</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.html" adv="1">SUSE-SA:2008:025</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200804-28.xml" adv="1">GLSA-200804-28</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-233325-1" adv="1" patch="1">233325</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3178" adv="1">http://support.apple.com/kb/HT3178</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3179" adv="1">http://support.apple.com/kb/HT3179</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200804-20.xml" adv="1">GLSA-200804-20</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200806-11.xml" adv="1">GLSA-200806-11</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0186.html" adv="1">RHSA-2008:0186</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0210.html" adv="1">RHSA-2008:0210</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0244.html" adv="1">RHSA-2008:0244</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0245.html" adv="1">RHSA-2008:0245</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0267.html" adv="1">RHSA-2008:0267</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019551" adv="1">1019551</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-066A.html" adv="1">TA08-066A</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2008-0010.html" adv="1">http://www.vmware.com/security/advisories/VMSA-2008-0010.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0770/references" adv="1">ADV-2008-0770</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1252" adv="1">ADV-2008-1252</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1856/references" adv="1">ADV-2008-1856</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41132" adv="1">sun-jre-jdk-colorlibrary-dos(41132)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9542" adv="1">oval:org.mitre.oval:def:9542</ref>
    </refs>
    <vuln_soft>
      <prod name="jdk" vendor="sun">
        <vers num="1.5.0" edition="-"/>
        <vers num="1.5.0" edition="update1"/>
        <vers num="1.5.0" edition="update10"/>
        <vers num="1.5.0" edition="update11"/>
        <vers num="1.5.0" edition="update12"/>
        <vers num="1.5.0" edition="update13"/>
        <vers num="1.5.0" edition="update14"/>
        <vers num="1.5.0" edition="update2"/>
        <vers num="1.5.0" edition="update3"/>
        <vers num="1.5.0" edition="update4"/>
        <vers num="1.5.0" edition="update5"/>
        <vers num="1.5.0" edition="update6"/>
        <vers num="1.5.0" edition="update7"/>
        <vers num="1.5.0" edition="update8"/>
        <vers num="1.5.0" edition="update9"/>
        <vers num="1.6.0" edition="-"/>
        <vers num="1.6.0" edition="update_3"/>
        <vers num="1.6.0" edition="update_4"/>
      </prod>
      <prod name="jre" vendor="sun">
        <vers num="1.5.0" edition="-"/>
        <vers num="1.5.0" edition="update1"/>
        <vers num="1.5.0" edition="update10"/>
        <vers num="1.5.0" edition="update11"/>
        <vers num="1.5.0" edition="update12"/>
        <vers num="1.5.0" edition="update13"/>
        <vers num="1.5.0" edition="update14"/>
        <vers num="1.5.0" edition="update2"/>
        <vers num="1.5.0" edition="update3"/>
        <vers num="1.5.0" edition="update4"/>
        <vers num="1.5.0" edition="update5"/>
        <vers num="1.5.0" edition="update6"/>
        <vers num="1.5.0" edition="update7"/>
        <vers num="1.5.0" edition="update8"/>
        <vers num="1.5.0" edition="update9"/>
        <vers num="1.6.0" edition="-"/>
        <vers num="1.6.0" edition="update_1"/>
        <vers num="1.6.0" edition="update_2"/>
        <vers num="1.6.0" edition="update_3"/>
        <vers num="1.6.0" edition="update_4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1195" seq="2008-1195" published="2008-03-06" modified="2019-07-31" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Sun JDK and Java Runtime Environment (JRE) 6 Update 4 and earlier and 5.0 Update 14 and earlier; and SDK and JRE 1.4.2_16 and earlier; allows remote attackers to access arbitrary network services on the local host via unspecified vectors related to JavaScript and Java APIs.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Sep/msg00008.html" adv="1">APPLE-SA-2008-09-24</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00000.html" adv="1">SUSE-SA:2008:018</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00002.html" adv="1">SUSE-SA:2008:019</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.html" adv="1">SUSE-SA:2008:025</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200804-28.xml" adv="1">GLSA-200804-28</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-233326-1" adv="1">233326</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1" adv="1">238492</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3178" adv="1">http://support.apple.com/kb/HT3178</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3179" adv="1">http://support.apple.com/kb/HT3179</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128" adv="1">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200804-20.xml" adv="1">GLSA-200804-20</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200806-11.xml" adv="1">GLSA-200806-11</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:080" adv="1">MDVSA-2008:080</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/security/announce/2008/mfsa2008-18.html" adv="1">http://www.mozilla.org/security/announce/2008/mfsa2008-18.html</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0186.html" adv="1">RHSA-2008:0186</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0210.html" adv="1">RHSA-2008:0210</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0267.html" adv="1">RHSA-2008:0267</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490196/100/0/threaded" adv="1">20080327 rPSA-2008-0128-1 firefox</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019553" adv="1">1019553</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-592-1" adv="1">USN-592-1</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-066A.html" adv="1">TA08-066A</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-087A.html" adv="1">TA08-087A</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2008-0010.html" adv="1">http://www.vmware.com/security/advisories/VMSA-2008-0010.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0770/references" adv="1">ADV-2008-0770</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0998/references" adv="1">ADV-2008-0998</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1793/references" adv="1">ADV-2008-1793</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1856/references" adv="1">ADV-2008-1856</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41030" adv="1">sun-jre-javascript-unauthorized-access(41030)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9486" adv="1">oval:org.mitre.oval:def:9486</ref>
    </refs>
    <vuln_soft>
      <prod name="jdk" vendor="sun">
        <vers num="1.5.0" edition="-"/>
        <vers num="1.5.0" edition="update1"/>
        <vers num="1.5.0" edition="update10"/>
        <vers num="1.5.0" edition="update11"/>
        <vers num="1.5.0" edition="update12"/>
        <vers num="1.5.0" edition="update13"/>
        <vers num="1.5.0" edition="update14"/>
        <vers num="1.5.0" edition="update2"/>
        <vers num="1.5.0" edition="update3"/>
        <vers num="1.5.0" edition="update4"/>
        <vers num="1.5.0" edition="update5"/>
        <vers num="1.5.0" edition="update6"/>
        <vers num="1.5.0" edition="update7"/>
        <vers num="1.5.0" edition="update8"/>
        <vers num="1.5.0" edition="update9"/>
        <vers num="1.6.0" edition="-"/>
        <vers num="1.6.0" edition="update_3"/>
        <vers num="1.6.0" edition="update_4"/>
      </prod>
      <prod name="jre" vendor="sun">
        <vers num="1.4.2"/>
        <vers num="1.4.2_1"/>
        <vers num="1.4.2_2"/>
        <vers num="1.4.2_3"/>
        <vers num="1.4.2_4"/>
        <vers num="1.4.2_5"/>
        <vers num="1.4.2_6"/>
        <vers num="1.4.2_7"/>
        <vers num="1.4.2_8"/>
        <vers num="1.4.2_9"/>
        <vers num="1.4.2_10"/>
        <vers num="1.4.2_11"/>
        <vers num="1.4.2_12"/>
        <vers num="1.4.2_13"/>
        <vers num="1.4.2_14"/>
        <vers num="1.4.2_15"/>
        <vers num="1.4.2_16"/>
        <vers num="1.5.0" edition="-"/>
        <vers num="1.5.0" edition="update1"/>
        <vers num="1.5.0" edition="update10"/>
        <vers num="1.5.0" edition="update11"/>
        <vers num="1.5.0" edition="update12"/>
        <vers num="1.5.0" edition="update13"/>
        <vers num="1.5.0" edition="update14"/>
        <vers num="1.5.0" edition="update2"/>
        <vers num="1.5.0" edition="update3"/>
        <vers num="1.5.0" edition="update4"/>
        <vers num="1.5.0" edition="update5"/>
        <vers num="1.5.0" edition="update6"/>
        <vers num="1.5.0" edition="update7"/>
        <vers num="1.5.0" edition="update8"/>
        <vers num="1.5.0" edition="update9"/>
        <vers num="1.6.0" edition="-"/>
        <vers num="1.6.0" edition="update_1"/>
        <vers num="1.6.0" edition="update_2"/>
        <vers num="1.6.0" edition="update_3"/>
        <vers num="1.6.0" edition="update_4"/>
      </prod>
      <prod name="sdk" vendor="sun">
        <vers num="1.4.2"/>
        <vers num="1.4.2_1"/>
        <vers num="1.4.2_2"/>
        <vers num="1.4.2_3"/>
        <vers num="1.4.2_4"/>
        <vers num="1.4.2_5"/>
        <vers num="1.4.2_6"/>
        <vers num="1.4.2_7"/>
        <vers num="1.4.2_8"/>
        <vers num="1.4.2_9"/>
        <vers num="1.4.2_10"/>
        <vers num="1.4.2_11"/>
        <vers num="1.4.2_12"/>
        <vers num="1.4.2_13"/>
        <vers num="1.4.2_14"/>
        <vers num="1.4.2_15"/>
        <vers num="1.4.2_16"/>
      </prod>
      <prod name="ubuntu_linux" vendor="canonical">
        <vers num="6.06" edition=":~~lts~~~"/>
        <vers num="6.10"/>
        <vers num="7.04"/>
        <vers num="7.10"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1196" seq="2008-1196" published="2008-03-06" modified="2019-07-31" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in Java Web Start (javaws.exe) in Sun JDK and JRE 6 Update 4 and earlier and 5.0 Update 14 and earlier; and SDK and JRE 1.4.2_16 and earlier; allows remote attackers to execute arbitrary code via a crafted JNLP file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://download.novell.com/Download?buildid=q5exhSqeBjA~" adv="1">http://download.novell.com/Download?buildid=q5exhSqeBjA~</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Sep/msg00008.html" adv="1">APPLE-SA-2008-09-24</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00000.html" adv="1">SUSE-SA:2008:018</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.html" adv="1">SUSE-SA:2008:025</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200804-28.xml" adv="1">GLSA-200804-28</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-233327-1" adv="1" patch="1">233327</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3178" adv="1">http://support.apple.com/kb/HT3178</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3179" adv="1">http://support.apple.com/kb/HT3179</ref>
      <ref source="CONFIRM" url="http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5033642.html" adv="1">http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5033642.html</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200804-20.xml" adv="1">GLSA-200804-20</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200806-11.xml" adv="1">GLSA-200806-11</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/223028" adv="1">VU#223028</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0186.html" adv="1">RHSA-2008:0186</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0210.html" adv="1">RHSA-2008:0210</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0267.html" adv="1">RHSA-2008:0267</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0555.html" adv="1">RHSA-2008:0555</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019552" adv="1">1019552</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-066A.html" adv="1">TA08-066A</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2008-0010.html" adv="1">http://www.vmware.com/security/advisories/VMSA-2008-0010.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0770/references" adv="1">ADV-2008-0770</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1856/references" adv="1">ADV-2008-1856</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41026" adv="1">sun-java-webstart-javaws-bo(41026)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10412" adv="1">oval:org.mitre.oval:def:10412</ref>
    </refs>
    <vuln_soft>
      <prod name="jdk" vendor="sun">
        <vers num="1.5.0" edition="-"/>
        <vers num="1.5.0" edition="update1"/>
        <vers num="1.5.0" edition="update10"/>
        <vers num="1.5.0" edition="update11"/>
        <vers num="1.5.0" edition="update12"/>
        <vers num="1.5.0" edition="update13"/>
        <vers num="1.5.0" edition="update14"/>
        <vers num="1.5.0" edition="update2"/>
        <vers num="1.5.0" edition="update3"/>
        <vers num="1.5.0" edition="update4"/>
        <vers num="1.5.0" edition="update5"/>
        <vers num="1.5.0" edition="update6"/>
        <vers num="1.5.0" edition="update7"/>
        <vers num="1.5.0" edition="update8"/>
        <vers num="1.5.0" edition="update9"/>
        <vers num="1.6.0" edition="-"/>
        <vers num="1.6.0" edition="update_3"/>
        <vers num="1.6.0" edition="update_4"/>
      </prod>
      <prod name="jre" vendor="sun">
        <vers num="1.4.2"/>
        <vers num="1.4.2_1"/>
        <vers num="1.4.2_2"/>
        <vers num="1.4.2_3"/>
        <vers num="1.4.2_4"/>
        <vers num="1.4.2_5"/>
        <vers num="1.4.2_6"/>
        <vers num="1.4.2_7"/>
        <vers num="1.4.2_8"/>
        <vers num="1.4.2_9"/>
        <vers num="1.4.2_10"/>
        <vers num="1.4.2_11"/>
        <vers num="1.4.2_12"/>
        <vers num="1.4.2_13"/>
        <vers num="1.4.2_14"/>
        <vers num="1.4.2_15"/>
        <vers num="1.4.2_16"/>
        <vers num="1.5.0" edition="-"/>
        <vers num="1.5.0" edition="update1"/>
        <vers num="1.5.0" edition="update10"/>
        <vers num="1.5.0" edition="update11"/>
        <vers num="1.5.0" edition="update12"/>
        <vers num="1.5.0" edition="update13"/>
        <vers num="1.5.0" edition="update14"/>
        <vers num="1.5.0" edition="update2"/>
        <vers num="1.5.0" edition="update3"/>
        <vers num="1.5.0" edition="update4"/>
        <vers num="1.5.0" edition="update5"/>
        <vers num="1.5.0" edition="update6"/>
        <vers num="1.5.0" edition="update7"/>
        <vers num="1.5.0" edition="update8"/>
        <vers num="1.5.0" edition="update9"/>
        <vers num="1.6.0" edition="-"/>
        <vers num="1.6.0" edition="update_1"/>
        <vers num="1.6.0" edition="update_2"/>
        <vers num="1.6.0" edition="update_3"/>
        <vers num="1.6.0" edition="update_4"/>
      </prod>
      <prod name="sdk" vendor="sun">
        <vers num="1.4.2"/>
        <vers num="1.4.2_1"/>
        <vers num="1.4.2_2"/>
        <vers num="1.4.2_3"/>
        <vers num="1.4.2_4"/>
        <vers num="1.4.2_5"/>
        <vers num="1.4.2_6"/>
        <vers num="1.4.2_7"/>
        <vers num="1.4.2_8"/>
        <vers num="1.4.2_9"/>
        <vers num="1.4.2_10"/>
        <vers num="1.4.2_11"/>
        <vers num="1.4.2_12"/>
        <vers num="1.4.2_13"/>
        <vers num="1.4.2_14"/>
        <vers num="1.4.2_15"/>
        <vers num="1.4.2_16"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1197" seq="2008-1197" published="2008-09-05" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.3" CVSS_base_score="6.3" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="6.8" CVSS_vector="(AV:N/AC:M/Au:S/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">The Marvell driver for the Netgear WN802T Wi-Fi access point with firmware 1.3.16 on the Marvell 88W8361P-BEM1 chipset does not properly parse the SSID information element in an association request, which allows remote authenticated users to cause a denial of service (device reboot or hang) or possibly execute arbitrary code via a "Null SSID."</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/4215">4215</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/495983/100/0/threaded">20080904 Marvell Driver Null SSID Association Request Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30976">30976</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/44918">netgear-wn802t-ssid-dos(44918)</ref>
    </refs>
    <vuln_soft>
      <prod name="88w8361w-bem1" vendor="marvell">
        <vers num=""/>
      </prod>
      <prod name="wn802t" vendor="netgear">
        <vers num="1.3.16"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1198" seq="2008-1198" published="2008-03-06" modified="2018-01-05" severity="High" CVSS_version="2.0" CVSS_score="7.1" CVSS_base_score="7.1" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:N/A:N)">
    <desc>
      <descript source="cve">The default IPSec ifup script in Red Hat Enterprise Linux 3 through 5 configures racoon to use aggressive IKE mode instead of main IKE mode, which makes it easier for remote attackers to conduct brute force attacks by sniffing an unencrypted preshared key (PSK) hash.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECUNIA" url="http://secunia.com/advisories/48045">48045</ref>
      <ref source="MISC" url="http://www.ernw.de/download/pskattack.pdf">http://www.ernw.de/download/pskattack.pdf</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019563">1019563</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=435274">https://bugzilla.redhat.com/show_bug.cgi?id=435274</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41053">ipsec-ifup-weak-security(41053)</ref>
    </refs>
    <vuln_soft>
      <prod name="enterprise_linux" vendor="red_hat">
        <vers num="4"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="3.0"/>
        <vers num="5.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1199" seq="2008-1199" published="2008-03-06" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.4" CVSS_base_score="4.4" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Dovecot before 1.0.11, when configured to use mail_extra_groups to allow Dovecot to create dotlocks in /var/mail, might allow local users to read sensitive mail files for other users, or modify files or directories that are writable by group, via a symlink attack.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html">SUSE-SR:2008:020</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200803-25.xml">GLSA-200803-25</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1516">DSA-1516</ref>
      <ref source="MLIST" url="http://www.dovecot.org/list/dovecot-news/2008-March/000061.html" patch="1">[Dovecot-news] 20080504 v1.0.11 released</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0297.html">RHSA-2008:0297</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489133/100/0/threaded">20080304 Dovecot mail_extra_groups setting is often used insecurely</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28092" patch="1">28092</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41009">dovecot-mailextragroups-unauth-access(41009)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10739">oval:org.mitre.oval:def:10739</ref>
      <ref source="UBUNTU" url="https://usn.ubuntu.com/593-1/">USN-593-1</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00358.html">FEDORA-2008-2464</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00381.html">FEDORA-2008-2475</ref>
    </refs>
    <vuln_soft>
      <prod name="dovecot" vendor="dovecot">
        <vers num="0.99.13"/>
        <vers num="0.99.14"/>
        <vers num="1.0"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.4"/>
        <vers num="1.0.5"/>
        <vers num="1.0.6"/>
        <vers num="1.0.7"/>
        <vers num="1.0.8"/>
        <vers num="1.0.9"/>
        <vers num="1.0.10"/>
        <vers num="1.0.beta2"/>
        <vers num="1.0.beta3"/>
        <vers num="1.0.beta7"/>
        <vers num="1.0.beta8"/>
        <vers num="1.0.rc1"/>
        <vers num="1.0.rc2"/>
        <vers num="1.0.rc3"/>
        <vers num="1.0.rc4"/>
        <vers num="1.0.rc5"/>
        <vers num="1.0.rc6"/>
        <vers num="1.0.rc7"/>
        <vers num="1.0.rc8"/>
        <vers num="1.0.rc9"/>
        <vers num="1.0.rc10"/>
        <vers num="1.0.rc11"/>
        <vers num="1.0.rc12"/>
        <vers num="1.0.rc13"/>
        <vers num="1.0.rc14"/>
        <vers num="1.0.rc15"/>
        <vers num="1.0_rc29"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1200" seq="2008-1200" published="2008-03-06" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Microsoft Access allows remote user-assisted attackers to execute arbitrary code via a crafted .MDB file, possibly related to Jet Engine (msjet40.dll).  NOTE: this is probably a different issue than CVE-2007-6026.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://pandalabs.pandasecurity.com/archive/New-MS-Access-exploit.aspx">http://pandalabs.pandasecurity.com/archive/New-MS-Access-exploit.aspx</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28087">28087</ref>
    </refs>
    <vuln_soft>
      <prod name="access" vendor="microsoft">
        <vers num="2000"/>
      </prod>
      <prod name="jet" vendor="microsoft">
        <vers num="4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1201" seq="2008-1201" published="2008-03-24" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple unspecified vulnerabilities in FLA file parsing in Adobe Flash CS3 Professional, Flash Professional 8, and Flash Basic 8 on Windows allow user-assisted remote attackers to execute arbitrary code via a crafted .FLA file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://ruder.cdut.net/blogview.asp?logID=241">http://ruder.cdut.net/blogview.asp?logID=241</ref>
      <ref source="CONFIRM" url="http://www.adobe.com/support/security/advisories/apsa08-03.html">http://www.adobe.com/support/security/advisories/apsa08-03.html</ref>
      <ref source="MISC" url="http://www.fortiguardcenter.com/advisory/FGA-2008-07.html">http://www.fortiguardcenter.com/advisory/FGA-2008-07.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28349">28349</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019681">1019681</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0948/references">ADV-2008-0948</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41327">adobe-flash-fla-code-execution(41327)</ref>
    </refs>
    <vuln_soft>
      <prod name="flash" vendor="adobe">
        <vers num="basic" edition="8"/>
        <vers num="professional" edition="8"/>
        <vers num="professional" edition="cs3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1202" seq="2008-1202" published="2008-03-11" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the web management interface in Adobe LiveCycle Workflow 6.2 allows remote attackers to inject arbitrary web script or HTML via unknown vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3729">3729</ref>
      <ref source="CONFIRM" url="http://www.adobe.com/support/security/bulletins/apsb08-10.html">http://www.adobe.com/support/security/bulletins/apsb08-10.html</ref>
      <ref source="MISC" url="http://www.liquidmatrix.org/blog/2008/03/11/advisory-adobe-livecycle-workflow-xss-vulnerability/">http://www.liquidmatrix.org/blog/2008/03/11/advisory-adobe-livecycle-workflow-xss-vulnerability/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489413/100/0/threaded">20080311 Advisory Adobe LiveCycle Workflow XSS Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28209">28209</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019588">1019588</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0864/references">ADV-2008-0864</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41143">adobe-lifecycle-loginpage-xss(41143)</ref>
    </refs>
    <vuln_soft>
      <prod name="livecycle_workflow" vendor="adobe">
        <vers num="6.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1203" seq="2008-1203" published="2008-03-11" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The administrator interface for Adobe ColdFusion 8 and ColdFusion MX7 does not log failed authentication attempts, which makes it easier for remote attackers to conduct brute force attacks without detection.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.adobe.com/support/security/bulletins/apsb08-08.html" patch="1">http://www.adobe.com/support/security/bulletins/apsb08-08.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28207" patch="1">28207</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019600">1019600</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0862/references">ADV-2008-0862</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41150">coldfusion-interface-brute-force(41150)</ref>
    </refs>
    <vuln_soft>
      <prod name="coldfusion" vendor="adobe">
        <vers num="7.0"/>
        <vers num="8.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1204" seq="2008-1204" published="2008-03-07" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in the Administration Console in Sun Java System Access Manager 7.1 and 7 2005Q4 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors related to the (1) Help and (2) Version windows.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-201251-1" patch="1">201251</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28113">28113</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0784">ADV-2008-0784</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41024">sun-jsam-adminconsole-xss(41024)</ref>
    </refs>
    <vuln_soft>
      <prod name="java_system_access_manager" vendor="sun">
        <vers num="7.0" edition=":linux"/>
        <vers num="7.0_2005q4" edition=":hp-ux"/>
        <vers num="7.0_2005q4" edition=":solaris_sparc"/>
        <vers num="7.0_2005q4" edition=":solaris_x86"/>
        <vers num="7.0_2005q4" edition=":windows"/>
        <vers num="7.1" edition=":hp-ux"/>
        <vers num="7.1" edition=":linux"/>
        <vers num="7.1" edition=":solaris_sparc"/>
        <vers num="7.1" edition=":solaris_x86"/>
        <vers num="7.1" edition=":windows"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1205" seq="2008-1205" published="2008-03-07" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.9" CVSS_base_score="4.9" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the ipsecah kernel module in Sun Solaris 10, when a key management daemon for IPsec security associations is running, allows local users to cause a denial of service (panic) via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-233761-1" patch="1">233761</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28112">28112</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0783">ADV-2008-0783</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41023">solaris-ipsecah-dos(41023)</ref>
    </refs>
    <vuln_soft>
      <prod name="solaris" vendor="sun">
        <vers num="10" edition=":sparc"/>
        <vers num="10" edition=":x86"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1206" seq="2008-1206" published="2008-03-07" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Format string vulnerability in the log_message function in lks.c in Linux Kiss Server 1.2, when background (daemon) mode is disabled, allows remote attackers to cause a denial of service (crash) or execute arbitrary code via format string specifiers in an invalid command.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://marc.info/?l=full-disclosure&amp;m=120468901813326&amp;w=2">20080305 Vulnerability in Linux Kiss Server v1.2</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28099">28099</ref>
      <ref source="MISC" url="http://www.vashnukad.com/">http://www.vashnukad.com/</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0785">ADV-2008-0785</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41018">linuxkissserver-logmessage-format-string(41018)</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kiss_server" vendor="linux_kiss_server">
        <vers num="1.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1207" seq="2008-1207" published="2008-03-07" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Multiple unspecified vulnerabilities in Fujitsu Interstage Smart Repository, as used in multiple Fujitsu Interstage products, allow remote attackers to cause a denial of service (daemon crash) via (1) an invalid request or (2) a large amount of data sent to the registered attribute value.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.fujitsu.com/global/support/software/security/products-f/interstage-sr-200801e.html" patch="1">http://www.fujitsu.com/global/support/software/security/products-f/interstage-sr-200801e.html</ref>
      <ref source="CONFIRM" url="http://www.fujitsu.com/global/support/software/security/products-f/interstage-sr-200802e.html" patch="1">http://www.fujitsu.com/global/support/software/security/products-f/interstage-sr-200802e.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28114">28114</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0786">ADV-2008-0786</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41039">interstage-smart-repository-dos(41039)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41041">interstage-smartrepository-update-dos(41041)</ref>
    </refs>
    <vuln_soft>
      <prod name="interstage_application_server_enterprise" vendor="fujitsu">
        <vers num="7.0"/>
        <vers num="7.0.1"/>
        <vers num="8.0.0"/>
        <vers num="8.0.1"/>
        <vers num="8.0.2"/>
      </prod>
      <prod name="interstage_application_server_plus" vendor="fujitsu">
        <vers num="7.0"/>
        <vers num="7.0.1"/>
      </prod>
      <prod name="interstage_application_server_standard_j" vendor="fujitsu">
        <vers num="8.0.0"/>
        <vers num="8.0.1"/>
        <vers num="8.0.2"/>
      </prod>
      <prod name="interstage_apworks_enterprise" vendor="fujitsu">
        <vers num="8.0.0"/>
      </prod>
      <prod name="interstage_apworks_modelers_j" vendor="fujitsu">
        <vers num="7.0"/>
      </prod>
      <prod name="interstage_apworks_standard_j" vendor="fujitsu">
        <vers num="8.0.0"/>
      </prod>
      <prod name="interstage_business_application_server" vendor="fujitsu">
        <vers num="8.0" edition=":enterprise"/>
      </prod>
      <prod name="interstage_smart_repository" vendor="fujitsu">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1208" seq="2008-1208" published="2008-03-07" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the login page in Check Point VPN-1 UTM Edge W Embedded NGX 7.0.48x allows remote attackers to inject arbitrary web script or HTML via the user parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.louhi.fi/advisory/checkpoint_080306.txt">http://www.louhi.fi/advisory/checkpoint_080306.txt</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489203/100/0/threaded">20080306 Checkpoint VPN-1 UTM Edge cross-site scripting</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28116">28116</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019554">1019554</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0788">ADV-2008-0788</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41032">vpn1utmedge-login-xss(41032)</ref>
      <ref source="CONFIRM" url="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;solutionid=sk34520">https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;solutionid=sk34520</ref>
    </refs>
    <vuln_soft>
      <prod name="vpn-1_utm_edge_w_embedded_ngx" vendor="checkpoint">
        <vers num="7.0.48"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1209" seq="2008-1209" published="2008-03-07" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in redirect.do in Xitex WebContent M1 allows remote attackers to inject arbitrary web script or HTML via the sid parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28115">28115</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41021">xitex-redirect-xss(41021)</ref>
    </refs>
    <vuln_soft>
      <prod name="xitex_webcontent_m1" vendor="xitex">
        <vers num="" edition=":professional"/>
        <vers num="" edition=":standard"/>
        <vers num="" edition=":start"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1210" seq="2008-1210" published="2008-03-07" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the ctags parsing code in Programmer's Notepad before 2.0.8.718 allows user-assisted remote attackers to cause a denial of service (application crash) or execute arbitrary code via a crafted .c file, when the victim selects the Jump To dialog.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=581499&amp;group_id=45545">http://sourceforge.net/project/shownotes.php?release_id=581499&amp;group_id=45545</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28119">28119</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41022">programmersnotepad-ctags-bo(41022)</ref>
    </refs>
    <vuln_soft>
      <prod name="programmers_notepad" vendor="pnotepad">
        <vers num="2.0.6.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1211" seq="2008-1211" published="2008-03-07" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in BosDates 3.x and 4.x allows remote attackers to inject arbitrary web script or HTML via (1) the type parameter in calendar.php and (2) the category parameter in calendar_search.php.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28117">28117</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41020">bosdates-type-category-xss(41020)</ref>
    </refs>
    <vuln_soft>
      <prod name="bosdates" vendor="bosdev">
        <vers num="3.0"/>
        <vers num="3.1"/>
        <vers num="3.2"/>
        <vers num="4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1212" seq="2008-1212" published="2008-03-07" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in set_permissions.php in Podcast Generator 0.96.2 allows remote attackers to inject arbitrary web script or HTML via the scriptlang parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28106">28106</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41130">podcastgenerator-setpermissions-xss(41130)</ref>
    </refs>
    <vuln_soft>
      <prod name="podcast_generator" vendor="podcast_generator">
        <vers num="0.96.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1213" seq="2008-1213" published="2008-03-07" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Numara FootPrints for Linux 8.1 allows remote attackers to inject arbitrary web script or HTML via the Title form field when setting an appointment.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28103">28103</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41003">footprints-title-xss(41003)</ref>
    </refs>
    <vuln_soft>
      <prod name="footprints" vendor="numara">
        <vers num="8.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1214" seq="2008-1214" published="2008-03-07" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">MRcgi/MRProcessIncomingForms.pl in Numara FootPrints 8.1 on Linux allows remote attackers to execute arbitrary code via shell metacharacters in the PROJECTNUM parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41005">footprints-projectnum-command-execution(41005)</ref>
    </refs>
    <vuln_soft>
      <prod name="footprints" vendor="numara">
        <vers num="8.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1215" seq="2008-1215" published="2008-03-08" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the command_Expand_Interpret function in command.c in ppp (aka user-ppp), as distributed in FreeBSD 6.3 and 7.0, OpenBSD 4.1 and 4.2, and the net/userppp package for NetBSD, allows local users to gain privileges via long commands containing "~" characters.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="OPENBSD" url="http://www.openbsd.org/errata41.html#014_ppp">[4.1] 20080307 014: SECURITY FIX: March 7, 2008</ref>
      <ref source="OPENBSD" url="http://www.openbsd.org/errata42.html#009_ppp">[4.2] 20080307 009: SECURITY FIX: March 7, 2008</ref>
      <ref source="VULN-DEV" url="http://www.securityfocus.com/archive/82/488980/30/0/threaded">20080229 *BSD user-ppp local root (when conditions permit)</ref>
      <ref source="VULN-DEV" url="http://www.securityfocus.com/archive/82/489031/30/0/threaded">20080301 Re: *BSD user-ppp local root (when conditions permit)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28090">28090</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41034">userppp-commandexpandinterpret-bo(41034)</ref>
    </refs>
    <vuln_soft>
      <prod name="freebsd" vendor="freebsd">
        <vers num="6.3"/>
        <vers num="7.0"/>
      </prod>
      <prod name="netbsd" vendor="netbsd">
        <vers num=""/>
      </prod>
      <prod name="openbsd" vendor="openbsd">
        <vers num="4.1"/>
        <vers num="4.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1216" seq="2008-1216" published="2008-03-08" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">IBM Lotus Quickr 8.0 server, and possibly QuickPlace 7.x, does not properly identify URIs containing cross-site scripting (XSS) attack strings, which allows remote attackers to inject arbitrary web script or HTML via a Calendar OpenDocument action to main.nsf with a Count parameter containing a JavaScript event in a malformed element, as demonstrated by an onload event in an IFRAME element.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3721">3721</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488620/100/100/threaded">20080222 IBM Quickr 8 Calendar Xss Injection (Bypass Quickr 8.0 Xss Filter)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27925">27925</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0667">ADV-2008-0667</ref>
    </refs>
    <vuln_soft>
      <prod name="lotus_quickr_server" vendor="ibm">
        <vers num="8.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1217" seq="2008-1217" published="2008-03-08" modified="2009-09-03" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in nlnotes.dll in the client in IBM Lotus Notes 6.5, 7.0.x before 7.0.2 CCH, and 8.0.x before 8.0.1 allows remote attackers to execute arbitrary code via a crafted attachment in an e-mail message sent over SMTP, a variant of CVE-2007-6706.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019464">1019464</ref>
      <ref source="CONFIRM" url="http://www-1.ibm.com/support/docview.wss?uid=swg21271957" adv="1">http://www-1.ibm.com/support/docview.wss?uid=swg21271957</ref>
    </refs>
    <vuln_soft>
      <prod name="lotus_notes" vendor="ibm">
        <vers num="6.5"/>
        <vers num="7.0.2"/>
        <vers num="8.0.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1218" seq="2008-1218" published="2008-03-10" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Argument injection vulnerability in Dovecot 1.0.x before 1.0.13, and 1.1.x before 1.1.rc3, when using blocking passdbs, allows remote attackers to bypass the password check via a password containing TAB characters, which are treated as argument delimiters that enable the skip_password_check field to be specified.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html">SUSE-SR:2008:020</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200803-25.xml">GLSA-200803-25</ref>
      <ref source="MISC" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0108">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0108</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1516">DSA-1516</ref>
      <ref source="MLIST" url="http://www.dovecot.org/list/dovecot-news/2008-March/000064.html">[Dovecot-news] 20080309 Security hole #6: Some passdbs allowed users to log in without a valid password</ref>
      <ref source="MLIST" url="http://www.dovecot.org/list/dovecot-news/2008-March/000065.html">[Dovecot-news] 20080309 v1.0.13 and v1.1.rc3 released</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489481/100/0/threaded">20080312 rPSA-2008-0108-1 dovecot</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28181">28181</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41085">dovecot-tab-authentication-bypass(41085)</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2341">https://issues.rpath.com/browse/RPL-2341</ref>
      <ref source="UBUNTU" url="https://usn.ubuntu.com/593-1/">USN-593-1</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5257">5257</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00358.html">FEDORA-2008-2464</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00381.html">FEDORA-2008-2475</ref>
    </refs>
    <vuln_soft>
      <prod name="dovecot" vendor="dovecot">
        <vers num="1.0.12" prev="1"/>
        <vers num="1.1" prev="1" edition="rc2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1219" seq="2008-1219" published="2008-03-10" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the Kutub-i Sitte (KutubiSitte) 1.1 module for PHP-Nuke allows remote attackers to execute arbitrary SQL commands via the kid parameter in a hadisgoster action to modules.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3722">3722</ref>
      <ref source="MISC" url="http://www.rbt-4.net/forum/viewthread.php?forum_id=51&amp;thread_id=3058">http://www.rbt-4.net/forum/viewthread.php?forum_id=51&amp;thread_id=3058</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489219/100/0/threaded">20080306 PHP-Nuke KutubiSitte "kid" SQL Injection</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489258/100/0/threaded">20080306 PHP-Nuke KutubiSitte "kid" SQL Injection exploit code adding</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28126">28126</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41036">kutubisitte-kid-sql-injection(41036)</ref>
    </refs>
    <vuln_soft>
      <prod name="kutubisitte_component" vendor="phpnuke">
        <vers num="1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1220" seq="2008-1220" published="2008-03-10" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the 4nChat 0.91 module for PHP-Nuke allows remote attackers to execute arbitrary SQL commands via the roomid parameter in an index action to modules.php.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28128">28128</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41051">4nchat-roomid-sql-injection(41051)</ref>
    </refs>
    <vuln_soft>
      <prod name="4nchat" vendor="phpnuke">
        <vers num="0.91"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1221" seq="2008-1221" published="2008-03-10" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Absolute path traversal vulnerability in the FTP server in MicroWorld eScan Corporate Edition 9.0.742.98 and eScan Management Console (aka eScan Server) 9.0.742.1 allows remote attackers to read arbitrary files via an absolute pathname in the RETR (get) command.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/escaz-adv.txt">http://aluigi.altervista.org/adv/escaz-adv.txt</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3723">3723</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489228/100/0/threaded">20080306 Directory traversal in MicroWorld eScan Server 9.0.742.98</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28127">28127</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41033">escan-filename-directory-traversal(41033)</ref>
    </refs>
    <vuln_soft>
      <prod name="escan" vendor="microworld_technologies">
        <vers num="9.0.742.98" edition=":corporate"/>
      </prod>
      <prod name="escan_management_console" vendor="microworld_technologies">
        <vers num="9.0.742.1"/>
      </prod>
      <prod name="escan_server" vendor="microworld_technologies">
        <vers num="9.0.742.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1222" seq="2008-1222" published="2008-03-10" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Dokeos 1.8.4 before SP3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://projects.dokeos.com/index.php?do=details&amp;task_id=2312">http://projects.dokeos.com/index.php?do=details&amp;task_id=2312</ref>
      <ref source="CONFIRM" url="http://www.dokeos.com/wiki/index.php/Security" patch="1">http://www.dokeos.com/wiki/index.php/Security</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28121" patch="1">28121</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0798">ADV-2008-0798</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41046">dokeos-unspecified-xss(41046)</ref>
    </refs>
    <vuln_soft>
      <prod name="open_source_learning_and_knowledge_management_tool" vendor="dokeos">
        <vers num="1.8.4" edition="sp1"/>
        <vers num="1.8.4" edition="sp2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1223" seq="2008-1223" published="2008-03-10" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Dokeos 1.8.4 before SP3 allows attackers to execute arbitrary code via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://projects.dokeos.com/index.php?do=details&amp;task_id=2312">http://projects.dokeos.com/index.php?do=details&amp;task_id=2312</ref>
      <ref source="CONFIRM" url="http://www.dokeos.com/wiki/index.php/Security" patch="1">http://www.dokeos.com/wiki/index.php/Security</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28121">28121</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0798">ADV-2008-0798</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41048">dokeos-unspecified-code-execution(41048)</ref>
    </refs>
    <vuln_soft>
      <prod name="open_source_learning_and_knowledge_management_tool" vendor="dokeos">
        <vers num="1.8.4" edition="sp1"/>
        <vers num="1.8.4" edition="sp2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1224" seq="2008-1224" published="2008-03-10" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in account.php in BosClassifieds Classified Ads System 3.0 allows remote attackers to inject arbitrary web script or HTML via the returnTo parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28140">28140</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41045">classifiedads-account-xss(41045)</ref>
    </refs>
    <vuln_soft>
      <prod name="bosclassifieds_classified_ads" vendor="bosdev">
        <vers num="3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1225" seq="2008-1225" published="2008-03-10" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in WebCT Campus Edition 4.1.5.8, when "Don't wrap text" is enabled, allow remote authenticated users to inject arbitrary web script or HTML via a (1) mail message or (2) discussion board message.  NOTE: this might overlap CVE-2005-1076.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://marc.info/?l=full-disclosure&amp;m=120471944119467&amp;w=2">20080305 WebCT 4.x Javascript Session Stealer Exploits</ref>
      <ref source="MISC" url="http://www.balupton.com/blogs/dev?title=webct_session_stealer_exploit">http://www.balupton.com/blogs/dev?title=webct_session_stealer_exploit</ref>
      <ref source="MISC" url="http://www.balupton.com/documents/webct_exploits.txt">http://www.balupton.com/documents/webct_exploits.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28107">28107</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41047">webct-dontwraptext-xss(41047)</ref>
    </refs>
    <vuln_soft>
      <prod name="webct" vendor="webct">
        <vers num="4.1.5.8" edition=":campus_edition"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1226" seq="2008-1226" published="2008-03-10" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in Zimbra Collaboration Suite (ZCS) 4.0.3, 4.5.6, and possibly other versions before 4.5.10 allow remote attackers to inject arbitrary web script or HTML via an e-mail attachment, possibly involving a (1) .jpg or (2) .gif image attachment.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="JVN" url="http://jvn.jp/jp/JVN%2395014590/index.html">JVN#95014590</ref>
      <ref source="JVNDB" url="http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000004.html">JVNDB-2008-000004</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28134" patch="1">28134</ref>
      <ref source="CONFIRM" url="http://www.zimbra.com/jp/products/vulnerability.html">http://www.zimbra.com/jp/products/vulnerability.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41044">zimbra-email-xss(41044)</ref>
    </refs>
    <vuln_soft>
      <prod name="collaboration_suite" vendor="zimbra">
        <vers num="4.0.3"/>
        <vers num="4.5.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1227" seq="2008-1227" published="2008-03-10" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the silc_fingerprint function in lib/silcutil/silcutil.c in Secure Internet Live Conferencing (SILC) Toolkit 1.1.5, and unspecified earlier versions, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via long input data.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html">SUSE-SR:2008:006</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200804-27.xml">GLSA-200804-27</ref>
      <ref source="CONFIRM" url="http://silcnet.org/docs/changelog/SILC%20Toolkit%201.1.6">http://silcnet.org/docs/changelog/SILC%20Toolkit%201.1.6</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:158">MDVSA-2008:158</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28101" patch="1">28101</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0769">ADV-2008-0769</ref>
      <ref source="MISC" url="https://bugzilla.redhat.com/show_bug.cgi?id=372021">https://bugzilla.redhat.com/show_bug.cgi?id=372021</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41012">silctoolkit-silcfingerprint-bo(41012)</ref>
    </refs>
    <vuln_soft>
      <prod name="silc_toolkit" vendor="silc">
        <vers num="1.1"/>
        <vers num="1.1.1"/>
        <vers num="1.1.2"/>
        <vers num="1.1.3"/>
        <vers num="1.1.4"/>
        <vers num="1.1.5" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1228" seq="2008-1228" published="2008-03-10" modified="2013-09-08" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in admin.php in MG2 (formerly Minigal) allows remote attackers to inject arbitrary web script or HTML via the list parameter in an import action.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=120467196623452&amp;w=2">20080304 Minigal 2 critical XSS</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28098">28098</ref>
    </refs>
    <vuln_soft>
      <prod name="mg2" vendor="minigal">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1229" seq="2008-1229" published="2008-03-10" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Edit.jsp in JSPWiki 2.4.104 and 2.5.139 allows remote attackers to inject arbitrary web script or HTML via the editor parameter, a different vector than CVE-2007-5120.b.</descript>
    </desc>
    <sols>
      <sol source="nvd">Reference links suggest possible solution upgrade to latest version (2.6.1) at:
http://www.jspwiki.org/wiki/JSPWikiDownload</sol>
    </sols>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=120300554011544&amp;w=2">20080213 JSPWiki Multiple Vulnerabilities</ref>
      <ref source="MISC" url="http://www.bugsec.com/articles.php?Security=48&amp;Web-Application-Firewall=0">http://www.bugsec.com/articles.php?Security=48&amp;Web-Application-Firewall=0</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27785">27785</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40507">jspwiki-edit-xss(40507)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5112">5112</ref>
    </refs>
    <vuln_soft>
      <prod name="jspwiki" vendor="jspwiki">
        <vers num="2.4.104"/>
        <vers num="2.5.139"/>
        <vers num="2.5.139_beta"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1230" seq="2008-1230" published="2008-03-10" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unrestricted file upload vulnerability in JSPWiki 2.4.104 and 2.5.139 allows remote attackers to upload and execute arbitrary .jsp files via an unspecified manipulation that attaches a .jsp file to an "entry page."</descript>
    </desc>
    <sols>
      <sol source="nvd">Reference links suggest possible solution upgrade to latest version (2.6.1) at:
http://www.jspwiki.org/wiki/JSPWikiDownload</sol>
    </sols>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=120300554011544&amp;w=2">20080213 JSPWiki Multiple Vulnerabilities</ref>
      <ref source="MISC" url="http://www.bugsec.com/articles.php?Security=48&amp;Web-Application-Firewall=0">http://www.bugsec.com/articles.php?Security=48&amp;Web-Application-Firewall=0</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27785">27785</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40511">jspwiki-install-file-upload(40511)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5112">5112</ref>
    </refs>
    <vuln_soft>
      <prod name="jspwiki" vendor="jspwiki">
        <vers num="2.4.104"/>
        <vers num="2.5.139"/>
        <vers num="2.5.139_beta"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1231" seq="2008-1231" published="2008-03-10" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in Edit.jsp in JSPWiki 2.4.104 and 2.5.139 allows remote attackers to include and execute arbitrary local .jsp files, and obtain sensitive information, via a .. (dot dot) in the editor parameter.</descript>
    </desc>
    <sols>
      <sol source="nvd">Reference links suggest possible solution upgrade to latest version (2.6.1) at:
http://www.jspwiki.org/wiki/JSPWikiDownload</sol>
    </sols>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=120300554011544&amp;w=2">20080213 JSPWiki Multiple Vulnerabilities</ref>
      <ref source="MISC" url="http://www.bugsec.com/articles.php?Security=48&amp;Web-Application-Firewall=0">http://www.bugsec.com/articles.php?Security=48&amp;Web-Application-Firewall=0</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27785">27785</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40508">jspwiki-edit-file-include(40508)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5112">5112</ref>
    </refs>
    <vuln_soft>
      <prod name="jspwiki" vendor="jspwiki">
        <vers num="2.4.104"/>
        <vers num="2.5.139"/>
        <vers num="2.5.139_beta"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1232" seq="2008-1232" published="2008-08-03" modified="2019-03-25" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16 allows remote attackers to inject arbitrary web script or HTML via a crafted string that is used in the message argument to the HttpServletResponse.sendError method.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://community.ca.com/blogs/casecurityresponseblog/archive/2009/06/15/ca20090615-02-ca-service-desk-tomcat-cross-site-scripting-vulnerability.aspx">http://community.ca.com/blogs/casecurityresponseblog/archive/2009/06/15/ca20090615-02-ca-service-desk-tomcat-cross-site-scripting-vulnerability.aspx</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html">APPLE-SA-2008-10-09</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html">SUSE-SR:2008:018</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html">SUSE-SR:2009:004</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=123376588623823&amp;w=2">HPSBUX02401</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=139344343412337&amp;w=2">HPSBST02955</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/4098">4098</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3216">http://support.apple.com/kb/HT3216</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm">http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm</ref>
      <ref source="CONFIRM" url="http://tomcat.apache.org/security-4.html">http://tomcat.apache.org/security-4.html</ref>
      <ref source="CONFIRM" url="http://tomcat.apache.org/security-5.html">http://tomcat.apache.org/security-5.html</ref>
      <ref source="CONFIRM" url="http://tomcat.apache.org/security-6.html">http://tomcat.apache.org/security-6.html</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:188">MDVSA-2008:188</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0648.html">RHSA-2008:0648</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0862.html">RHSA-2008:0862</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0864.html">RHSA-2008:0864</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/495021/100/0/threaded">20080801 [CVE-2008-1232] Apache Tomcat XSS vulnerability</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/504351/100/0/threaded">20090616 CA20090615-02: CA Service Desk Tomcat Cross Site Scripting Vulnerability</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/505556/100/0/threaded">20090806 CA20090806-02: Security Notice for Unicenter Asset Portfolio Management, Unicenter Desktop and Server Management, Unicenter Patch Management</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/507985/100/0/threaded">20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30496" patch="1">30496</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/31681">31681</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020622">1020622</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2009-0002.html">http://www.vmware.com/security/advisories/VMSA-2009-0002.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2009-0016.html">http://www.vmware.com/security/advisories/VMSA-2009-0016.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2305">ADV-2008-2305</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2780">ADV-2008-2780</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2823">ADV-2008-2823</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/0320">ADV-2009-0320</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/0503">ADV-2009-0503</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/1609">ADV-2009-1609</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/2194">ADV-2009-2194</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/3316">ADV-2009-3316</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/44155">tomcat-httpservletresponse-xss(44155)</ref>
      <ref source="MLIST" url="https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E">[tomcat-dev] 20190319 svn commit: r1855831 [22/30] - in /tomcat/site/trunk: ./ docs/ xdocs/</ref>
      <ref source="MLIST" url="https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@%3Cdev.tomcat.apache.org%3E">[tomcat-dev] 20190319 svn commit: r1855831 [21/30] - in /tomcat/site/trunk: ./ docs/ xdocs/</ref>
      <ref source="MLIST" url="https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa@%3Cdev.tomcat.apache.org%3E">[tomcat-dev] 20190325 svn commit: r1856174 [20/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/</ref>
      <ref source="MLIST" url="https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74@%3Cdev.tomcat.apache.org%3E">[tomcat-dev] 20190325 svn commit: r1856174 [19/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11181">oval:org.mitre.oval:def:11181</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5985">oval:org.mitre.oval:def:5985</ref>
      <ref source="CONFIRM" url="https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=209500">https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=209500</ref>
      <ref source="CONFIRM" url="https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=214095">https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=214095</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00712.html">FEDORA-2008-7977</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00859.html">FEDORA-2008-8113</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00889.html">FEDORA-2008-8130</ref>
    </refs>
    <vuln_soft>
      <prod name="tomcat" vendor="apache">
        <vers num="4.1.0"/>
        <vers num="4.1.1"/>
        <vers num="4.1.2"/>
        <vers num="4.1.3"/>
        <vers num="4.1.10"/>
        <vers num="4.1.12"/>
        <vers num="4.1.15"/>
        <vers num="4.1.24"/>
        <vers num="4.1.28"/>
        <vers num="4.1.31"/>
        <vers num="4.1.36"/>
        <vers num="5.5.0"/>
        <vers num="5.5.1"/>
        <vers num="5.5.2"/>
        <vers num="5.5.10"/>
        <vers num="5.5.11"/>
        <vers num="5.5.12"/>
        <vers num="5.5.13"/>
        <vers num="5.5.14"/>
        <vers num="5.5.15"/>
        <vers num="5.5.16"/>
        <vers num="5.5.17"/>
        <vers num="5.5.18"/>
        <vers num="5.5.19"/>
        <vers num="5.5.20"/>
        <vers num="5.5.21"/>
        <vers num="5.5.22"/>
        <vers num="5.5.23"/>
        <vers num="5.5.24"/>
        <vers num="5.5.25"/>
        <vers num="6.0"/>
        <vers num="6.0.0"/>
        <vers num="6.0.1"/>
        <vers num="6.0.10"/>
        <vers num="6.0.11"/>
        <vers num="6.0.12"/>
        <vers num="6.0.13"/>
        <vers num="6.0.14"/>
        <vers num="6.0.15"/>
      </prod>
      <prod name="tomcat" vendor="apache_software_foundation">
        <vers num="4.1"/>
        <vers num="4.1.32"/>
        <vers num="4.1.34"/>
        <vers num="4.1.37"/>
        <vers num="5.5.26"/>
        <vers num="6.0.16"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1233" seq="2008-1233" published="2008-03-27" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allows remote attackers to execute arbitrary code via "XPCNativeWrapper pollution."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00002.html">SUSE-SA:2008:019</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2008-0208.html">RHSA-2008:0208</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1">238492</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-239546-1">239546</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1532">DSA-1532</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1534">DSA-1534</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1535">DSA-1535</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1574">DSA-1574</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml">GLSA-200805-18</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/466521">VU#466521</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:080">MDVSA-2008:080</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:155">MDVSA-2008:155</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/security/announce/2008/mfsa2008-14.html">http://www.mozilla.org/security/announce/2008/mfsa2008-14.html</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0207.html">RHSA-2008:0207</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0209.html">RHSA-2008:0209</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490196/100/0/threaded">20080327 rPSA-2008-0128-1 firefox</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28448">28448</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019694">1019694</ref>
      <ref source="SLACKWARE" url="http://www.slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.447313">SSA:2008-128-02</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-592-1">USN-592-1</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-605-1">USN-605-1</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-087A.html">TA08-087A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0998/references">ADV-2008-0998</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0999/references">ADV-2008-0999</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1793/references">ADV-2008-1793</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2091/references">ADV-2008-2091</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41443">mozilla-settimeout-code-execution(41443)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11078">oval:org.mitre.oval:def:11078</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00058.html">FEDORA-2008-3519</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00074.html">FEDORA-2008-3557</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="2.0.0.12" prev="1"/>
      </prod>
      <prod name="seamonkey" vendor="mozilla">
        <vers num="1.1.8" prev="1"/>
      </prod>
      <prod name="thunderbird" vendor="mozilla">
        <vers num="2.0.0.12" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1234" seq="2008-1234" published="2008-03-27" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allows remote attackers to inject arbitrary web script or HTML via event handlers, aka "Universal XSS using event handlers."</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00002.html">SUSE-SA:2008:019</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2008-0208.html">RHSA-2008:0208</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1">238492</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-239546-1">239546</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1532">DSA-1532</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1534">DSA-1534</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1535">DSA-1535</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1574">DSA-1574</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml">GLSA-200805-18</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/466521">VU#466521</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:080">MDVSA-2008:080</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:155">MDVSA-2008:155</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/security/announce/2008/mfsa2008-14.html">http://www.mozilla.org/security/announce/2008/mfsa2008-14.html</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0207.html">RHSA-2008:0207</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0209.html">RHSA-2008:0209</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490196/100/0/threaded">20080327 rPSA-2008-0128-1 firefox</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28448">28448</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019694">1019694</ref>
      <ref source="SLACKWARE" url="http://www.slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.447313">SSA:2008-128-02</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-592-1">USN-592-1</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-605-1">USN-605-1</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-087A.html">TA08-087A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0998/references">ADV-2008-0998</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0999/references">ADV-2008-0999</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1793/references">ADV-2008-1793</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2091/references">ADV-2008-2091</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41455">firefox-eventhandlers-xss(41455)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9551">oval:org.mitre.oval:def:9551</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00058.html">FEDORA-2008-3519</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00074.html">FEDORA-2008-3557</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="2.0.0.12" prev="1"/>
      </prod>
      <prod name="seamonkey" vendor="mozilla">
        <vers num="1.1.8" prev="1"/>
      </prod>
      <prod name="thunderbird" vendor="mozilla">
        <vers num="2.0.0.12" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1235" seq="2008-1235" published="2008-03-27" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allows remote attackers to execute arbitrary code via unknown vectors that cause JavaScript to execute with the wrong principal, aka "Privilege escalation via incorrect principals."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00002.html">SUSE-SA:2008:019</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2008-0208.html">RHSA-2008:0208</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1">238492</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-239546-1">239546</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1532">DSA-1532</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1534">DSA-1534</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1535">DSA-1535</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1574">DSA-1574</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml">GLSA-200805-18</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/466521">VU#466521</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:080">MDVSA-2008:080</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:155">MDVSA-2008:155</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/security/announce/2008/mfsa2008-14.html" adv="1" patch="1">http://www.mozilla.org/security/announce/2008/mfsa2008-14.html</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0207.html">RHSA-2008:0207</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0209.html">RHSA-2008:0209</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490196/100/0/threaded">20080327 rPSA-2008-0128-1 firefox</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28448">28448</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019694">1019694</ref>
      <ref source="SLACKWARE" url="http://www.slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.447313">SSA:2008-128-02</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-592-1">USN-592-1</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-605-1">USN-605-1</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-087A.html">TA08-087A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0998/references" adv="1">ADV-2008-0998</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0999/references" adv="1">ADV-2008-0999</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1793/references" adv="1">ADV-2008-1793</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2091/references">ADV-2008-2091</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41457">mozilla-principal-code-execution(41457)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10980">oval:org.mitre.oval:def:10980</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00058.html">FEDORA-2008-3519</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00074.html">FEDORA-2008-3557</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="0.1"/>
        <vers num="0.2"/>
        <vers num="0.4"/>
        <vers num="0.5"/>
        <vers num="0.6"/>
        <vers num="0.6.1"/>
        <vers num="0.7"/>
        <vers num="0.7.1"/>
        <vers num="0.8"/>
        <vers num="0.9"/>
        <vers num="0.9.1"/>
        <vers num="0.9.2"/>
        <vers num="0.9.3"/>
        <vers num="1.0" edition="preview_release"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.4"/>
        <vers num="1.0.5"/>
        <vers num="1.0.6"/>
        <vers num="1.0.7"/>
        <vers num="1.0.8"/>
        <vers num="1.5"/>
        <vers num="1.5.0.1"/>
        <vers num="1.5.0.2"/>
        <vers num="1.5.0.3"/>
        <vers num="1.5.0.4"/>
        <vers num="1.5.0.5"/>
        <vers num="1.5.0.6"/>
        <vers num="1.5.0.7"/>
        <vers num="1.5.0.8"/>
        <vers num="1.5.0.9"/>
        <vers num="1.5.0.10"/>
        <vers num="1.5.0.11"/>
        <vers num="1.5.0.12"/>
        <vers num="2.0"/>
        <vers num="2.0.0.1"/>
        <vers num="2.0.0.2"/>
        <vers num="2.0.0.3"/>
        <vers num="2.0.0.4"/>
        <vers num="2.0.0.5"/>
        <vers num="2.0.0.6"/>
        <vers num="2.0.0.7"/>
        <vers num="2.0.0.8"/>
        <vers num="2.0.0.9"/>
        <vers num="2.0.0.10"/>
        <vers num="2.0.0.11"/>
        <vers num="2.0.0.12" prev="1"/>
      </prod>
      <prod name="seamonkey" vendor="mozilla">
        <vers num="1.0" edition="alpha"/>
        <vers num="1.0" edition="beta"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.4"/>
        <vers num="1.0.5"/>
        <vers num="1.0.6"/>
        <vers num="1.0.7"/>
        <vers num="1.0.8"/>
        <vers num="1.0.9"/>
        <vers num="1.1" edition="alpha"/>
        <vers num="1.1" edition="beta"/>
        <vers num="1.1.1"/>
        <vers num="1.1.2"/>
        <vers num="1.1.3"/>
        <vers num="1.1.4"/>
        <vers num="1.1.5"/>
        <vers num="1.1.6"/>
        <vers num="1.1.7"/>
        <vers num="1.1.8" prev="1"/>
      </prod>
      <prod name="thunderbird" vendor="mozilla">
        <vers num="0.1"/>
        <vers num="0.2"/>
        <vers num="0.3"/>
        <vers num="0.4"/>
        <vers num="0.5"/>
        <vers num="0.6"/>
        <vers num="0.7"/>
        <vers num="0.8"/>
        <vers num="0.9"/>
        <vers num="1.0"/>
        <vers num="1.0.2"/>
        <vers num="1.0.4"/>
        <vers num="1.0.5"/>
        <vers num="1.0.6"/>
        <vers num="1.0.7"/>
        <vers num="1.0.8"/>
        <vers num="1.5"/>
        <vers num="1.5.0.2"/>
        <vers num="1.5.0.4"/>
        <vers num="1.5.0.5"/>
        <vers num="1.5.0.7"/>
        <vers num="1.5.0.8"/>
        <vers num="1.5.0.9"/>
        <vers num="1.5.0.10"/>
        <vers num="1.5.0.12"/>
        <vers num="1.5.0.13"/>
        <vers num="1.5.0.14"/>
        <vers num="2.0.0.0"/>
        <vers num="2.0.0.4"/>
        <vers num="2.0.0.5"/>
        <vers num="2.0.0.6"/>
        <vers num="2.0.0.9"/>
        <vers num="2.0.0.12" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1236" seq="2008-1236" published="2008-03-27" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors related to the layout engine.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00002.html">SUSE-SA:2008:019</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2008-0208.html">RHSA-2008:0208</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1">238492</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-239546-1">239546</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1532">DSA-1532</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1534">DSA-1534</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1535">DSA-1535</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1574">DSA-1574</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml">GLSA-200805-18</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:080">MDVSA-2008:080</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:155">MDVSA-2008:155</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/security/announce/2008/mfsa2008-15.html">http://www.mozilla.org/security/announce/2008/mfsa2008-15.html</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0207.html">RHSA-2008:0207</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0209.html">RHSA-2008:0209</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490196/100/0/threaded">20080327 rPSA-2008-0128-1 firefox</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28448">28448</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019695">1019695</ref>
      <ref source="SLACKWARE" url="http://www.slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.447313">SSA:2008-128-02</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-592-1">USN-592-1</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-605-1">USN-605-1</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-087A.html">TA08-087A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0998/references">ADV-2008-0998</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0999/references">ADV-2008-0999</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1793/references">ADV-2008-1793</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2091/references">ADV-2008-2091</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41445">mozilla-layoutengine-code-execution(41445)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11788">oval:org.mitre.oval:def:11788</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00058.html">FEDORA-2008-3519</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00074.html">FEDORA-2008-3557</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="2.0.0.12" prev="1"/>
      </prod>
      <prod name="seamonkey" vendor="mozilla">
        <vers num="1.1.8" prev="1"/>
      </prod>
      <prod name="thunderbird" vendor="mozilla">
        <vers num="2.0.0.12" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1237" seq="2008-1237" published="2008-03-27" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors related to the JavaScript engine.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00002.html">SUSE-SA:2008:019</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html">SUSE-SR:2008:011</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2008-0208.html">RHSA-2008:0208</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1">238492</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-239546-1">239546</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1532">DSA-1532</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1534">DSA-1534</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1535">DSA-1535</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1574">DSA-1574</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml">GLSA-200805-18</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:080">MDVSA-2008:080</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:155">MDVSA-2008:155</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/security/announce/2008/mfsa2008-15.html">http://www.mozilla.org/security/announce/2008/mfsa2008-15.html</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0207.html">RHSA-2008:0207</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0209.html">RHSA-2008:0209</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490196/100/0/threaded">20080327 rPSA-2008-0128-1 firefox</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28448">28448</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019695">1019695</ref>
      <ref source="SLACKWARE" url="http://www.slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.447313">SSA:2008-128-02</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-592-1">USN-592-1</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-605-1">USN-605-1</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-087A.html">TA08-087A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0998/references">ADV-2008-0998</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0999/references">ADV-2008-0999</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1793/references">ADV-2008-1793</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2091/references">ADV-2008-2091</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41446">firefox-javascript-engine-code-execution(41446)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9651">oval:org.mitre.oval:def:9651</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00058.html">FEDORA-2008-3519</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00074.html">FEDORA-2008-3557</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="2.0.0.12" prev="1"/>
      </prod>
      <prod name="seamonkey" vendor="mozilla">
        <vers num="1.1.8" prev="1"/>
      </prod>
      <prod name="thunderbird" vendor="mozilla">
        <vers num="2.0.0.12" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1238" seq="2008-1238" published="2008-03-27" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Mozilla Firefox before 2.0.0.13 and SeaMonkey before 1.1.9, when generating the HTTP Referer header, does not list the entire URL when it contains Basic Authentication credentials without a username, which makes it easier for remote attackers to bypass application protection mechanisms that rely on Referer headers, such as with some Cross-Site Request Forgery (CSRF) mechanisms.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00002.html">SUSE-SA:2008:019</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2008-0208.html">RHSA-2008:0208</ref>
      <ref source="MISC" url="http://sla.ckers.org/forum/read.php?10,20033">http://sla.ckers.org/forum/read.php?10,20033</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1">238492</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1532">DSA-1532</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1534">DSA-1534</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1535">DSA-1535</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml">GLSA-200805-18</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:080">MDVSA-2008:080</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/security/announce/2008/mfsa2008-16.html">http://www.mozilla.org/security/announce/2008/mfsa2008-16.html</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0207.html">RHSA-2008:0207</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0209.html">RHSA-2008:0209</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490196/100/0/threaded">20080327 rPSA-2008-0128-1 firefox</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28448">28448</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019703">1019703</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-592-1">USN-592-1</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-087A.html">TA08-087A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0998/references">ADV-2008-0998</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1793/references">ADV-2008-1793</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41449">mozilla-http-referrer-spoofing(41449)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9889">oval:org.mitre.oval:def:9889</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="2.0.0.12" prev="1"/>
      </prod>
      <prod name="seamonkey" vendor="mozilla">
        <vers num="1.1.8" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1240" seq="2008-1240" published="2008-03-27" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">LiveConnect in Mozilla Firefox before 2.0.0.13 and SeaMonkey before 1.1.9 does not properly parse the content origin for jar: URIs before sending them to the Java plugin, which allows remote attackers to access arbitrary ports on the local machine.  NOTE: this is closely related to CVE-2008-1195.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00002.html">SUSE-SA:2008:019</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1">238492</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1532">DSA-1532</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1534">DSA-1534</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1535">DSA-1535</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml">GLSA-200805-18</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:080">MDVSA-2008:080</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/security/announce/2008/mfsa2008-18.html">http://www.mozilla.org/security/announce/2008/mfsa2008-18.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490196/100/0/threaded">20080327 rPSA-2008-0128-1 firefox</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28448">28448</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-592-1">USN-592-1</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-087A.html">TA08-087A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0998/references">ADV-2008-0998</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1793/references">ADV-2008-1793</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41458">mozilla-liveconnect-unauthorized-access(41458)</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="2.0.0.12" prev="1"/>
      </prod>
      <prod name="seamonkey" vendor="mozilla">
        <vers num="1.1.8" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1241" seq="2008-1241" published="2008-03-27" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">GUI overlay vulnerability in Mozilla Firefox before 2.0.0.13 and SeaMonkey before 1.1.9 allows remote attackers to spoof form elements and redirect user inputs via a borderless XUL pop-up window from a background tab.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00002.html">SUSE-SA:2008:019</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2008-0208.html">RHSA-2008:0208</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1">238492</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1532">DSA-1532</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1534">DSA-1534</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1535">DSA-1535</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml">GLSA-200805-18</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:080">MDVSA-2008:080</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/security/announce/2008/mfsa2008-19.html">http://www.mozilla.org/security/announce/2008/mfsa2008-19.html</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0207.html">RHSA-2008:0207</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0209.html">RHSA-2008:0209</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490196/100/0/threaded">20080327 rPSA-2008-0128-1 firefox</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28448">28448</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019700">1019700</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-592-1">USN-592-1</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-087A.html">TA08-087A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0998/references">ADV-2008-0998</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1793/references">ADV-2008-1793</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41454">firefox-xul-popup-spoofing(41454)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11163">oval:org.mitre.oval:def:11163</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="2.0.0.12" prev="1"/>
      </prod>
      <prod name="seamonkey" vendor="mozilla">
        <vers num="1.1.8" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1242" seq="2008-1242" published="2008-03-10" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The control panel on the Belkin F5D7230-4 router with firmware 9.01.10 maintains authentication state by IP address, which allows remote attackers to bypass authentication by establishing a session from a source IP address of a previously authenticated user, a different vulnerability than CVE-2005-3802.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.gnucitizen.org/projects/router-hacking-challenge/">http://www.gnucitizen.org/projects/router-hacking-challenge/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489009/100/0/threaded">20080301 The Router Hacking Challenge is Over!</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28317">28317</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41120">belkin-f5d72304-security-bypass(41120)</ref>
    </refs>
    <vuln_soft>
      <prod name="f5d7230-4" vendor="belkin">
        <vers num="" edition=":9.01.10"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1243" seq="2008-1243" published="2008-03-10" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability on the Linksys WRT300N router with firmware 2.00.20, when Mozilla Firefox or Apple Safari is used, allows remote attackers to inject arbitrary web script or HTML via the dyndns_domain parameter to the default URI.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://code.bulix.org/cx46qa-65489">http://code.bulix.org/cx46qa-65489</ref>
      <ref source="MISC" url="http://code.bulix.org/koom78-65490">http://code.bulix.org/koom78-65490</ref>
      <ref source="MISC" url="http://www.gnucitizen.org/projects/router-hacking-challenge/">http://www.gnucitizen.org/projects/router-hacking-challenge/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489009/100/0/threaded">20080301 The Router Hacking Challenge is Over!</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41121">linksys-wrt300n-dyndnsdomain-xss(41121)</ref>
    </refs>
    <vuln_soft>
      <prod name="wrt300n" vendor="linksys">
        <vers num="" edition=":2.00.20"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1244" seq="2008-1244" published="2008-03-10" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">cgi-bin/setup_dns.exe on the Belkin F5D7230-4 router with firmware 9.01.10 does not require authentication, which allows remote attackers to perform administrative actions, as demonstrated by changing a DNS server via the dns1_1, dns1_2, dns1_3, and dns1_4 parameters.  NOTE: it was later reported that F5D7632-4V6 with firmware 6.01.08 is also affected.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.gnucitizen.org/projects/router-hacking-challenge/">http://www.gnucitizen.org/projects/router-hacking-challenge/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489009/100/0/threaded">20080301 The Router Hacking Challenge is Over!</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28319">28319</ref>
      <ref source="MISC" url="https://bugzilla.mozilla.org/show_bug.cgi?id=371598">https://bugzilla.mozilla.org/show_bug.cgi?id=371598</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41124">belkin-f5d72304-setupdns-security-bypass(41124)</ref>
    </refs>
    <vuln_soft>
      <prod name="f5d7230-4" vendor="belkin">
        <vers num="" edition=":9.01.10"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1245" seq="2008-1245" published="2008-03-10" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">cgi-bin/setup_virtualserver.exe on the Belkin F5D7230-4 router with firmware 9.01.10 allows remote attackers to cause a denial of service (control center outage) via an HTTP request with invalid POST data and a "Connection: Keep-Alive" header.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.gnucitizen.org/projects/router-hacking-challenge/">http://www.gnucitizen.org/projects/router-hacking-challenge/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489009/100/0/threaded">20080301 The Router Hacking Challenge is Over!</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28322">28322</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41116">belkin-f5d72304-setupvirtualserver-dos(41116)</ref>
    </refs>
    <vuln_soft>
      <prod name="f5d7230-4" vendor="belkin">
        <vers num="" edition=":9.01.10"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1246" seq="2008-1246" published="2008-03-10" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.1" CVSS_vector="(AV:L/AC:L/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">** DISPUTED **  The Cisco PIX/ASA Finesse Operation System 7.1 and 7.2 allows local users to gain privileges by entering characters at the enable prompt, erasing these characters via the Backspace key, and then holding down the Backspace key for one second after erasing the final character. NOTE: third parties, including one who works for the vendor, have been unable to reproduce the flaw unless the enable password is blank.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MISC" url="http://hackathology.blogspot.com/2008/01/pixasa-finesse-71-72-privilege.html">http://hackathology.blogspot.com/2008/01/pixasa-finesse-71-72-privilege.html</ref>
      <ref source="MISC" url="http://www.gnucitizen.org/projects/router-hacking-challenge/">http://www.gnucitizen.org/projects/router-hacking-challenge/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486938">20080124 PIX Privilege Escalation Vulnerability</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/486959">20080124 Re: PIX Privilege Escalation Vulnerability</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487051">20080125 Re: Re: PIX Privilege Escalation Vulnerability</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/487579">20080205 Re: Re: PIX Privilege Escalation Vulnerability</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489009/100/0/threaded">20080301 The Router Hacking Challenge is Over!</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27457">27457</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41129">cisco-pixasa-privilege-escalation(41129)</ref>
    </refs>
    <vuln_soft>
      <prod name="pix_asa_finesse_operation_system" vendor="cisco">
        <vers num="7.1"/>
        <vers num="7.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1247" seq="2008-1247" published="2008-03-10" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The web interface on the Linksys WRT54g router with firmware 1.00.9 does not require credentials when invoking scripts, which allows remote attackers to perform arbitrary administrative actions via a direct request to (1) Advanced.tri, (2) AdvRoute.tri, (3) Basic.tri, (4) ctlog.tri, (5) ddns.tri, (6) dmz.tri, (7) factdefa.tri, (8) filter.tri, (9) fw.tri, (10) manage.tri, (11) ping.tri, (12) PortRange.tri, (13) ptrigger.tri, (14) qos.tri, (15) rstatus.tri, (16) tracert.tri, (17) vpn.tri, (18) WanMac.tri, (19) WBasic.tri, or (20) WFilter.tri.  NOTE: the Security.tri vector is already covered by CVE-2006-5202.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://kinqpinz.info/lib/wrt54g/own.txt">http://kinqpinz.info/lib/wrt54g/own.txt</ref>
      <ref source="MISC" url="http://www.gnucitizen.org/projects/router-hacking-challenge/">http://www.gnucitizen.org/projects/router-hacking-challenge/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489009/100/0/threaded">20080301 The Router Hacking Challenge is Over!</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28381">28381</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41118">linksys-wrt54g-security-bypass(41118)</ref>
      <ref source="MISC" url="https://kinqpinz.info/lib/wrt54g/">https://kinqpinz.info/lib/wrt54g/</ref>
      <ref source="MISC" url="https://kinqpinz.info/lib/wrt54g/own2.txt">https://kinqpinz.info/lib/wrt54g/own2.txt</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5313">5313</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5926">5926</ref>
    </refs>
    <vuln_soft>
      <prod name="wrt54g" vendor="linksys">
        <vers num="" edition=":1.00.9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1248" seq="2008-1248" published="2008-03-10" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.8" CVSS_base_score="5.8" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:P)">
    <desc>
      <descript source="cve">The web interface on the central phone server for the Snom 320 SIP Phone allows remote attackers to make arbitrary phone calls via the "Call a number" field.  NOTE: this might overlap CVE-2007-3440.</descript>
    </desc>
    <loss_types>
      <avail/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.gnucitizen.org/projects/router-hacking-challenge/">http://www.gnucitizen.org/projects/router-hacking-challenge/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489009/100/0/threaded">20080301 The Router Hacking Challenge is Over!</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41171">snomsip-interface-unauth-access(41171)</ref>
    </refs>
    <vuln_soft>
      <prod name="320_sip_phone" vendor="snom">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1249" seq="2008-1249" published="2008-03-10" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.4" CVSS_base_score="9.4" CVSS_impact_subscore="9.2" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:C/A:C)">
    <desc>
      <descript source="cve">snomControl.swf in the central phone server for the Snom 320 SIP Phone allows remote attackers to cause a denial of service (application crash and corruption of call logs) via a "'); (double quote, quote, close parenthesis, semicolon) sequence in the "Call a number" field.</descript>
    </desc>
    <loss_types>
      <avail/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.gnucitizen.org/projects/router-hacking-challenge/">http://www.gnucitizen.org/projects/router-hacking-challenge/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489009/100/0/threaded">20080301 The Router Hacking Challenge is Over!</ref>
    </refs>
    <vuln_soft>
      <prod name="320_sip_phone" vendor="snom">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1250" seq="2008-1250" published="2008-03-10" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple cross-site request forgery (CSRF) vulnerabilities in the web interface on the central phone server for the Snom 320 SIP Phone allow remote attackers to perform actions as the phone user, as demonstrated by inserting an address-book entry containing an XSS sequence.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.gnucitizen.org/projects/router-hacking-challenge/">http://www.gnucitizen.org/projects/router-hacking-challenge/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489009/100/0/threaded">20080301 The Router Hacking Challenge is Over!</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27767">27767</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40500">snom-sipphone-addressbook-csrf(40500)</ref>
    </refs>
    <vuln_soft>
      <prod name="320_sip_phone" vendor="snom">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1251" seq="2008-1251" published="2008-03-10" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the web interface on the central phone server for the Snom 320 SIP Phone allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.gnucitizen.org/projects/router-hacking-challenge/">http://www.gnucitizen.org/projects/router-hacking-challenge/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489009/100/0/threaded">20080301 The Router Hacking Challenge is Over!</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27767">27767</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40499">snom-sipphone-addressbook-xss(40499)</ref>
    </refs>
    <vuln_soft>
      <prod name="320_sip_phone" vendor="snom">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1252" seq="2008-1252" published="2008-03-10" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">b_banner.stm (aka the login page) on the Deutsche Telekom Speedport W500 DSL router allows remote attackers to obtain the logon password by reading the pwd field in the HTML source.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.gnucitizen.org/projects/router-hacking-challenge/">http://www.gnucitizen.org/projects/router-hacking-challenge/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489009/100/0/threaded">20080301 The Router Hacking Challenge is Over!</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28382">28382</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41128">speedport-w500-bbanner-info-disclosure(41128)</ref>
    </refs>
    <vuln_soft>
      <prod name="speedport_w500_dsl_router" vendor="deutsche_telekom">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1253" seq="2008-1253" published="2008-03-10" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in cgi-bin/webcm on the D-Link DSL-G604T router allows remote attackers to inject arbitrary web script or HTML via the var:category parameter, as demonstrated by a request for advanced/portforw.htm on the fwan page.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.gnucitizen.org/projects/router-hacking-challenge/">http://www.gnucitizen.org/projects/router-hacking-challenge/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489009/100/0/threaded">20080301 The Router Hacking Challenge is Over!</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28439">28439</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41117">dlinkdslg604t-cgibinwebcm-xss(41117)</ref>
    </refs>
    <vuln_soft>
      <prod name="dsl-g604t" vendor="d-link">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1254" seq="2008-1254" published="2008-03-10" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple cross-site request forgery (CSRF) vulnerabilities on the ZyXEL P-660HW series router allow remote attackers to (1) change DNS servers and (2) add keywords to the "bannedlist" via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.gnucitizen.org/projects/router-hacking-challenge/">http://www.gnucitizen.org/projects/router-hacking-challenge/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489009/100/0/threaded">20080301 The Router Hacking Challenge is Over!</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41111">zyxel-p660hw-unspecified-csrf(41111)</ref>
    </refs>
    <vuln_soft>
      <prod name="p-660hw" vendor="zyxel">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1255" seq="2008-1255" published="2008-03-10" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The ZyXEL P-660HW series router maintains authentication state by IP address, which allows remote attackers to bypass authentication by establishing a session from a source IP address of a previously authenticated user.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.gnucitizen.org/projects/router-hacking-challenge/">http://www.gnucitizen.org/projects/router-hacking-challenge/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489009/100/0/threaded">20080301 The Router Hacking Challenge is Over!</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41114">zyxel-p660hw-ip-authentication-bypass(41114)</ref>
    </refs>
    <vuln_soft>
      <prod name="p-660hw" vendor="zyxel">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1256" seq="2008-1256" published="2008-03-10" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The ZyXEL P-660HW series router has "admin" as its default password, which allows remote attackers to gain administrative access.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.gnucitizen.org/projects/router-hacking-challenge/">http://www.gnucitizen.org/projects/router-hacking-challenge/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489009/100/0/threaded">20080301 The Router Hacking Challenge is Over!</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41108">zyxel-p660hw-default-password(41108)</ref>
    </refs>
    <vuln_soft>
      <prod name="p-660hw" vendor="zyxel">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1257" seq="2008-1257" published="2008-03-10" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Forms/DiagGeneral_2 on the ZyXEL P-660HW series router allows remote attackers to inject arbitrary web script or HTML via the PingIPAddr parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.gnucitizen.org/projects/router-hacking-challenge/">http://www.gnucitizen.org/projects/router-hacking-challenge/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489009/100/0/threaded">20080301 The Router Hacking Challenge is Over!</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41109">zyxel-p660hw-diaggeneral-xss(41109)</ref>
    </refs>
    <vuln_soft>
      <prod name="p-660hw" vendor="zyxel">
        <vers num="_t1" edition="-"/>
        <vers num="_t1" edition="v2"/>
      </prod>
      <prod name="p-660hw_d1" vendor="zyxel">
        <vers num="-"/>
        <vers num="v2"/>
      </prod>
      <prod name="p-660hw_d3" vendor="zyxel">
        <vers num="-"/>
      </prod>
      <prod name="p-660hw_t3" vendor="zyxel">
        <vers num="-"/>
        <vers num="v2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1258" seq="2008-1258" published="2008-03-10" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in prim.htm on the D-Link DI-604 router allows remote attackers to inject arbitrary web script or HTML via the rf parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.gnucitizen.org/projects/router-hacking-challenge/">http://www.gnucitizen.org/projects/router-hacking-challenge/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489009/100/0/threaded">20080301 The Router Hacking Challenge is Over!</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28439">28439</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41122">dlink-di604-prim-xss(41122)</ref>
    </refs>
    <vuln_soft>
      <prod name="di-604" vendor="d-link">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1259" seq="2008-1259" published="2008-03-10" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The Zyxel P-2602HW-D1A router with 3.40(AJZ.1) firmware maintains authentication state by IP address, which allows remote attackers to bypass authentication by establishing a session from a source IP address of a user who previously authenticated within the previous 5 minutes.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.gnucitizen.org/projects/router-hacking-challenge/">http://www.gnucitizen.org/projects/router-hacking-challenge/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489009/100/0/threaded">20080301 The Router Hacking Challenge is Over!</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41112">zyxel-ipaddress-authentication-bypass(41112)</ref>
    </refs>
    <vuln_soft>
      <prod name="p-2602hw-d1a" vendor="zyxel">
        <vers num="" edition=":3.40%28ajz.1%29"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1260" seq="2008-1260" published="2008-03-10" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site request forgery (CSRF) vulnerabilities on the Zyxel P-2602HW-D1A router with 3.40(AJZ.1) firmware allow remote attackers to (1) make the admin web server available on the Internet (WAN) interface via the WWWAccessInterface parameter to Forms/RemMagWWW_1 or (2) change the IP whitelisting timeout via the StdioTimout parameter to Forms/rpSysAdmin_1.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.gnucitizen.org/projects/router-hacking-challenge/">http://www.gnucitizen.org/projects/router-hacking-challenge/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489009/100/0/threaded">20080301 The Router Hacking Challenge is Over!</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41170">zyxel-p2602hw-multiple-csrf(41170)</ref>
    </refs>
    <vuln_soft>
      <prod name="p-2602hw-d1a" vendor="zyxel">
        <vers num="" edition=":3.40%28ajz.1%29"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1261" seq="2008-1261" published="2008-03-10" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The Zyxel P-2602HW-D1A router with 3.40(AJZ.1) firmware provides different responses to admin page requests depending on whether a user is logged in, which allows remote attackers to obtain current login status by requesting an arbitrary admin URI.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.gnucitizen.org/projects/router-hacking-challenge/">http://www.gnucitizen.org/projects/router-hacking-challenge/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489009/100/0/threaded">20080301 The Router Hacking Challenge is Over!</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41113">zyxel-p2602hwd1a-loginstatus-info-disclosure(41113)</ref>
    </refs>
    <vuln_soft>
      <prod name="p-2602hw-d1a" vendor="zyxel">
        <vers num="3.40(ajz.1)"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1262" seq="2008-1262" published="2008-03-10" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The administration panel on the Airspan WiMax ProST 4.1 antenna with 6.5.38.0 software does not verify authentication credentials, which allows remote attackers to (1) upload malformed firmware or (2) bind the antenna to a different WiMAX base station via unspecified requests to forms under process_adv/.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://airspan4wimax.googlepages.com/">http://airspan4wimax.googlepages.com/</ref>
      <ref source="MISC" url="http://www.0x000000.com/?i=524">http://www.0x000000.com/?i=524</ref>
      <ref source="MISC" url="http://www.gnucitizen.org/projects/router-hacking-challenge/">http://www.gnucitizen.org/projects/router-hacking-challenge/</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/248372">VU#248372</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489009/100/0/threaded">20080301 The Router Hacking Challenge is Over!</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28122">28122</ref>
      <ref source="CONFIRM" url="http://www.sharemethods.net/nepal/servlet/open?keeppath=false&amp;aid=29820">http://www.sharemethods.net/nepal/servlet/open?keeppath=false&amp;aid=29820</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0802/references">ADV-2008-0802</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41052">wimaxprost-webinterface-security-bypass(41052)</ref>
    </refs>
    <vuln_soft>
      <prod name="wimax_prost" vendor="airspan">
        <vers num="4.1" edition=":6.5.38.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1263" seq="2008-1263" published="2008-03-10" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.0" CVSS_base_score="4.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The Linksys WRT54G router stores passwords and keys in cleartext in the Config.bin file, which might allow remote authenticated users to obtain sensitive information via an HTTP request for the top-level Config.bin URI.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.gnucitizen.org/projects/router-hacking-challenge/">http://www.gnucitizen.org/projects/router-hacking-challenge/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489009/100/0/threaded">20080301 The Router Hacking Challenge is Over!</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41115">linksys-config-information-disclosure(41115)</ref>
    </refs>
    <vuln_soft>
      <prod name="wrt54g" vendor="linksys">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1264" seq="2008-1264" published="2008-03-10" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The Linksys WRT54G router has "admin" as its default FTP password, which allows remote attackers to access sensitive files including nvram.cfg, a file that lists all HTML documents, and an ELF executable file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.gnucitizen.org/projects/router-hacking-challenge/">http://www.gnucitizen.org/projects/router-hacking-challenge/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489009/100/0/threaded">20080301 The Router Hacking Challenge is Over!</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41126">linksys-wrt54g-ftp-default-password(41126)</ref>
    </refs>
    <vuln_soft>
      <prod name="wrt54g" vendor="linksys">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1265" seq="2008-1265" published="2008-03-10" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">The Linksys WRT54G router allows remote attackers to cause a denial of service (device restart) via a long username and password to the FTP interface.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.gnucitizen.org/projects/router-hacking-challenge/">http://www.gnucitizen.org/projects/router-hacking-challenge/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489009/100/0/threaded">20080301 The Router Hacking Challenge is Over!</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41127">linksys-wrt54g-ftp-dos(41127)</ref>
    </refs>
    <vuln_soft>
      <prod name="wrt54g" vendor="linksys">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1266" seq="2008-1266" published="2008-03-10" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Multiple buffer overflows in the web interface on the D-Link DI-524 router allow remote attackers to cause a denial of service (device crash) or possibly have unspecified other impact via (1) a long username or (2) an HTTP header with a large name and an empty value.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.gnucitizen.org/projects/router-hacking-challenge/">http://www.gnucitizen.org/projects/router-hacking-challenge/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489009/100/0/threaded">20080301 The Router Hacking Challenge is Over!</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28439">28439</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41125">dlink-di524-interface-dos(41125)</ref>
    </refs>
    <vuln_soft>
      <prod name="di-524" vendor="d-link">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1267" seq="2008-1267" published="2008-03-10" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">The Siemens SpeedStream 6520 router allows remote attackers to cause a denial of service (web interface crash) via an HTTP request to basehelp_English.htm with a large integer in the Content-Length field.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.gnucitizen.org/projects/router-hacking-challenge/">http://www.gnucitizen.org/projects/router-hacking-challenge/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489009/100/0/threaded">20080301 The Router Hacking Challenge is Over!</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28490">28490</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41123">speedstream-basehelpenglish-dos(41123)</ref>
    </refs>
    <vuln_soft>
      <prod name="speedstream_6520" vendor="siemens">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1268" seq="2008-1268" published="2008-03-10" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The FTP server on the Linksys WRT54G 7 router with 7.00.1 firmware does not verify authentication credentials, which allows remote attackers to establish an FTP session by sending an arbitrary username and password.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://swbae.egloos.com/1701135">http://swbae.egloos.com/1701135</ref>
      <ref source="MISC" url="http://www.gnucitizen.org/projects/router-hacking-challenge/">http://www.gnucitizen.org/projects/router-hacking-challenge/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489009/100/0/threaded">20080301 The Router Hacking Challenge is Over!</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41119">linksys-wrt54g-ftp-security-bypass(41119)</ref>
    </refs>
    <vuln_soft>
      <prod name="wrt54g" vendor="linksys">
        <vers num="7" edition=":7.00.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1269" seq="2008-1269" published="2008-03-10" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.1" CVSS_base_score="7.1" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:N/A:N)">
    <desc>
      <descript source="cve">cp06_wifi_m_nocifr.cgi in the admin panel on the Alice Gate 2 Plus Wi-Fi router does not verify authentication credentials, which allows remote attackers to disable Wi-Fi encryption via a certain request.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://vx.netlux.org/wargamevx/alice_gate2_pluswifi_PoC.zip">http://vx.netlux.org/wargamevx/alice_gate2_pluswifi_PoC.zip</ref>
      <ref source="MISC" url="http://www.gnucitizen.org/projects/router-hacking-challenge/">http://www.gnucitizen.org/projects/router-hacking-challenge/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489009/100/0/threaded">20080301 The Router Hacking Challenge is Over!</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41110">alicegate2pluswifi-admin-security-bypass(41110)</ref>
    </refs>
    <vuln_soft>
      <prod name="gate2_plus_wi-fi" vendor="alice">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1270" seq="2008-1270" published="2008-03-10" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">mod_userdir in lighttpd 1.4.18 and earlier, when userdir.path is not set, uses a default of $HOME, which might allow remote attackers to read arbitrary files, as demonstrated by accessing the ~nobody directory.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00005.html">SUSE-SR:2008:008</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200804-08.xml">GLSA-200804-08</ref>
      <ref source="CONFIRM" url="http://trac.lighttpd.net/trac/ticket/1587">http://trac.lighttpd.net/trac/ticket/1587</ref>
      <ref source="MISC" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0106">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0106</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1521">DSA-1521</ref>
      <ref source="CONFIRM" url="http://www.lighttpd.net/2008/3/10/1-4-19-made-in-germany">http://www.lighttpd.net/2008/3/10/1-4-19-made-in-germany</ref>
      <ref source="CONFIRM" url="http://www.lighttpd.net/security/lighttpd_sa_2008_03.txt">http://www.lighttpd.net/security/lighttpd_sa_2008_03.txt</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489465/100/0/threaded">20080312 rPSA-2008-0106-1 lighttpd</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28226">28226</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0885/references">ADV-2008-0885</ref>
      <ref source="CONFIRM" url="https://bugs.gentoo.org/show_bug.cgi?id=212930">https://bugs.gentoo.org/show_bug.cgi?id=212930</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41173">lighttpd-moduserdir-information-disclosure(41173)</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2344">https://issues.rpath.com/browse/RPL-2344</ref>
    </refs>
    <vuln_soft>
      <prod name="lighttpd" vendor="lighttpd">
        <vers num="1.4.18" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1271" seq="2008-1271" published="2008-03-10" modified="2008-03-12" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2008-1218.  Reason: This candidate is a duplicate of CVE-2008-1218.  Notes: All CVE users should reference CVE-2008-1218 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2008-1272" seq="2008-1272" published="2008-03-10" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in BM Classifieds 20080309 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) cat parameter to showad.php and the (2) ad parameter to pfriendly.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28159">28159</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41066">bmclassifieds-showad-sql-injection(41066)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5223">5223</ref>
    </refs>
    <vuln_soft>
      <prod name="bm_classifieds" vendor="bmscripts">
        <vers num="20080309" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1273" seq="2008-1273" published="2008-03-10" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in imageVue 1.7 allow remote attackers to inject arbitrary web script or HTML via the path parameter to (1) popup.php, (2) test/dir2.php, (3) admin/upload.php, and (4) dirxml.php in upload/.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://downloads.securityfocus.com/vulnerabilities/exploits/28138.html">http://downloads.securityfocus.com/vulnerabilities/exploits/28138.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28138">28138</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41169">imagevue-path-xss(41169)</ref>
    </refs>
    <vuln_soft>
      <prod name="imagevue" vendor="imagevue">
        <vers num="1.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1274" seq="2008-1274" published="2008-03-10" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.9" CVSS_base_score="6.9" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Untrusted search path vulnerability in man in IBM AIX 6.1.0 allows local users to execute arbitrary code via a malicious program in the man directory.</descript>
      <descript source="nvd">Per: http://cwe.mitre.org/data/definitions/426.html 
'CWE-426: Untrusted Search Path'</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28180">28180</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019572">1019572</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0805/references" adv="1">ADV-2008-0805</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/search.wss?rs=0&amp;q=IZ17177&amp;apar=only">IZ17177</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41067">ibm-aix-man-privilege-escalation(41067)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5169">oval:org.mitre.oval:def:5169</ref>
    </refs>
    <vuln_soft>
      <prod name="aix" vendor="ibm">
        <vers num="6.1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1275" seq="2008-1275" published="2008-03-10" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Multiple unspecified vulnerabilities in the SMTP service in MailEnable Standard Edition 1.x, Professional Edition 3.x and earlier, and Enterprise Edition 3.x and earlier allow remote attackers to cause a denial of service (crash) via crafted (1) EXPN or (2) VRFY commands.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.mailenable.com/hotfix/" patch="1">http://www.mailenable.com/hotfix/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28154" patch="1">28154</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0800/references">ADV-2008-0800</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41083">mailenable-expn-vrfy-dos(41083)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5235">5235</ref>
    </refs>
    <vuln_soft>
      <prod name="mailenable_enterprise" vendor="mailenable">
        <vers num="3.0" prev="1"/>
      </prod>
      <prod name="mailenable_professional" vendor="mailenable">
        <vers num="3.0" prev="1"/>
      </prod>
      <prod name="mailenable_standard" vendor="mailenable">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1276" seq="2008-1276" published="2008-03-10" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.0" CVSS_base_score="9.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple buffer overflows in the IMAP service (MEIMAPS.EXE) in MailEnable Professional Edition and Enterprise Edition 3.13 and earlier allow remote authenticated attackers to execute arbitrary code via long arguments to the (1) FETCH, (2) EXAMINE, and (3) UNSUBSCRIBE commands.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/maildisable-adv.txt">http://aluigi.altervista.org/adv/maildisable-adv.txt</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3724">3724</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489270/100/0/threaded">20080307 Multiple vulnerabilities in MailEnable Professional/Enterprise 3.13</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28145">28145</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019565">1019565</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0799/references">ADV-2008-0799</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41058">mailenable-imapservice-bo(41058)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5249">5249</ref>
    </refs>
    <vuln_soft>
      <prod name="mailenable_enterprise" vendor="mailenable">
        <vers num="3.13" prev="1"/>
      </prod>
      <prod name="mailenable_professional" vendor="mailenable">
        <vers num="3.13" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1277" seq="2008-1277" published="2008-03-10" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.0" CVSS_base_score="9.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The IMAP service (MEIMAPS.exe) in MailEnable Professional Edition and Enterprise Edition 3.13 and earlier allows remote attackers to cause a denial of service (crash) via (1) SEARCH and (2) APPEND commands without required arguments, which triggers a NULL pointer dereference.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/maildisable-adv.txt">http://aluigi.altervista.org/adv/maildisable-adv.txt</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3724">3724</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489270/100/0/threaded">20080307 Multiple vulnerabilities in MailEnable Professional/Enterprise 3.13</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28145">28145</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019565">1019565</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0799/references">ADV-2008-0799</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41059">mailenable-imapservice-dos(41059)</ref>
    </refs>
    <vuln_soft>
      <prod name="mailenable_enterprise" vendor="mailenable">
        <vers num="3.13" prev="1"/>
      </prod>
      <prod name="mailenable_professional" vendor="mailenable">
        <vers num="3.13" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1278" seq="2008-1278" published="2008-03-10" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The RemotelyAnywhere.exe service in the Remotely Anywhere Server and Workstation 8.0.668 and earlier allows remote attackers to cause a denial of service (crash) via an invalid Accept-Charset header, which triggers a NULL pointer dereference.  NOTE: the service is automatically restarted.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/remotelynowhere-adv.txt">http://aluigi.altervista.org/adv/remotelynowhere-adv.txt</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489354/100/0/threaded">20080310 NULL pointer in Remotely Anywhere 8.0.668</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28175">28175</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0816/references">ADV-2008-0816</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41077">remotelyanywhere-http-dos(41077)</ref>
    </refs>
    <vuln_soft>
      <prod name="remotelyanywhere" vendor="remotelyanywhere">
        <vers num="8.0.668" prev="1" edition=":server"/>
        <vers num="8.0.668" prev="1" edition=":workstation"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1279" seq="2008-1279" published="2008-03-10" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Acronis True Image Group Server 1.5.19.191 and earlier, included in Acronis True Image Enterprise Server 9.5.0.8072 and the other True Image packages, allows remote attackers to cause a denial of service (crash) via a packet with an invalid length field, which causes an out-of-bounds read.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/acrogroup-adv.txt">http://aluigi.altervista.org/adv/acrogroup-adv.txt</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489353/100/0/threaded">20080310 Invalid memory access in Acronis True Image Group Server 1.5.19.191</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28169">28169</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0813/references">ADV-2008-0813</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41071">acronis-groupserver-dos(41071)</ref>
    </refs>
    <vuln_soft>
      <prod name="true_image" vendor="acronis">
        <vers num="1.5.19.191" prev="1" edition=":group_server"/>
        <vers num="9.5.0.8072" prev="1" edition=":enterprise_server"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1280" seq="2008-1280" published="2008-03-10" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Acronis True Image Windows Agent 1.0.0.54 and earlier, included in Acronis True Image Enterprise Server 9.5.0.8072 and the other True Image packages, allows remote attackers to cause a denial of service (crash) via a malformed packet to port 9876, which triggers a NULL pointer dereference.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/acroagent-adv.txt">http://aluigi.altervista.org/adv/acroagent-adv.txt</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489362/100/0/threaded">20080310 NULL pointer in Acronis True Image Windows Agent 1.0.0.54</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28169">28169</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0812/references">ADV-2008-0812</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41070">acronis-windows-agent-dos(41070)</ref>
    </refs>
    <vuln_soft>
      <prod name="true_image" vendor="acronis">
        <vers num="9.5.0.8072" prev="1"/>
      </prod>
      <prod name="true_image_windows_agent" vendor="acronis">
        <vers num="1.0.0.54" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1281" seq="2008-1281" published="2008-03-10" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in TFTPsrvs.exe 2.5.3.1 and earlier, as used in Argon Technology Client Management Services (CMS) 1.31 and earlier, allows remote attackers to read arbitrary files via a .. (dot dot) in the filename parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/argonauti-adv.txt">http://aluigi.altervista.org/adv/argonauti-adv.txt</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489363/100/0/threaded">20080310 Directory traversal in Argon Client Management Services 1.31</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28160">28160</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0815/references">ADV-2008-0815</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41076">argoncms-tftpsrvs-directory-traversal(41076)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5230">5230</ref>
    </refs>
    <vuln_soft>
      <prod name="client_management_services" vendor="argontechnology">
        <vers num="1.31" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1282" seq="2008-1282" published="2008-03-10" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the BFup ActiveX control (BFup.dll) in B21Soft BFup before 1.0.802.29 allows remote attackers to execute arbitrary code via a long FilePath parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="JVN" url="http://jvn.jp/jp/JVN%2310606373/index.html">JVN#10606373</ref>
      <ref source="CONFIRM" url="http://www.hi-ho.ne.jp/babaq/bfupinfo.html">http://www.hi-ho.ne.jp/babaq/bfupinfo.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28131">28131</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0797/references">ADV-2008-0797</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41050">bfup-activex-bo(41050)</ref>
    </refs>
    <vuln_soft>
      <prod name="bfup" vendor="b21soft">
        <vers num="1.0.308_19" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1283" seq="2008-1283" published="2008-03-10" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Neptune Web Server 3.0 allows remote attackers to inject arbitrary web script or HTML via the URI, which is not properly handled in the 404 error page.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3725">3725</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489282/100/0/threaded">20080307 XSS in Neptune Web Server</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28148">28148</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41089">neptune-webserver-404errorpage-xss(41089)</ref>
    </refs>
    <vuln_soft>
      <prod name="neptune_web_server" vendor="silver-forge">
        <vers num="3.0" edition=":professional"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1284" seq="2008-1284" published="2008-03-10" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.0" CVSS_base_score="6.0" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="6.8" CVSS_vector="(AV:N/AC:M/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in Horde 3.1.6, Groupware before 1.0.5, and Groupware Webmail Edition before 1.0.6, when running with certain configurations, allows remote authenticated users to read and execute arbitrary files via ".." sequences and a null byte in the theme name.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MLIST" url="http://lists.horde.org/archives/announce/2008/000382.html" patch="1">[announce] 20080307 Horde 3.1.7 (final)</ref>
      <ref source="MLIST" url="http://lists.horde.org/archives/announce/2008/000383.html">[announce] 20080307  Horde Groupware 1.0.5 (final)</ref>
      <ref source="MLIST" url="http://lists.horde.org/archives/announce/2008/000384.html">[announce] 20080307  Horde Groupware Webmail Edition 1.0.6 (final)</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200805-01.xml">GLSA-200805-01</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3726">3726</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1519">DSA-1519</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489239/100/0/threaded">20080307 Horde Webmail file inclusion proof of concept &amp; patch.</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489289/100/0/threaded">20080308 Re: Horde Webmail file inclusion proof of concept &amp; patch.</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28153" patch="1">28153</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0822/references">ADV-2008-0822</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41054">horde-theme-file-include(41054)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00253.html">FEDORA-2008-2362</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00301.html">FEDORA-2008-2406</ref>
    </refs>
    <vuln_soft>
      <prod name="groupware" vendor="horde">
        <vers num="1.0.4" prev="1"/>
      </prod>
      <prod name="groupware_webmail_edition" vendor="horde">
        <vers num="1.0.5" prev="1"/>
      </prod>
      <prod name="horde" vendor="horde">
        <vers num="3.1.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1285" seq="2008-1285" published="2008-03-11" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Sun Java Server Faces (JSF) 1.2 before 1.2_08 allows remote attackers to inject arbitrary web script or HTML via unknown vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2008-0825.html">RHSA-2008:0825</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2008-0826.html">RHSA-2008:0826</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2008-0827.html">RHSA-2008:0827</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2008-0828.html">RHSA-2008:0828</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-233561-1" patch="1">233561</ref>
      <ref source="CONFIRM" url="http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.2.0.cp03/html-single/readme/index.html">http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.2.0.cp03/html-single/readme/index.html</ref>
      <ref source="CONFIRM" url="http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.3.0.cp01/html-single/readme/">http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.3.0.cp01/html-single/readme/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28192">28192</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020628">1020628</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0808/references">ADV-2008-0808</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=437082">https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=437082</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41081">sun-jsf-routines-xss(41081)</ref>
      <ref source="CONFIRM" url="https://jira.jboss.org/jira/browse/JBPAPP-682">https://jira.jboss.org/jira/browse/JBPAPP-682</ref>
    </refs>
    <vuln_soft>
      <prod name="jsf" vendor="sun">
        <vers num="1.2_07" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1286" seq="2008-1286" published="2008-03-11" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:N/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Sun Java Web Console 3.0.2, 3.0.3, and 3.0.4 allows remote attackers to bypass intended access restrictions and determine the existence of files or directories via unknown vectors.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-231526-1" patch="1">231526</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28155" patch="1">28155</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019574">1019574</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0806/references">ADV-2008-0806</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41069">sun-javawebconsole-information-disclosure(41069)</ref>
    </refs>
    <vuln_soft>
      <prod name="java_web_console" vendor="sun">
        <vers num="3.0.2"/>
        <vers num="3.0.3"/>
        <vers num="3.0.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1287" seq="2008-1287" published="2008-03-11" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">IBM Rational ClearQuest 7.0.1.1 and 7.0.0.2 generates different error messages depending on whether the username is valid or invalid, which allows remote attackers to enumerate usernames.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28132" patch="1">28132</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019566">1019566</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0804/references" adv="1">ADV-2008-0804</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/docview.wss?uid=swg1PK55561" patch="1">PK55561</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41042">clearquest-username-information-disclosure(41042)</ref>
    </refs>
    <vuln_soft>
      <prod name="rational_clearquest" vendor="ibm">
        <vers num="7.0.0.2"/>
        <vers num="7.0.1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1288" seq="2008-1288" published="2008-03-11" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">IBM Rational ClearQuest 7.0.1.1 and 7.0.0.2 might allow local or remote attackers to obtain sensitive information about users by reading user cookies.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28133" patch="1">28133</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019567">1019567</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0804/references">ADV-2008-0804</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/docview.wss?uid=swg1PK55753" patch="1">PK55753</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41043">clearquest-cookie-information-disclosure(41043)</ref>
    </refs>
    <vuln_soft>
      <prod name="rational_clearquest" vendor="ibm">
        <vers num="7.0.0.2"/>
        <vers num="7.0.1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1289" seq="2008-1289" published="2008-03-24" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple buffer overflows in Asterisk Open Source 1.4.x before 1.4.18.1 and 1.4.19-rc3, Open Source 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6.1, AsteriskNOW 1.0.x before 1.0.2, Appliance Developer Kit before 1.4 revision 109386, and s800i 1.1.x before 1.1.0.2 allow remote attackers to (1) write a zero to an arbitrary memory location via a large RTP payload number, related to the ast_rtp_unset_m_type function in main/rtp.c; or (2) write certain integers to an arbitrary memory location via a large number of RTP payloads, related to the process_sdp function in channels/chan_sip.c.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://downloads.digium.com/pub/security/AST-2008-002.html">http://downloads.digium.com/pub/security/AST-2008-002.html</ref>
      <ref source="MISC" url="http://labs.musecurity.com/advisories/MU-200803-01.txt">http://labs.musecurity.com/advisories/MU-200803-01.txt</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3763">3763</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019628">1019628</ref>
      <ref source="CONFIRM" url="http://www.asterisk.org/node/48466">http://www.asterisk.org/node/48466</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489817/100/0/threaded">20080318 AST-2008-002: Two buffer overflows in RTP Codec Payload Handling</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28308">28308</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0928">ADV-2008-0928</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41302">asterisk-rtppayload-bo(41302)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41305">asterisk-rtp-codecpayload-bo(41305)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html">FEDORA-2008-2554</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html">FEDORA-2008-2620</ref>
    </refs>
    <vuln_soft>
      <prod name="asterisk_appliance_developer_kit" vendor="asterisk">
        <vers num="1.4"/>
      </prod>
      <prod name="asterisk_business_edition" vendor="asterisk">
        <vers num="c.1.0-beta8" prev="1"/>
        <vers num="c.1.0beta7" prev="1"/>
      </prod>
      <prod name="asterisknow" vendor="asterisk">
        <vers num="1.0.1" prev="1"/>
      </prod>
      <prod name="open_source" vendor="asterisk">
        <vers num="1.4.18" prev="1"/>
        <vers num="1.4.19" prev="1" edition="rc-2"/>
        <vers num="1.6.0_beta5" prev="1"/>
      </prod>
      <prod name="s800i" vendor="asterisk">
        <vers num="1.1.0.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1290" seq="2008-1290" published="2008-03-24" modified="2009-08-20" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">ViewVC before 1.0.5 includes "all-forbidden" files within search results that list CVS or Subversion (SVN) commits, which allows remote attackers to obtain sensitive information.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=471380">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=471380</ref>
      <ref source="CONFIRM" url="http://bugs.gentoo.org/show_bug.cgi?id=212288">http://bugs.gentoo.org/show_bug.cgi?id=212288</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200803-29.xml">GLSA-200803-29</ref>
      <ref source="CONFIRM" url="http://viewvc.tigris.org/source/browse/viewvc/trunk/CHANGES?rev=HEAD">http://viewvc.tigris.org/source/browse/viewvc/trunk/CHANGES?rev=HEAD</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28055" patch="1">28055</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0734/references">ADV-2008-0734</ref>
    </refs>
    <vuln_soft>
      <prod name="viewvc" vendor="viewvc">
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1291" seq="2008-1291" published="2008-03-24" modified="2009-08-20" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">ViewVC before 1.0.5 stores sensitive information under the web root with insufficient access control, which allows remote attackers to read files and list folders under the hidden CVSROOT folder.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=471380">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=471380</ref>
      <ref source="CONFIRM" url="http://bugs.gentoo.org/show_bug.cgi?id=212288">http://bugs.gentoo.org/show_bug.cgi?id=212288</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200803-29.xml">GLSA-200803-29</ref>
      <ref source="CONFIRM" url="http://viewvc.tigris.org/source/browse/viewvc/trunk/CHANGES?rev=HEAD">http://viewvc.tigris.org/source/browse/viewvc/trunk/CHANGES?rev=HEAD</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28055" patch="1">28055</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0734/references">ADV-2008-0734</ref>
    </refs>
    <vuln_soft>
      <prod name="viewvc" vendor="viewvc">
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1292" seq="2008-1292" published="2008-03-24" modified="2009-08-20" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">ViewVC before 1.0.5 provides revision metadata without properly checking whether access was intended, which allows remote attackers to obtain sensitive information by reading (1) forbidden pathnames in the revision view, (2) log history that can only be reached by traversing a forbidden object, or (3) forbidden diff view path parameters.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=471380">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=471380</ref>
      <ref source="CONFIRM" url="http://bugs.gentoo.org/show_bug.cgi?id=212288">http://bugs.gentoo.org/show_bug.cgi?id=212288</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200803-29.xml">GLSA-200803-29</ref>
      <ref source="CONFIRM" url="http://viewvc.tigris.org/source/browse/viewvc/trunk/CHANGES?rev=HEAD">http://viewvc.tigris.org/source/browse/viewvc/trunk/CHANGES?rev=HEAD</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28055" patch="1">28055</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0734/references">ADV-2008-0734</ref>
    </refs>
    <vuln_soft>
      <prod name="viewvc" vendor="viewvc">
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1293" seq="2008-1293" published="2008-04-29" modified="2018-10-03" severity="Medium" CVSS_version="2.0" CVSS_score="4.8" CVSS_base_score="4.8" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="6.5" CVSS_vector="(AV:A/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">ldm in Linux Terminal Server Project (LTSP) 0.99 and 2 passes the -ac option to the X server on each LTSP client, which allows remote attackers to connect to this server via TCP port 6006 (aka display :6).</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local_network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=469462">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=469462</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1561">DSA-1561</ref>
      <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/03/11/2">[oss-security] 20080311 CVE request: insecure X11 handling in ltsp</ref>
      <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/03/12/3">[oss-security] 20080312 Re: CVE request: insecure X11 handling in ltsp</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28960">28960</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019940">1019940</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42080">ltsp-ldm-weak-security(42080)</ref>
      <ref source="UBUNTU" url="https://usn.ubuntu.com/610-1/">USN-610-1</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_terminal_server_project" vendor="ltsp">
        <vers num="0.99"/>
        <vers num="2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1294" seq="2008-1294" published="2008-05-02" modified="2018-10-30" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Linux kernel 2.6.17, and other versions before 2.6.22, does not check when a user attempts to set RLIMIT_CPU to 0 until after the change is made, which allows local users to bypass intended resource limits.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.gentoo.org/show_bug.cgi?id=215000">http://bugs.gentoo.org/show_bug.cgi?id=215000</ref>
      <ref source="MISC" url="http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=9926e4c74300c4b31dee007298c6475d33369df0">http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=9926e4c74300c4b31dee007298c6475d33369df0</ref>
      <ref source="CONFIRM" url="http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22">http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1565">DSA-1565</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0612.html">RHSA-2008:0612</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29004">29004</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-618-1">USN-618-1</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42145">linux-kernel-rlimitcpu-security-bypass(42145)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10974">oval:org.mitre.oval:def:10974</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.6.2" edition="rc1"/>
        <vers num="2.6.2" edition="rc2"/>
        <vers num="2.6.2" edition="rc3"/>
        <vers num="2.6.16" edition="rc1"/>
        <vers num="2.6.16" edition="rc2"/>
        <vers num="2.6.16" edition="rc3"/>
        <vers num="2.6.16" edition="rc4"/>
        <vers num="2.6.16" edition="rc5"/>
        <vers num="2.6.16" edition="rc6"/>
        <vers num="2.6.16.1"/>
        <vers num="2.6.16.2"/>
        <vers num="2.6.16.3"/>
        <vers num="2.6.16.4"/>
        <vers num="2.6.16.5"/>
        <vers num="2.6.16.6"/>
        <vers num="2.6.16.7"/>
        <vers num="2.6.16.8"/>
        <vers num="2.6.16.9"/>
        <vers num="2.6.16.10"/>
        <vers num="2.6.16.11"/>
        <vers num="2.6.16.12"/>
        <vers num="2.6.16.13"/>
        <vers num="2.6.16.14"/>
        <vers num="2.6.16.15"/>
        <vers num="2.6.16.16"/>
        <vers num="2.6.16.17"/>
        <vers num="2.6.16.18"/>
        <vers num="2.6.16.19"/>
        <vers num="2.6.16.20"/>
        <vers num="2.6.16.21"/>
        <vers num="2.6.16.22"/>
        <vers num="2.6.16.23"/>
        <vers num="2.6.16.24"/>
        <vers num="2.6.16.25"/>
        <vers num="2.6.16.26"/>
        <vers num="2.6.16.27"/>
        <vers num="2.6.16.28"/>
        <vers num="2.6.16.29"/>
        <vers num="2.6.16.30"/>
        <vers num="2.6.16.31"/>
        <vers num="2.6.16.32"/>
        <vers num="2.6.16.33"/>
        <vers num="2.6.16.34"/>
        <vers num="2.6.16.35"/>
        <vers num="2.6.16.36"/>
        <vers num="2.6.16.37"/>
        <vers num="2.6.16.38"/>
        <vers num="2.6.16.39"/>
        <vers num="2.6.16.40"/>
        <vers num="2.6.16.41"/>
        <vers num="2.6.16.43"/>
        <vers num="2.6.16.44"/>
        <vers num="2.6.16.45"/>
        <vers num="2.6.16.46"/>
        <vers num="2.6.16.47"/>
        <vers num="2.6.16.48"/>
        <vers num="2.6.16.49"/>
        <vers num="2.6.16.50"/>
        <vers num="2.6.16.51"/>
        <vers num="2.6.16.52"/>
        <vers num="2.6.16.53"/>
        <vers num="2.6.16_rc7"/>
        <vers num="2.6.17" edition="rc1"/>
        <vers num="2.6.17" edition="rc2"/>
        <vers num="2.6.17" edition="rc3"/>
        <vers num="2.6.17" edition="rc4"/>
        <vers num="2.6.17" edition="rc5"/>
        <vers num="2.6.17" edition="rc6"/>
        <vers num="2.6.17.1"/>
        <vers num="2.6.17.2"/>
        <vers num="2.6.17.3"/>
        <vers num="2.6.17.4"/>
        <vers num="2.6.17.5"/>
        <vers num="2.6.17.6"/>
        <vers num="2.6.17.7"/>
        <vers num="2.6.17.8"/>
        <vers num="2.6.17.9"/>
        <vers num="2.6.17.10"/>
        <vers num="2.6.17.11"/>
        <vers num="2.6.17.12"/>
        <vers num="2.6.17.13"/>
        <vers num="2.6.17.14"/>
        <vers num="2.6.18" edition="rc1"/>
        <vers num="2.6.18" edition="rc2"/>
        <vers num="2.6.18" edition="rc3"/>
        <vers num="2.6.18" edition="rc4"/>
        <vers num="2.6.18" edition="rc5"/>
        <vers num="2.6.18" edition="rc6"/>
        <vers num="2.6.18" edition="rc7"/>
        <vers num="2.6.18.1"/>
        <vers num="2.6.18.2"/>
        <vers num="2.6.18.3"/>
        <vers num="2.6.18.4"/>
        <vers num="2.6.18.5"/>
        <vers num="2.6.18.6"/>
        <vers num="2.6.18.7"/>
        <vers num="2.6.18.8"/>
        <vers num="2.6.19" edition="rc1"/>
        <vers num="2.6.19" edition="rc2"/>
        <vers num="2.6.19" edition="rc3"/>
        <vers num="2.6.19" edition="rc4"/>
        <vers num="2.6.19.1"/>
        <vers num="2.6.19.2"/>
        <vers num="2.6.19.3"/>
        <vers num="2.6.20" edition="rc2"/>
        <vers num="2.6.20.1"/>
        <vers num="2.6.20.2"/>
        <vers num="2.6.20.3"/>
        <vers num="2.6.20.4"/>
        <vers num="2.6.20.5"/>
        <vers num="2.6.20.6"/>
        <vers num="2.6.20.7"/>
        <vers num="2.6.20.8"/>
        <vers num="2.6.20.9"/>
        <vers num="2.6.20.10"/>
        <vers num="2.6.20.11"/>
        <vers num="2.6.20.12"/>
        <vers num="2.6.20.13"/>
        <vers num="2.6.20.14"/>
        <vers num="2.6.20.15"/>
        <vers num="2.6.21" prev="1" edition="git1"/>
        <vers num="2.6.21" prev="1" edition="git2"/>
        <vers num="2.6.21" prev="1" edition="git3"/>
        <vers num="2.6.21" prev="1" edition="git4"/>
        <vers num="2.6.21" prev="1" edition="git5"/>
        <vers num="2.6.21" prev="1" edition="git6"/>
        <vers num="2.6.21" prev="1" edition="git7"/>
        <vers num="2.6.21" prev="1" edition="rc3"/>
        <vers num="2.6.21" prev="1" edition="rc4"/>
        <vers num="2.6.21" prev="1" edition="rc5"/>
        <vers num="2.6.21" prev="1" edition="rc6"/>
        <vers num="2.6.21" prev="1" edition="rc7"/>
        <vers num="2.6.21.1"/>
        <vers num="2.6.21.2"/>
        <vers num="2.6.21.3"/>
        <vers num="2.6.21.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1295" seq="2008-1295" published="2008-03-12" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in archives.php in Gregory Kokanosky (aka Greg's Place) phpMyNewsletter 0.8 beta 5 and earlier allows remote attackers to execute arbitrary SQL commands via the msg_id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28189">28189</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41197">phpmynewsletter-archives-sql-injection(41197)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5231">5231</ref>
    </refs>
    <vuln_soft>
      <prod name="phpmynewsletter" vendor="gregory_kokanosky">
        <vers num="0.8_beta_5" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1296" seq="2008-1296" published="2008-03-12" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in EncapsGallery 1.11.2 allow remote attackers to inject arbitrary web script or HTML via the file parameter to (1) watermark.php and (2) catalog_watermark.php in core/.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28178">28178</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41164">encapsgallery-file-xss(41164)</ref>
    </refs>
    <vuln_soft>
      <prod name="encapsgallery" vendor="encaps">
        <vers num="1.11.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1297" seq="2008-1297" published="2008-03-12" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the eWriting (com_ewriting) 1.2.1 module for Mambo and Joomla! allows remote attackers to execute arbitrary SQL commands via the cat parameter in a selectcat action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28179">28179</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41072">ewriting-cat-sql-injection(41072)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5226">5226</ref>
    </refs>
    <vuln_soft>
      <prod name="ewriting" vendor="ewriting">
        <vers num="1.2.1"/>
      </prod>
      <prod name="com_ewriting" vendor="joomla">
        <vers num="1.2.1"/>
      </prod>
      <prod name="com_ewriting" vendor="mambo">
        <vers num="1.2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1298" seq="2008-1298" published="2008-03-12" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in Hadith module for PHP-Nuke allows remote attackers to execute arbitrary SQL commands via the cat parameter in a viewcat action to modules.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3730">3730</ref>
      <ref source="MISC" url="http://www.rbt-4.net/forum/viewthread.php?forum_id=51&amp;thread_id=3078">http://www.rbt-4.net/forum/viewthread.php?forum_id=51&amp;thread_id=3078</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489323/100/0/threaded">20080308 PHP-Nuke SQL injection Module "Hadith" [cat]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28171">28171</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41092">hadith-cat-sql-injection(41092)</ref>
    </refs>
    <vuln_soft>
      <prod name="hadith_module" vendor="kyantonius">
        <vers num=""/>
      </prod>
      <prod name="hadith_module" vendor="php-nuke">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1299" seq="2008-1299" published="2008-03-12" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in SolutionSearch.do in ManageEngine ServiceDesk Plus 7.0.0 Build 7011 for Windows allows remote attackers to inject arbitrary web script or HTML via the searchText parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28191">28191</ref>
    </refs>
    <vuln_soft>
      <prod name="servicedesk_plus" vendor="manageengine">
        <vers num="7.0.0" edition="build_7011"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1300" seq="2008-1300" published="2008-03-12" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the Logfile Viewer Settings function in system/workplace/admin/workplace/logfileview/logfileViewSettings.jsp in Alkacon OpenCms 7.0.3 and 7.0.4 allows remote attackers to inject arbitrary web script or HTML via the filePath.0 parameter in a save action, a different vector than CVE-2008-1045.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3731">3731</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489291/100/0/threaded">20080308 Alkacon OpenCms logfileViewSettings.jsp XSS, file disclosure</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28152">28152</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41095">opencms-logfileviewsettings-xss(41095)</ref>
    </refs>
    <vuln_soft>
      <prod name="opencms" vendor="alkacon">
        <vers num="7.0.3"/>
        <vers num="7.0.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1301" seq="2008-1301" published="2008-03-12" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.0" CVSS_base_score="4.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Absolute path traversal vulnerability in system/workplace/admin/workplace/logfileview/logfileViewSettings.jsp in Alkacon OpenCms 7.0.3 and 7.0.4 allows remote authenticated administrators to read arbitrary files via a full pathname in the filePath.0 parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3731">3731</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489291/100/0/threaded">20080308 Alkacon OpenCms logfileViewSettings.jsp XSS, file disclosure</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28152">28152</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41096">opencms-logfileviewsettings-info-disclosure(41096)</ref>
    </refs>
    <vuln_soft>
      <prod name="opencms" vendor="alkacon">
        <vers num="7.0.3"/>
        <vers num="7.0.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1302" seq="2008-1302" published="2008-03-12" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The Perforce service (p4s.exe) in Perforce Server 2007.3/143793 and earlier allows remote attackers to cause a denial of service (daemon crash) via a (1) server-DiffFile or (2) server-ReleaseFile command with a large integer value, which is used in an array initialization calculation, and leads to invalid memory access.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/perforces-adv.txt">http://aluigi.altervista.org/adv/perforces-adv.txt</ref>
      <ref source="MISC" url="http://aluigi.org/poc/perforces.zip">http://aluigi.org/poc/perforces.zip</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3735">3735</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489179/100/0/threaded">20080305 Multiple vulnerabilities in Perforce Server 2007.3/143793</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28108">28108</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41016">perforceserver-invalid-memory-dos(41016)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41363">perforce-server-p4sexe-dos(41363)</ref>
    </refs>
    <vuln_soft>
      <prod name="perforce_server" vendor="perforce">
        <vers num="2007.3_143793" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1303" seq="2008-1303" published="2008-03-12" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The Perforce service (p4s.exe) in Perforce Server 2007.3/143793 and earlier allows remote attackers to cause a denial of service (daemon crash) via a missing parameter to the (1) dm-FaultFile, (2) dm-LazyCheck, (3) dm-ResolvedFile, (4) dm-OpenFile, (5) crypto, and possibly unspecified other commands, which triggers a NULL pointer dereference.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/perforces-adv.txt">http://aluigi.altervista.org/adv/perforces-adv.txt</ref>
      <ref source="MISC" url="http://aluigi.org/poc/perforces.zip">http://aluigi.org/poc/perforces.zip</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3735">3735</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489179/100/0/threaded">20080305 Multiple vulnerabilities in Perforce Server 2007.3/143793</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28108">28108</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41015">perforceserver-multiple-commands-dos(41015)</ref>
    </refs>
    <vuln_soft>
      <prod name="perforce_server" vendor="perforce">
        <vers num="2000.1"/>
        <vers num="2000.2"/>
        <vers num="2001.1"/>
        <vers num="2001.2"/>
        <vers num="2002.1"/>
        <vers num="2002.2"/>
        <vers num="2003.1"/>
        <vers num="2003.2"/>
        <vers num="2004.2"/>
        <vers num="2005.1"/>
        <vers num="2005.2"/>
        <vers num="2006.1"/>
        <vers num="2006.2"/>
        <vers num="2007.2"/>
        <vers num="2007.3"/>
        <vers num="2007.3_143793" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1304" seq="2008-1304" published="2008-03-12" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in WordPress 2.3.2 allow remote attackers to inject arbitrary web script or HTML via the (1) inviteemail parameter in an invite action to wp-admin/users.php and the (2) to parameter in a sent action to wp-admin/invites.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3732">3732</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019564">1019564</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489241/100/0/threaded">20080307 WordPress Multiple Cross-Site Scripting Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28139">28139</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41055">wordpress-users-xss(41055)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41056">wordpress-invites-xss(41056)</ref>
    </refs>
    <vuln_soft>
      <prod name="wordpress" vendor="wordpress">
        <vers num="2.3.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1305" seq="2008-1305" published="2008-03-12" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in filebase.php in the Filebase mod for phpBB allows remote attackers to execute arbitrary SQL commands via the id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28194">28194</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41137">phpbb-filebase-sql-injection(41137)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5236">5236</ref>
    </refs>
    <vuln_soft>
      <prod name="filebase_module" vendor="chieminger">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1306" seq="2008-1306" published="2008-03-12" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in Savvy Content Manager (CM) allow remote attackers to inject arbitrary web script or HTML via the searchterms parameter to (1) searchresults.cfm, (2) search_results.cfm, and (3) search_results/index.cfm.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.besavvy.com/blog/index.cfm/2008/3/11/Security-Patch">http://www.besavvy.com/blog/index.cfm/2008/3/11/Security-Patch</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28200">28200</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41342">savvy-searchterms-xss(41342)</ref>
    </refs>
    <vuln_soft>
      <prod name="savvy_content_manager" vendor="besavvy">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1307" seq="2008-1307" published="2008-03-12" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in the KUpdateObj2 Class ActiveX control in UpdateOcx2.dll in Beijing KingSoft Antivirus Online Update Module 2007.12.29.29 allows remote attackers to execute arbitrary code via a long argument to the SetUninstallName method.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28172">28172</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0857/references">ADV-2008-0857</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41088">kingsoft-updateocx2-bo(41088)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5225">5225</ref>
    </refs>
    <vuln_soft>
      <prod name="antivirus_online_update_module" vendor="kingsoft">
        <vers num="2007.12.29.29"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1308" seq="2008-1308" published="2008-03-12" modified="2019-07-01" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the Sudirman Angriawan NukeC30 3.0 module for PHP-Nuke allows remote attackers to execute arbitrary SQL commands via the id_catg parameter in a ViewCatg action to modules.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3733">3733</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489387/100/0/threaded">20080311 PHP-Nuke Module NukeC30 sql injection</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28197">28197</ref>
    </refs>
    <vuln_soft>
      <prod name="nukec30" vendor="sudirman_angriawan">
        <vers num="3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1309" seq="2008-1309" published="2008-03-12" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The RealAudioObjects.RealAudio ActiveX control in rmoc3260.dll in RealNetworks RealPlayer Enterprise, RealPlayer 10, RealPlayer 10.5 before build 6.0.12.1675, and RealPlayer 11 before 11.0.3 build 6.0.14.806 does not properly manage memory for the (1) Console or (2) Controls property, which allows remote attackers to execute arbitrary code or cause a denial of service (browser crash) via a series of assignments of long string values, which triggers an overwrite of freed heap memory.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2008-March/060659.html">20080310 Real Networks RealPlayer ActiveX Control Heap Corruption</ref>
      <ref source="CONFIRM" url="http://service.real.com/realplayer/security/07252008_player/en/" adv="1">http://service.real.com/realplayer/security/07252008_player/en/</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/831457">VU#831457</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/494779/100/0/threaded">20080725 ZDI-08-047: RealNetworks RealPlayer rmoc3260 ActiveX Control Memory Corruption Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28157">28157</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019576">1019576</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020563">1020563</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0842" adv="1">ADV-2008-0842</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2194/references" adv="1">ADV-2008-2194</ref>
      <ref source="MISC" url="http://www.zerodayinitiative.com/advisories/ZDI-08-047/">http://www.zerodayinitiative.com/advisories/ZDI-08-047/</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41087">realplayer-realaudioobjects-code-execution(41087)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5332">5332</ref>
    </refs>
    <vuln_soft>
      <prod name="realplayer" vendor="realnetworks">
        <vers num="" edition=":enterprise"/>
        <vers num="10.0"/>
        <vers num="10.5"/>
        <vers num="11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1310" seq="2008-1310" published="2008-03-12" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in the TFTP server in PacketTrap Networks pt360 Tool Suite 1.1.33.1.0, and other versions before 2.0.3900.0, allows remote attackers to read and overwrite arbitrary files via directory traversal sequences in the pathname.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=120457602310315&amp;w=2">20080303 DDIVRT-2008-10 PacketTrap TFTP Directory Traversal Vulnerability</ref>
      <ref source="MISC" url="http://packetstorm.linuxsecurity.com/0803-advisories/DDIVRT-2008-10.txt">http://packetstorm.linuxsecurity.com/0803-advisories/DDIVRT-2008-10.txt</ref>
      <ref source="MISC" url="http://www.emediawire.com/releases/2008/2/prweb731563.htm">http://www.emediawire.com/releases/2008/2/prweb731563.htm</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28078">28078</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40979">pt360-tftpserver-directory-traversal(40979)</ref>
    </refs>
    <vuln_soft>
      <prod name="pt360_tool_suite" vendor="packettrap">
        <vers num="1.1.33.1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1311" seq="2008-1311" published="2008-03-12" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The TFTP server in PacketTrap pt360 Tool Suite PRO 2.0.3901.0 and earlier allows remote attackers to cause a denial of service (daemon hang) by uploading a file named (1) '|' (pipe), (2) '"' (quotation mark), or (3) "&lt;&gt;" (less than, greater than); or (4) a file with a long name.  NOTE: the issue for vector 4 might exist because of an incomplete fix for CVE-2008-1312.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/packettrash-adv.txt">http://aluigi.altervista.org/adv/packettrash-adv.txt</ref>
      <ref source="MISC" url="http://aluigi.org/testz/tftpx.zip">http://aluigi.org/testz/tftpx.zip</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3734">3734</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489355/100/0/threaded">20080310 Denial of Service in PacketTrap TFTP server 2.0.3901.0</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28187">28187</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0811/references">ADV-2008-0811</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41073">pt360-tftpserver-filename-dos(41073)</ref>
    </refs>
    <vuln_soft>
      <prod name="pt360_tool_suite_pro" vendor="packettrap">
        <vers num="2.0.3901.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1312" seq="2008-1312" published="2008-03-12" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the TFTP server in PacketTrap Networks pt360 Tool Suite 1.1.33.1.0, and other versions before 2.0.3900.0, allows remote attackers to cause a denial of service (daemon crash) via a long TFTP packet, a different vulnerability than CVE-2008-1311.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=120457979416868&amp;w=2">20080303 DDIVRT-2008-09 PacketTrap PT360 Tool Suite TFTP Denial of Service Vulnerability</ref>
      <ref source="MISC" url="http://packetstorm.linuxsecurity.com/0803-advisories/DDIVRT-2008-09.txt">http://packetstorm.linuxsecurity.com/0803-advisories/DDIVRT-2008-09.txt</ref>
      <ref source="CONFIRM" url="http://www.emediawire.com/releases/2008/2/prweb731563.htm">http://www.emediawire.com/releases/2008/2/prweb731563.htm</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28079">28079</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41267">pt360-tftpserver-unspecified-dos(41267)</ref>
    </refs>
    <vuln_soft>
      <prod name="pt360_tool_suite" vendor="packettrap">
        <vers num="1.1.33.1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1313" seq="2008-1313" published="2008-03-12" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in index.php in Bloo 1.00 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) post_id, (2) post_category_id, (3) post_year_month, and (4) static_page_id parameters; and unspecified other vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28203">28203</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41141">bloo-index-sql-injection(41141)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5234">5234</ref>
    </refs>
    <vuln_soft>
      <prod name="bloo" vendor="bill_roberts">
        <vers num="1.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1314" seq="2008-1314" published="2008-03-12" modified="2019-07-01" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the Johannes Hass gaestebuch 2.2 module for PHP-Nuke allows remote attackers to execute arbitrary SQL commands via the id parameter in an edit action to modules.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://cod3rz.helloweb.eu/exploits/gaestebuch.txt">http://cod3rz.helloweb.eu/exploits/gaestebuch.txt</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=120440053123054&amp;w=2">20080301 PHP-Nuke Copyright 2005 SQL</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28063">28063</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40975">gaestebuch-id-sql-injection(40975)</ref>
    </refs>
    <vuln_soft>
      <prod name="gaestebuch_module" vendor="johannes_hass">
        <vers num="2.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1315" seq="2008-1315" published="2008-03-13" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the ZClassifieds module for PHP-Nuke allows remote attackers to execute arbitrary SQL commands via the cat parameter to modules.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3736">3736</ref>
      <ref source="MISC" url="http://www.rbt-4.net/forum/viewthread.php?forum_id=51&amp;thread_id=3109">http://www.rbt-4.net/forum/viewthread.php?forum_id=51&amp;thread_id=3109</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489416/100/0/threaded">20080311 PHP-Nuke Module ZClassifieds [cat] SQL Injection</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28211">28211</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41149">zclassifieds-modules-sql-injection(41149)</ref>
    </refs>
    <vuln_soft>
      <prod name="zclassifieds" vendor="php-nuke">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1316" seq="2008-1316" published="2008-03-13" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in qtf_ind_search_ov.php in QT-cute QuickTalk Forum 1.6 and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28215">28215</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41148">quicktalkforum-id-sql-injection(41148)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5240">5240</ref>
    </refs>
    <vuln_soft>
      <prod name="quicktalk_forum" vendor="qt-cute">
        <vers num="1.3"/>
        <vers num="1.4"/>
        <vers num="1.5.0.3"/>
        <vers num="1.6" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1317" seq="2008-1317" published="2008-03-13" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.9" CVSS_base_score="4.9" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Inter-Process Communication (IPC) message queue subsystem in Sun Solaris 10 allows local users to cause a denial of service (reboot) via blocked I/O message queues.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-231403-1" patch="1">231403</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28214" patch="1">28214</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0858/references">ADV-2008-0858</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41146">sun-solaris-ipc-dos(41146)</ref>
    </refs>
    <vuln_soft>
      <prod name="solaris" vendor="sun">
        <vers num="10" edition=":sparc"/>
        <vers num="10" edition=":x86"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1318" seq="2008-1318" published="2008-03-13" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in MediaWiki 1.11 before 1.11.2 allows remote attackers to obtain sensitive "cross-site" information via the callback parameter in an API call for JavaScript Object Notation (JSON) formatted results.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MLIST" url="http://lists.wikimedia.org/pipermail/mediawiki-announce/2008-March/000070.html" patch="1">[MediaWiki-announce] 20080307 MediaWiki 1.11.2 released (security)</ref>
      <ref source="CONFIRM" url="http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_11_2/phase3/RELEASE-NOTES">http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_11_2/phase3/RELEASE-NOTES</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28070" patch="1">28070</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019535">1019535</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0732/references" adv="1">ADV-2008-0732</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40960">mediawiki-jsoncallbacks-info-disclosure(40960)</ref>
    </refs>
    <vuln_soft>
      <prod name="mediawiki" vendor="mediawiki">
        <vers num="1.11"/>
        <vers num="1.11.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1319" seq="2008-1319" published="2008-03-13" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Untrusted search path and argument injection vulnerability in the VersantD service in Versant Object Database 7.0.1.3 and earlier, as used in Borland CaliberRM and probably other products, allows remote attackers to execute arbitrary commands via a request to TCP port 5019 with a modified VERSANT_ROOT field.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/versantcmd-adv.txt">http://aluigi.altervista.org/adv/versantcmd-adv.txt</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=120468784112145&amp;w=2">20080304 Arbitrary commands execution in Versant Object Database 7.0.1.3</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3738">3738</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489139/100/0/threaded">20080304 Arbitrary commands execution in Versant Object Database 7.0.1.3</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28097">28097</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0764/references">ADV-2008-0764</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40997">objectdatabase-versantd-cmd-execution(40997)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5213">5213</ref>
    </refs>
    <vuln_soft>
      <prod name="versant_object_database" vendor="versant">
        <vers num="7.0.1"/>
        <vers num="7.0.1.3" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1320" seq="2008-1320" published="2008-03-13" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple buffer overflows in ASG-Sentry Network Manager 7.0.0 and earlier allow remote attackers to execute arbitrary code or cause a denial of service (crash) via (1) a long request to FxIAList on TCP port 6162, or (2) an SNMP request with a long community string to FxAgent on UDP port 6161.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/asgulo-adv.txt">http://aluigi.altervista.org/adv/asgulo-adv.txt</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3737">3737</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489359/100/0/threaded">20080310 Multiple vulnerabilities in ASG-Sentry 7.0.0</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28188">28188</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0839/references">ADV-2008-0839</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41082">asgsentry-fxagent-bo(41082)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41086">asgsentry-fxialist-bo(41086)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5229">5229</ref>
    </refs>
    <vuln_soft>
      <prod name="asg-sentry" vendor="asg">
        <vers num="7.0.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1321" seq="2008-1321" published="2008-03-13" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The FxIAList service in ASG-Sentry Network Manager 7.0.0 and earlier does require authentication, which allows remote attackers to cause a denial of service (service termination) via the exit command to TCP port 6162, or have other impacts via other commands.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/asgulo-adv.txt">http://aluigi.altervista.org/adv/asgulo-adv.txt</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3737">3737</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489359/100/0/threaded">20080310 Multiple vulnerabilities in ASG-Sentry 7.0.0</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28188">28188</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0839/references">ADV-2008-0839</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41084">asgsentry-fxialist-weak-security(41084)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5229">5229</ref>
    </refs>
    <vuln_soft>
      <prod name="asg-sentry" vendor="asg-sentry">
        <vers num="7.0.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1322" seq="2008-1322" published="2008-03-13" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">The File Check Utility (fcheck.exe) in ASG-Sentry Network Manager 7.0.0 and earlier allows remote attackers to cause a denial of service (CPU consumption) or overwrite arbitrary files via a query string that specifies the -b option, probably due to an argument injection vulnerability.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/asgulo-adv.txt">http://aluigi.altervista.org/adv/asgulo-adv.txt</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3737">3737</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489359/100/0/threaded">20080310 Multiple vulnerabilities in ASG-Sentry 7.0.0</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28188">28188</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0839/references">ADV-2008-0839</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41080">asgsentry-fcheck-dos(41080)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5229">5229</ref>
    </refs>
    <vuln_soft>
      <prod name="asg-sentry" vendor="asg-sentry">
        <vers num="7.0.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1323" seq="2008-1323" published="2008-03-13" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site request forgery (CSRF) vulnerability in index.php in WoltLab Burning Board Lite (wBB) 2 Beta 1 allows remote attackers to delete threads as other users via the ThreadDelete action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3739">3739</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489294/100/0/threaded">20080308 WoltLab Burning Board Lite 2 Beta 1 Thread Delete CSRF Vulnerability</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41098">woltlabburningboard-index-csrf(41098)</ref>
    </refs>
    <vuln_soft>
      <prod name="burning_board_lite" vendor="woltlab">
        <vers num="2.0" edition="beta_1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1324" seq="2008-1324" published="2008-03-13" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple directory traversal vulnerabilities in index.php in Travelsized CMS 0.4.1 allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the (1) page_id and (2) language parameters.  NOTE: this might be the same issue as CVE-2008-1325.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3740">3740</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489457/100/0/threaded">20080311 travelsized cms 0.4.1 multiple local file inclusion vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28218">28218</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41168">travelsized-index-file-include(41168)</ref>
    </refs>
    <vuln_soft>
      <prod name="travelsized_cms" vendor="leinir">
        <vers num="0.4.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1325" seq="2008-1325" published="2008-03-13" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple directory traversal vulnerabilities in index.php in Uberghey CMS 0.3.1 allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the (1) page_id and (2) language parameters.  NOTE: this might be the same issue as CVE-2008-1324.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489451/100/0/threaded">20080311 uberghey cms 0.3.1 multiple local file inclusion vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28217">28217</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41151">uberghey-index-file-include(41151)</ref>
    </refs>
    <vuln_soft>
      <prod name="uberghey_cms" vendor="leinir_turthra">
        <vers num="0.3.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1326" seq="2008-1326" published="2008-03-13" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in search.php in Gallarific allows remote attackers to inject arbitrary web script or HTML via the query parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://downloads.securityfocus.com/vulnerabilities/exploits/28163.html">http://downloads.securityfocus.com/vulnerabilities/exploits/28163.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28163">28163</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41105">gallarific-search-xss(41105)</ref>
    </refs>
    <vuln_soft>
      <prod name="gallarific" vendor="gallarific">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1327" seq="2008-1327" published="2008-03-13" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Gallarific does not require authentication for (1) users.php and (2) index.php, which allows remote attackers to add and edit tasks via a direct request.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://downloads.securityfocus.com/vulnerabilities/exploits/28163.html">http://downloads.securityfocus.com/vulnerabilities/exploits/28163.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28163">28163</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41106">gallarific-index-users-auth-bypass(41106)</ref>
    </refs>
    <vuln_soft>
      <prod name="gallarific" vendor="gallarific">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1328" seq="2008-1328" published="2008-04-07" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the LGServer service in CA ARCserve Backup for Laptops and Desktops r11.0 through r11.5, and Suite 11.1 and 11.2, allows remote attackers to execute arbitrary code via unspecified "command arguments."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3800">3800</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490463/100/0/threaded">20080404 CA ARCserve Backup for Laptops and Desktops Server and CA Desktop Management Suite Multiple Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28616">28616</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019788">1019788</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1104/references">ADV-2008-1104</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41641">ca-arcservebackup-lgserverservice-bo(41641)</ref>
      <ref source="CONFIRM" url="https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=173105" adv="1" patch="1">https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=173105</ref>
    </refs>
    <vuln_soft>
      <prod name="desktop_management_suite" vendor="ca">
        <vers num="11.1"/>
      </prod>
      <prod name="arcserve_backup_laptops_and_desktops" vendor="computer_associates">
        <vers num="r11.0"/>
        <vers num="r11.1" edition="sp1"/>
        <vers num="r11.1" edition="sp2"/>
        <vers num="r11.5"/>
      </prod>
      <prod name="desktop_management_suite" vendor="computer_associates">
        <vers num="11.2" edition=":english"/>
        <vers num="11.2" edition=":localized"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1329" seq="2008-1329" published="2008-04-07" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the NetBackup service in CA ARCserve Backup for Laptops and Desktops r11.0 through r11.5, and Suite 11.1 and 11.2, allows remote attackers to execute arbitrary commands, related to "insufficient verification of file uploads."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3800">3800</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490463/100/0/threaded">20080404 CA ARCserve Backup for Laptops and Desktops Server and CA Desktop Management Suite Multiple Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28616">28616</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019788">1019788</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1104/references">ADV-2008-1104</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41642">ca-arcserverbackup-netbackup-code-execution(41642)</ref>
      <ref source="CONFIRM" url="https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=173105">https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=173105</ref>
    </refs>
    <vuln_soft>
      <prod name="desktop_management_suite" vendor="ca">
        <vers num="11.1"/>
      </prod>
      <prod name="arcserve_backup_laptops_and_desktops" vendor="computer_associates">
        <vers num="r11.0"/>
        <vers num="r11.1" edition="sp1"/>
        <vers num="r11.1" edition="sp2"/>
        <vers num="r11.5"/>
      </prod>
      <prod name="desktop_management_suite" vendor="computer_associates">
        <vers num="11.2" edition=":english"/>
        <vers num="11.2" edition=":localized"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1330" seq="2008-1330" published="2008-03-18" modified="2017-08-07" severity="Low" CVSS_version="2.0" CVSS_score="3.5" CVSS_base_score="3.5" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="6.8" CVSS_vector="(AV:N/AC:M/Au:S/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Windows client API in Novell GroupWise 7 before SP3 and 6.5 before SP6 Update 3 allows remote authenticated users to access the non-shared stored e-mail messages of another user who has shared at least one folder with the attacker.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019616">1019616</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28265">28265</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0904">ADV-2008-0904</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41223">groupwise-clientapi-security-bypass(41223)</ref>
      <ref source="CONFIRM" url="https://secure-support.novell.com/KanisaPlatform/Publishing/732/3263374_f.SAL_Public.html" patch="1">https://secure-support.novell.com/KanisaPlatform/Publishing/732/3263374_f.SAL_Public.html</ref>
    </refs>
    <vuln_soft>
      <prod name="groupwise" vendor="novell">
        <vers num="6.5" edition="sp1"/>
        <vers num="6.5" edition="sp2"/>
        <vers num="6.5" edition="sp3"/>
        <vers num="6.5" edition="sp4"/>
        <vers num="6.5" edition="sp5"/>
        <vers num="6.5" edition="sp6"/>
        <vers num="6.5.2"/>
        <vers num="6.5.3"/>
        <vers num="6.5.4"/>
        <vers num="6.5.6"/>
        <vers num="6.5.7"/>
        <vers num="6.5_sp6_update_1"/>
        <vers num="7.0"/>
        <vers num="7.0.0" edition="sp1"/>
        <vers num="7.0.0" edition="sp2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1331" seq="2008-1331" published="2008-04-02" modified="2019-08-14" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">cgi-data/FastJSData.cgi in OmniPCX Office with Internet Access services OXO210 before 210/091.001, OXO600 before 610/014.001, and other versions, allows remote attackers to execute arbitrary commands and "obtain OXO resources" via shell metacharacters in the id2 parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492383/100/0/threaded" adv="1">20080521 [DSECRG-08-020] Alcatel OmniPCX Office Remote Comand Execution</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28758" adv="1">28758</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020082" adv="1">1020082</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1057">ADV-2008-1057</ref>
      <ref source="CONFIRM" url="http://www1.alcatel-lucent.com/psirt/statements/2008001/OXOrexec.htm" adv="1">http://www1.alcatel-lucent.com/psirt/statements/2008001/OXOrexec.htm</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41560" adv="1">omnipcx-cgiscript-info-disclosure(41560)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5662" adv="1">5662</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2008-1332" seq="2008-1332" published="2008-03-19" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="8.8" CVSS_base_score="8.8" CVSS_impact_subscore="9.2" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Asterisk Open Source 1.2.x before 1.2.27, 1.4.x before 1.4.18.1 and 1.4.19-rc3; Business Edition A.x.x, B.x.x before B.2.5.1, and C.x.x before C.1.6.2; AsteriskNOW 1.0.x before 1.0.2; Appliance Developer Kit before 1.4 revision 109393; and s800i 1.0.x before 1.1.0.2; allows remote attackers to access the SIP channel driver via a crafted From header.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://downloads.digium.com/pub/security/AST-2008-003.html" patch="1">http://downloads.digium.com/pub/security/AST-2008-003.html</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html">SUSE-SR:2008:010</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200804-13.xml">GLSA-200804-13</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019629">1019629</ref>
      <ref source="CONFIRM" url="http://www.asterisk.org/node/48466">http://www.asterisk.org/node/48466</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1525">DSA-1525</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489818/100/0/threaded">20080318 AST-2008-003: Unauthenticated calls allowed from SIP channel driver</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28310">28310</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0928">ADV-2008-0928</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41308">asterisk-sip-security-bypass(41308)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html">FEDORA-2008-2554</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html">FEDORA-2008-2620</ref>
    </refs>
    <vuln_soft>
      <prod name="asterisk" vendor="asterisk">
        <vers num="a" edition=":business"/>
        <vers num="b.1.3.2" edition=":business"/>
        <vers num="b.1.3.3" edition=":business"/>
        <vers num="b.2.2.0" edition=":business"/>
        <vers num="b.2.2.1" edition=":business"/>
        <vers num="b.2.3.1" edition=":business"/>
        <vers num="b.2.3.2" edition=":business"/>
        <vers num="b.2.3.3" edition=":business"/>
        <vers num="b.2.3.4" edition=":business"/>
        <vers num="b.2.3.5" edition=":business"/>
        <vers num="b.2.3.6" edition=":business"/>
        <vers num="c.1.0_beta7" edition=":business"/>
        <vers num="c.1.0_beta8" edition=":business"/>
        <vers num="c.1.6" edition=":business"/>
        <vers num="c.1.6.1" edition=":business"/>
      </prod>
      <prod name="asterisk_appliance_developer_kit" vendor="asterisk">
        <vers num="0.2"/>
        <vers num="0.3"/>
        <vers num="0.4"/>
        <vers num="0.5"/>
        <vers num="0.6"/>
        <vers num="0.6.0"/>
        <vers num="0.7"/>
        <vers num="0.8"/>
        <vers num="1.3"/>
        <vers num="1.4" prev="1"/>
      </prod>
      <prod name="asterisk_business_edition" vendor="asterisk">
        <vers num="a" prev="1"/>
        <vers num="b.2.5.0" prev="1"/>
        <vers num="c.1.6.1" prev="1"/>
      </prod>
      <prod name="asterisknow" vendor="asterisk">
        <vers num="1.0"/>
        <vers num="1.0.1" prev="1"/>
      </prod>
      <prod name="open_source" vendor="asterisk">
        <vers num="1.0"/>
        <vers num="1.0.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.3.4"/>
        <vers num="1.0.4"/>
        <vers num="1.0.5"/>
        <vers num="1.0.6"/>
        <vers num="1.0.7"/>
        <vers num="1.0.8"/>
        <vers num="1.0.9"/>
        <vers num="1.0.11"/>
        <vers num="1.0.11.1"/>
        <vers num="1.0.12"/>
        <vers num="1.2.0" edition="beta1"/>
        <vers num="1.2.0" edition="beta2"/>
        <vers num="1.2.0" edition="rc1"/>
        <vers num="1.2.0beta2"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2"/>
        <vers num="1.2.3"/>
        <vers num="1.2.4"/>
        <vers num="1.2.5"/>
        <vers num="1.2.6"/>
        <vers num="1.2.7"/>
        <vers num="1.2.7.1"/>
        <vers num="1.2.8"/>
        <vers num="1.2.9"/>
        <vers num="1.2.9.1"/>
        <vers num="1.2.10"/>
        <vers num="1.2.11"/>
        <vers num="1.2.12"/>
        <vers num="1.2.12.1"/>
        <vers num="1.2.13"/>
        <vers num="1.2.14"/>
        <vers num="1.2.15"/>
        <vers num="1.2.16"/>
        <vers num="1.2.17"/>
        <vers num="1.2.18"/>
        <vers num="1.2.19"/>
        <vers num="1.2.20"/>
        <vers num="1.2.21"/>
        <vers num="1.2.21.1"/>
        <vers num="1.2.22"/>
        <vers num="1.2.23"/>
        <vers num="1.2.24"/>
        <vers num="1.2.25"/>
        <vers num="1.2.26" prev="1"/>
        <vers num="1.2.26.1"/>
        <vers num="1.2.26.2"/>
        <vers num="1.4.0" edition="beta2"/>
        <vers num="1.4.0" edition="beta3"/>
        <vers num="1.4.0" edition="beta4"/>
        <vers num="1.4.1"/>
        <vers num="1.4.10"/>
        <vers num="1.4.10.1"/>
        <vers num="1.4.11"/>
        <vers num="1.4.12"/>
        <vers num="1.4.12.1"/>
        <vers num="1.4.13"/>
        <vers num="1.4.14"/>
        <vers num="1.4.15"/>
        <vers num="1.4.16"/>
        <vers num="1.4.16.1"/>
        <vers num="1.4.16.2"/>
        <vers num="1.4.17" prev="1"/>
        <vers num="1.4.18"/>
        <vers num="1.4.19" prev="1" edition="rc-2"/>
        <vers num="1.4.19" prev="1" edition="rc3"/>
      </prod>
      <prod name="s800i" vendor="asterisk">
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.3.3"/>
        <vers num="1.1.0"/>
        <vers num="1.1.0.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1333" seq="2008-1333" published="2008-03-19" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.8" CVSS_base_score="5.8" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:P)">
    <desc>
      <descript source="cve">Format string vulnerability in Asterisk Open Source 1.6.x before 1.6.0-beta6 might allow remote attackers to execute arbitrary code via logging messages that are not properly handled by (1) the ast_verbose logging API call, or (2) the astman_append function.</descript>
    </desc>
    <loss_types>
      <avail/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://downloads.digium.com/pub/security/AST-2008-004.html" patch="1">http://downloads.digium.com/pub/security/AST-2008-004.html</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019630">1019630</ref>
      <ref source="CONFIRM" url="http://www.asterisk.org/node/48466">http://www.asterisk.org/node/48466</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1525">DSA-1525</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489823/100/0/threaded">20080318 AST-2008-004: Format String Vulnerability in Logger and Manager</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28311">28311</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0928">ADV-2008-0928</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41301">asterisk-astverbose-dos(41301)</ref>
    </refs>
    <vuln_soft>
      <prod name="open_source" vendor="asterisk">
        <vers num="1.6.0_beta1"/>
        <vers num="1.6.0_beta2"/>
        <vers num="1.6.0_beta3"/>
        <vers num="1.6.0_beta4"/>
        <vers num="1.6.0_beta5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1334" seq="2008-1334" published="2008-03-13" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">cgi/b on the BT Home Hub router allows remote attackers to bypass authentication, and read or modify administrative settings or make arbitrary VoIP telephone calls, by placing a character at the end of the PATH_INFO, as demonstrated by (1) %5C (encoded backslash), (2) '%' (percent), and (3) '~' (tilde).  NOTE: the '/' (slash) vector is already covered by CVE-2007-5383.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.gnucitizen.org/blog/holes-in-embedded-devices-authentication-bypass-pt-1/">http://www.gnucitizen.org/blog/holes-in-embedded-devices-authentication-bypass-pt-1/</ref>
      <ref source="MISC" url="http://www.gnucitizen.org/projects/router-hacking-challenge/">http://www.gnucitizen.org/projects/router-hacking-challenge/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489009/100/0/threaded">20080301 The Router Hacking Challenge is Over!</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41271">bthomehub-cgib-auth-bypass(41271)</ref>
    </refs>
    <vuln_soft>
      <prod name="home_hub" vendor="bt">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1335" seq="2008-1335" published="2008-03-13" modified="2008-12-10" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The ipsec4_get_ulp function in the kernel in NetBSD 2.0 through 3.1 and NetBSD-current before 20071028, when the fast_ipsec subsystem is enabled, allows remote attackers to bypass the IPsec policy by sending packets from a source machine with a different endianness than the destination machine, a different vulnerability than CVE-2006-0905.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="NETBSD" url="ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2008-002.txt.asc">NetBSD-SA2008-002</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019533">1019533</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28045">28045</ref>
    </refs>
    <vuln_soft>
      <prod name="netbsd" vendor="netbsd">
        <vers num="2.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
        <vers num="2.0.4"/>
        <vers num="2.1"/>
        <vers num="2.1.1"/>
        <vers num="3.0"/>
        <vers num="3.0.1"/>
        <vers num="3.0.2"/>
        <vers num="3.1" edition="rc1"/>
        <vers num="3.1" edition="rc3"/>
      </prod>
      <prod name="netbsd_current" vendor="netbsd">
        <vers num="20071027" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1336" seq="2008-1336" published="2008-03-13" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in Koobi CMS 4.2.3 through 4.3.0 allows remote attackers to execute arbitrary SQL commands via the categ parameter in a links action to index.php, a different vector than CVE-2008-1122.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488997/100/0/threaded">20080301 Koobi CMS 4.3.0 - 4.2.3 (categ) Remote SQL Injection Vulnerability</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490886/100/0/threaded">20080415 Koobi CMS 4.2.4/4.2.5/4.3.0 Multiple Remote SQL Injection Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28059">28059</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41207">koobicms-categ-sql-injection(41207)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5206">5206</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5447">5447</ref>
    </refs>
    <vuln_soft>
      <prod name="koobi_cms" vendor="koobi">
        <vers num="4.2.3"/>
        <vers num="4.2.4"/>
        <vers num="4.2.5"/>
        <vers num="4.2.6"/>
        <vers num="4.2.7"/>
        <vers num="4.2.8"/>
        <vers num="4.2.9"/>
        <vers num="4.3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1337" seq="2008-1337" published="2008-03-14" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The instant message service in Timbuktu Pro 8.6.5 RC 229 and earlier for Windows allows remote attackers to cause (1) a denial of service (daemon crash) via an invalid Version field or (2) a denial of service (CPU consumption and daemon termination) via an invalid or partial message.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/timbuto-adv.txt">http://aluigi.altervista.org/adv/timbuto-adv.txt</ref>
      <ref source="MISC" url="http://aluigi.org/poc/timbuto.zip">http://aluigi.org/poc/timbuto.zip</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3741">3741</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489360/100/0/threaded">20080310 Vulnerabilities in Timbuktu Pro 8.6.5</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0840">ADV-2008-0840</ref>
    </refs>
    <vuln_soft>
      <prod name="timbuktu_pro" vendor="netopia">
        <vers num="8.6.5" edition="rc_229"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1338" seq="2008-1338" published="2008-03-14" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">The Perforce service (p4s.exe) in Perforce Server 2007.3/143793 and earlier allows remote attackers to cause a denial of service (daemon crash) via a server-DiffFile command with an integer value within a certain range, which causes a loop until all memory is exhausted.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/perforces-adv.txt">http://aluigi.altervista.org/adv/perforces-adv.txt</ref>
      <ref source="MISC" url="http://aluigi.org/poc/perforces.zip">http://aluigi.org/poc/perforces.zip</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3735">3735</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489179/100/0/threaded">20080305 Multiple vulnerabilities in Perforce Server 2007.3/143793</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28108">28108</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41017">perforceserver-serverdifffile-dos(41017)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41361">perforce-server-p4s-dos(41361)</ref>
    </refs>
    <vuln_soft>
      <prod name="perforce_server" vendor="perforce">
        <vers num="2007.3_143793" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1340" seq="2008-1340" published="2008-03-19" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.1" CVSS_base_score="7.1" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Virtual Machine Communication Interface (VMCI) in VMware Workstation 6.0.x before 6.0.3, VMware Player 2.0.x before 2.0.3, and VMware ACE 2.0.x before 2.0.1 allows attackers to cause a denial of service (host OS crash) via crafted VMCI calls that trigger "memory exhaustion and memory corruption."</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MLIST" url="http://lists.vmware.com/pipermail/security-announce/2008/000008.html" patch="1">[security-announce] 20080317 VMSA-2008-0005 Updated VMware Workstation, VMware Player, VMware Server, VMware ACE, and VMware Fusion resolve critical security issues</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-201209-25.xml">GLSA-201209-25</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3755">3755</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019624">1019624</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489739/100/0/threaded">20080318 VMSA-2008-0005 Updated VMware Workstation, VMware Player, VMware Server, VMware ACE, and VMware Fusion resolve critical security issues</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28276" patch="1">28276</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28289">28289</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2008-0005.html" patch="1">http://www.vmware.com/security/advisories/VMSA-2008-0005.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html" patch="1">http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/support/player2/doc/releasenotes_player2.html" patch="1">http://www.vmware.com/support/player2/doc/releasenotes_player2.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html" patch="1">http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0905/references">ADV-2008-0905</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41250">vmware-vmci-dos(41250)</ref>
    </refs>
    <vuln_soft>
      <prod name="ace" vendor="vmware">
        <vers num="1.0"/>
        <vers num="2.0"/>
      </prod>
      <prod name="player" vendor="vmware">
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.4"/>
        <vers num="1.0.5"/>
        <vers num="2.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
      </prod>
      <prod name="server" vendor="vmware">
        <vers num="1.0.3"/>
      </prod>
      <prod name="vmware_server" vendor="vmware">
        <vers num="1.0.2"/>
        <vers num="1.0.4"/>
      </prod>
      <prod name="vmware_workstation" vendor="vmware">
        <vers num="5.5.5"/>
        <vers num="6.0.1"/>
        <vers num="6.0.2"/>
      </prod>
      <prod name="workstation" vendor="vmware">
        <vers num="5.5"/>
        <vers num="5.5.3_build_34685"/>
        <vers num="5.5.3_build_42958"/>
        <vers num="5.5.4"/>
        <vers num="5.5.4_build_44386"/>
        <vers num="6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1341" seq="2008-1341" published="2008-03-17" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in SearchResults.aspx in LaGarde StoreFront 6 before SP8 allows remote attackers to execute arbitrary SQL commands via the CategoryId parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28234">28234</ref>
    </refs>
    <vuln_soft>
      <prod name="storefront" vendor="lagarde">
        <vers num="6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1342" seq="2008-1342" published="2008-03-17" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in the search feature in Polymita BPM-Suite and CollagePortal allow remote attackers to inject arbitrary web script or HTML via the (1) _q and (2) lucene_index_field_value parameters.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs/>
    <vuln_soft>
      <prod name="bpm_suite" vendor="polymita_technologies">
        <vers num=""/>
      </prod>
      <prod name="collageportal" vendor="polymita_technologies">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1343" seq="2008-1343" published="2008-03-17" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.9" CVSS_base_score="4.9" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:C/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in (1) pkgadd and (2) pkgrm in SCO UnixWare 7.1.4 allows local users to gain privileges via unknown vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SCO" url="ftp://ftp.sco.com/pub/unixware7/714/security/p534589/p534589.txt" patch="1">SCOSA-2008.1</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28236">28236</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0871">ADV-2008-0871</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41200">sco-unixware-pkgadd-privilege-escalation(41200)</ref>
    </refs>
    <vuln_soft>
      <prod name="unixware" vendor="sco">
        <vers num="7.1.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1344" seq="2008-1344" published="2008-03-17" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in MyioSoft EasyCalendar 4.0tr and earlier allow remote attackers to execute arbitrary SQL commands via the (1) year parameter in a dayview action to plugins/calendar/calendar_backend.php and the (2) page parameter to ajaxp_backend.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489678/100/0/threaded">20080317 EasyCalendar &lt;= 4.0tr - Multiple Remote Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28232">28232</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41179">easycalendar-year-page-sql-injection(41179)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5246">5246</ref>
    </refs>
    <vuln_soft>
      <prod name="easycalendar" vendor="myiosoft">
        <vers num="4.0tr"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1345" seq="2008-1345" published="2008-03-17" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in plugins/calendar/calendar_backend.php in MyioSoft EasyCalendar 4.0tr and earlier allows remote attackers to inject arbitrary web script or HTML via the day parameter in a dayview action.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489678/100/0/threaded">20080317 EasyCalendar &lt;= 4.0tr - Multiple Remote Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28232">28232</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41180">easycalendar-calendarbackend-xss(41180)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5246">5246</ref>
    </refs>
    <vuln_soft>
      <prod name="easycalendar" vendor="myiosoft">
        <vers num="4.0tr"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1346" seq="2008-1346" published="2008-03-17" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in staticpages/easygallery/index.php in MyioSoft EasyGallery 5.0tr and earlier allows remote attackers to execute arbitrary SQL commands via the catid parameter in a category action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489583/100/0/threaded">20080314 EasyGallery &lt;= 5.0tr - Multiple Remote Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28233">28233</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41185">easygallery-index-sql-injection(41185)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5247">5247</ref>
    </refs>
    <vuln_soft>
      <prod name="easycalendar" vendor="myiosoft">
        <vers num="4.0tr"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1347" seq="2008-1347" published="2008-03-17" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in staticpages/easygallery/index.php in MyioSoft EasyGallery 5.0tr and earlier allow remote attackers to inject arbitrary web script or HTML via (1) the PATH_INFO or (2) the q parameter in an about action to the help system.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489583/100/0/threaded">20080314 EasyGallery &lt;= 5.0tr - Multiple Remote Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28233">28233</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41186">easygallery-index-xss(41186)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5247">5247</ref>
    </refs>
    <vuln_soft>
      <prod name="easycalendar" vendor="myiosoft">
        <vers num="4.0tr"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1348" seq="2008-1348" published="2008-03-17" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php in the eWebsite eWeather (Weather) module for PHP-Nuke allows remote attackers to inject arbitrary web script or HTML via the chart parameter to modules.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3744">3744</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489504/100/0/threaded">20080313 XSS in PHP-Nuke (eWeather module)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28241">28241</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41205">eweather-modules-xss(41205)</ref>
    </refs>
    <vuln_soft>
      <prod name="eweather" vendor="ewebsite">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1349" seq="2008-1349" published="2008-03-17" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in viewcat.php in the bamaGalerie (Bama Galerie) 3.03 and 3.041 module for eXV2 2.0.6 allows remote attackers to execute arbitrary SQL commands via the cid parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://packetstormsecurity.org/0804-exploits/runcms11a-sql.txt">http://packetstormsecurity.org/0804-exploits/runcms11a-sql.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28229">28229</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41188">bamagalerie-viewcat-sql-injection(41188)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5244">5244</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5340">5340</ref>
    </refs>
    <vuln_soft>
      <prod name="bamagalerie" vendor="exv2">
        <vers num="3.03"/>
        <vers num="3.041"/>
      </prod>
      <prod name="exv2" vendor="exv2">
        <vers num="2.0.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1350" seq="2008-1350" published="2008-03-17" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in kb.php in Fully Modded phpBB (phpbbfm) 80220 allows remote attackers to execute arbitrary SQL commands via the k parameter in an article action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3745">3745</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489468/100/0/threaded">20080312 Powered by phpBB 2001, 2006 (SQL)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28225">28225</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41192">phpbb-kb-sql-injection(41192)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5243">5243</ref>
    </refs>
    <vuln_soft>
      <prod name="fully_modded_phpbb" vendor="fully_modded_phpbb">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1351" seq="2008-1351" published="2008-03-17" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the Tutorials 2.1b module for XOOPS allows remote attackers to execute arbitrary SQL commands via the tid parameter to printpage.php, which is accessible directly or through a printpage action to index.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28230">28230</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5245">5245</ref>
    </refs>
    <vuln_soft>
      <prod name="tutoriais_module" vendor="xoops">
        <vers num="2.1b"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1352" seq="2008-1352" published="2008-03-17" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in search.php in EdiorCMS (ecms) 3.0 allows remote attackers to read arbitrary files via a .. (dot dot) in the _SearchTemplate parameter during a Title search.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3746">3746</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489498/100/0/threaded">20080313 Directory traversal in EdiorCMS V3.0</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28242">28242</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41189">edior-search-directory-traversal(41189)</ref>
    </refs>
    <vuln_soft>
      <prod name="ediorcms" vendor="hangzhou_network_technology_development">
        <vers num="3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1353" seq="2008-1353" published="2008-03-17" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">zabbix_agentd in ZABBIX 1.4.4 allows remote attackers to cause a denial of service (CPU and connection consumption) via multiple vfs.file.cksum commands with a special device node such as /dev/urandom or /dev/zero.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3747">3747</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489506/100/0/threaded">20080313 Zabbix (zabbix_agentd) denial of service</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28244">28244</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0878">ADV-2008-0878</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41196">zabbix-zabbixagentd-dos(41196)</ref>
    </refs>
    <vuln_soft>
      <prod name="zabbix" vendor="zabbix">
        <vers num="1.1.2"/>
        <vers num="1.1.3"/>
        <vers num="1.1.4"/>
        <vers num="1.1.5"/>
        <vers num="1.4.2"/>
        <vers num="1.4.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1354" seq="2008-1354" published="2008-03-17" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in MyIssuesView.asp in Advanced Data Solutions Virtual Support Office-XP (VSO-XP) allows remote attackers to execute arbitrary SQL commands via the Issue_ID parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=120545152114985&amp;w=2">20080313 Office XP Remote SQL Injection</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28247">28247</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41206">vsoxp-myissuesview-sql-injection(41206)</ref>
    </refs>
    <vuln_soft>
      <prod name="virtual_support_office_xp" vendor="advanced_data_solutions">
        <vers num="2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1355" seq="2008-1355" published="2008-03-17" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php in Jeebles Technology Jeebles Directory 2.9.60 allows remote attackers to inject arbitrary web script or HTML via the path parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://downloads.securityfocus.com/vulnerabilities/exploits/28221.html">http://downloads.securityfocus.com/vulnerabilities/exploits/28221.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28221">28221</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41183">jeeblesdirectory-path-xss(41183)</ref>
    </refs>
    <vuln_soft>
      <prod name="jeebles_directory" vendor="jeeblestechnology">
        <vers num="2.9.60"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1356" seq="2008-1356" published="2008-03-17" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.3" CVSS_base_score="6.3" CVSS_impact_subscore="9.2" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:N/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in xscreensaver in Sun Solaris 10 Java Desktop System (JDS), when using the GNOME On-Screen Keyboard (GOK), allows local users to bypass authentication via unknown vectors that cause the screen saver to crash.</descript>
    </desc>
    <loss_types>
      <avail/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-234661-1" patch="1">234661</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28243">28243</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019614">1019614</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0875/references">ADV-2008-0875</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41191">sun-solaris-xscreensaver-auth-bypass(41191)</ref>
    </refs>
    <vuln_soft>
      <prod name="solaris" vendor="sun">
        <vers num="10" edition=":sparc"/>
        <vers num="10" edition=":x86"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1357" seq="2008-1357" published="2008-03-17" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.4" CVSS_base_score="5.4" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Format string vulnerability in the logDetail function of applib.dll in McAfee Common Management Agent (CMA) 3.6.0.574 (Patch 3) and earlier, as used in ePolicy Orchestrator 4.0.0 build 1015, allows remote attackers to cause a denial of service (crash) or execute arbitrary code via format string specifiers in a sender field in an AgentWakeup request to UDP port 8082.  NOTE: this issue only exists when the debug level is 8.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/meccaffi-adv.txt">http://aluigi.altervista.org/adv/meccaffi-adv.txt</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3748">3748</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489476/100/0/threaded">20080312 Format string in McAfee Framework 3.6.0.569 (ePolicy Orchestrator 4.0)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28228">28228</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019609">1019609</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0866/references">ADV-2008-0866</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41178">mcafee-framework-format-string(41178)</ref>
      <ref source="CONFIRM" url="https://knowledge.mcafee.com/article/234/615103_f.sal_public.html">https://knowledge.mcafee.com/article/234/615103_f.sal_public.html</ref>
    </refs>
    <vuln_soft>
      <prod name="agent" vendor="mcafee">
        <vers num="4.0"/>
      </prod>
      <prod name="cma" vendor="mcafee">
        <vers num="3.0.6.453"/>
        <vers num="3.5.5.438"/>
        <vers num="3.6.438"/>
        <vers num="3.6.453"/>
        <vers num="3.6.546"/>
        <vers num="3.6.574"/>
      </prod>
      <prod name="epolicy_orchestrator" vendor="mcafee">
        <vers num="4.0"/>
      </prod>
      <prod name="mcafee_framework" vendor="mcafee">
        <vers num="3.6.569"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1358" seq="2008-1358" published="2008-03-17" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the IMAP server in Alt-N Technologies MDaemon 9.6.4 allows remote authenticated users to execute arbitrary code via a FETCH command with a long BODY.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://files.altn.com/MDaemon/Release/RelNotes_en.txt">http://files.altn.com/MDaemon/Release/RelNotes_en.txt</ref>
      <ref source="MISC" url="http://www.be4mind.com/?q=node/256">http://www.be4mind.com/?q=node/256</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28245">28245</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019615">1019615</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0877/references" adv="1">ADV-2008-0877</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41195">mdaemon-hashcash-bo(41195)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5248">5248</ref>
    </refs>
    <vuln_soft>
      <prod name="mdaemon" vendor="altn">
        <vers num="9.6.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1359" seq="2008-1359" published="2008-03-17" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Invision Power Board (IPB or IP.Board) 2.3.4 before 2008-03-13 allows remote attackers to inject arbitrary web script or HTML via nested BBCodes, a different vector than CVE-2008-0913.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://forums.invisionpower.com/index.php?showtopic=270637">http://forums.invisionpower.com/index.php?showtopic=270637</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0899/references">ADV-2008-0899</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41209">ipb-nested-bbcodes-xss(41209)</ref>
    </refs>
    <vuln_soft>
      <prod name="invision_power_board" vendor="invision_power_services">
        <vers num="2.3.4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1360" seq="2008-1360" published="2008-03-17" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Nagios before 2.11 allows remote attackers to inject arbitrary web script or HTML via unknown vectors to unspecified CGI scripts, a different issue than CVE-2007-5624.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html">SUSE-SR:2008:011</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:067">MDVSA-2008:067</ref>
      <ref source="CONFIRM" url="http://www.nagios.org/development/changelog.php#2x_branch">http://www.nagios.org/development/changelog.php#2x_branch</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28250" patch="1">28250</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0900/references">ADV-2008-0900</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41210">nagios-unspecified-xss(41210)</ref>
    </refs>
    <vuln_soft>
      <prod name="nagios" vendor="nagios">
        <vers num="2.2"/>
        <vers num="2.3"/>
        <vers num="2.3.1"/>
        <vers num="2.7"/>
        <vers num="2.8"/>
        <vers num="2.9"/>
        <vers num="2.10"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1361" seq="2008-1361" published="2008-03-19" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.1" CVSS_vector="(AV:L/AC:L/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">VMware Workstation 6.0.x before 6.0.3 and 5.5.x before 5.5.6, VMware Player 2.0.x before 2.0.3 and 1.0.x before 1.0.6, VMware ACE 2.0.x before 2.0.1 and 1.0.x before 1.0.5, and VMware Server 1.0.x before 1.0.5 on Windows allow local users to gain privileges via an unspecified manipulation that causes the authd process to connect to an arbitrary named pipe, a different vulnerability than CVE-2008-1362.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MLIST" url="http://lists.vmware.com/pipermail/security-announce/2008/000008.html">[security-announce] 20080317 VMSA-2008-0005 Updated VMware Workstation, VMware Player, VMware Server, VMware ACE, and VMware Fusion resolve critical security issues</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-201209-25.xml">GLSA-201209-25</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3755">3755</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019621">1019621</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489739/100/0/threaded">20080318 VMSA-2008-0005 Updated VMware Workstation, VMware Player, VMware Server, VMware ACE, and VMware Fusion resolve critical security issues</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28276" patch="1">28276</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2008-0005.html" adv="1" patch="1">http://www.vmware.com/security/advisories/VMSA-2008-0005.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html" adv="1" patch="1">http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/support/player/doc/releasenotes_player.html" adv="1" patch="1">http://www.vmware.com/support/player/doc/releasenotes_player.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/support/player2/doc/releasenotes_player2.html" adv="1" patch="1">http://www.vmware.com/support/player2/doc/releasenotes_player2.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/support/server/doc/releasenotes_server.html" adv="1" patch="1">http://www.vmware.com/support/server/doc/releasenotes_server.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html" adv="1" patch="1">http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html">http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0905/references">ADV-2008-0905</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41257">vmware-authd-privilege-escalation(41257)</ref>
    </refs>
    <vuln_soft>
      <prod name="ace" vendor="vmware">
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.4"/>
        <vers num="2.0"/>
      </prod>
      <prod name="player" vendor="vmware">
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.4"/>
        <vers num="1.0.5"/>
        <vers num="2.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
      </prod>
      <prod name="server" vendor="vmware">
        <vers num="1.0.3"/>
      </prod>
      <prod name="vmware_server" vendor="vmware">
        <vers num="1.0.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.4"/>
      </prod>
      <prod name="vmware_workstation" vendor="vmware">
        <vers num="5.5.5"/>
        <vers num="6.0.1"/>
        <vers num="6.0.2"/>
      </prod>
      <prod name="workstation" vendor="vmware">
        <vers num="5.5"/>
        <vers num="5.5.3_build_34685"/>
        <vers num="5.5.3_build_42958"/>
        <vers num="5.5.4"/>
        <vers num="5.5.4_build_44386"/>
        <vers num="6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1362" seq="2008-1362" published="2008-03-19" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">VMware Workstation 6.0.x before 6.0.3 and 5.5.x before 5.5.6, VMware Player 2.0.x before 2.0.3 and 1.0.x before 1.0.6, VMware ACE 2.0.x before 2.0.1 and 1.0.x before 1.0.5, and VMware Server 1.0.x before 1.0.5 on Windows allow local users to gain privileges or cause a denial of service by impersonating the authd process through an unspecified use of an "insecurely created named pipe," a different vulnerability than CVE-2008-1361.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MLIST" url="http://lists.vmware.com/pipermail/security-announce/2008/000008.html" patch="1">[security-announce] 20080317 VMSA-2008-0005 Updated VMware Workstation, VMware Player, VMware Server, VMware ACE, and VMware Fusion resolve critical security issues</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-201209-25.xml">GLSA-201209-25</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3755">3755</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019621">1019621</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489739/100/0/threaded">20080318 VMSA-2008-0005 Updated VMware Workstation, VMware Player, VMware Server, VMware ACE, and VMware Fusion resolve critical security issues</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28276">28276</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2008-0005.html" patch="1">http://www.vmware.com/security/advisories/VMSA-2008-0005.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html" patch="1">http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/support/player/doc/releasenotes_player.html" patch="1">http://www.vmware.com/support/player/doc/releasenotes_player.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/support/player2/doc/releasenotes_player2.html" patch="1">http://www.vmware.com/support/player2/doc/releasenotes_player2.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/support/server/doc/releasenotes_server.html" patch="1">http://www.vmware.com/support/server/doc/releasenotes_server.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html" patch="1">http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html" patch="1">http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0905/references">ADV-2008-0905</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41259">vmware-namedpipes-privilege-escalation(41259)</ref>
    </refs>
    <vuln_soft>
      <prod name="ace" vendor="vmware">
        <vers num="1.0"/>
        <vers num="2.0"/>
      </prod>
      <prod name="player" vendor="vmware">
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.4"/>
        <vers num="1.0.5"/>
        <vers num="2.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
      </prod>
      <prod name="server" vendor="vmware">
        <vers num="1.0.3"/>
      </prod>
      <prod name="vmware_server" vendor="vmware">
        <vers num="1.0.2"/>
        <vers num="1.0.4"/>
      </prod>
      <prod name="vmware_workstation" vendor="vmware">
        <vers num="5.5.5"/>
        <vers num="6.0.1"/>
        <vers num="6.0.2"/>
      </prod>
      <prod name="workstation" vendor="vmware">
        <vers num="5.5"/>
        <vers num="5.5.3_build_34685"/>
        <vers num="5.5.3_build_42958"/>
        <vers num="5.5.4"/>
        <vers num="5.5.4_build_44386"/>
        <vers num="6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1363" seq="2008-1363" published="2008-03-19" modified="2018-11-01" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">VMware Workstation 6.0.x before 6.0.3 and 5.5.x before 5.5.6, VMware Player 2.0.x before 2.0.3 and 1.0.x before 1.0.6, VMware ACE 2.0.x before 2.0.1 and 1.0.x before 1.0.5, and VMware Server 1.0.x before 1.0.5 on Windows allow local users to gain privileges via an unspecified manipulation of a config.ini file located in an Application Data folder, which can be used for "hijacking the VMX process."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MLIST" url="http://lists.vmware.com/pipermail/security-announce/2008/000008.html" adv="1">[security-announce] 20080317 VMSA-2008-0005 Updated VMware Workstation, VMware Player, VMware Server, VMware ACE, and VMware Fusion resolve critical security issues</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-201209-25.xml" adv="1">GLSA-201209-25</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3755" adv="1">3755</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019622" adv="1">1019622</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489739/100/0/threaded" adv="1">20080318 VMSA-2008-0005 Updated VMware Workstation, VMware Player, VMware Server, VMware ACE, and VMware Fusion resolve critical security issues</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28276" adv="1" patch="1">28276</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2008-0005.html" adv="1" patch="1">http://www.vmware.com/security/advisories/VMSA-2008-0005.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html" adv="1" patch="1">http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/support/player/doc/releasenotes_player.html" adv="1" patch="1">http://www.vmware.com/support/player/doc/releasenotes_player.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/support/player2/doc/releasenotes_player2.html" adv="1" patch="1">http://www.vmware.com/support/player2/doc/releasenotes_player2.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/support/server/doc/releasenotes_server.html" adv="1" patch="1">http://www.vmware.com/support/server/doc/releasenotes_server.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html" adv="1" patch="1">http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html" adv="1" patch="1">http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0905/references" adv="1">ADV-2008-0905</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41252" adv="1">vmware-config-privilege-escalation(41252)</ref>
    </refs>
    <vuln_soft>
      <prod name="ace" vendor="vmware">
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.3_build_54075"/>
        <vers num="1.0.4"/>
        <vers num="2.0"/>
      </prod>
      <prod name="player" vendor="vmware">
        <vers num="1.0.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.4"/>
        <vers num="1.0.5"/>
        <vers num="1.0.5_build_56455"/>
        <vers num="2.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.1_build_55017"/>
        <vers num="2.0.2"/>
      </prod>
      <prod name="server" vendor="vmware">
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.1_build_29996"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.4"/>
        <vers num="1.0.4_build_56528"/>
      </prod>
      <prod name="workstation" vendor="vmware">
        <vers num="5.5"/>
        <vers num="5.5.0_build_13124"/>
        <vers num="5.5.1"/>
        <vers num="5.5.1_build_19175"/>
        <vers num="5.5.2"/>
        <vers num="5.5.3"/>
        <vers num="5.5.3_build_34685"/>
        <vers num="5.5.3_build_42958"/>
        <vers num="5.5.4"/>
        <vers num="5.5.4_build_44386"/>
        <vers num="5.5.5"/>
        <vers num="5.5.5_build_56455"/>
        <vers num="6.0"/>
        <vers num="6.0.1"/>
        <vers num="6.0.1_build_55017"/>
        <vers num="6.0.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1364" seq="2008-1364" published="2008-03-19" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the DHCP service in VMware Workstation 5.5.x before 5.5.6, VMware Player 1.0.x before 1.0.6, VMware ACE 1.0.x before 1.0.5, VMware Server 1.0.x before 1.0.5, and VMware Fusion 1.1.x before 1.1.1 allows attackers to cause a denial of service.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MLIST" url="http://lists.vmware.com/pipermail/security-announce/2008/000008.html" patch="1">[security-announce] 20080317 VMSA-2008-0005 Updated VMware Workstation, VMware Player, VMware Server, VMware ACE, and VMware Fusion resolve critical security issues</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-201209-25.xml">GLSA-201209-25</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3755">3755</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019623">1019623</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489739/100/0/threaded">20080318 VMSA-2008-0005 Updated VMware Workstation, VMware Player, VMware Server, VMware ACE, and VMware Fusion resolve critical security issues</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28276">28276</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28289">28289</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2008-0005.html" patch="1">http://www.vmware.com/security/advisories/VMSA-2008-0005.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/support/fusion/doc/releasenotes_fusion.html" patch="1">http://www.vmware.com/support/fusion/doc/releasenotes_fusion.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/support/player/doc/releasenotes_player.html" patch="1">http://www.vmware.com/support/player/doc/releasenotes_player.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/support/server/doc/releasenotes_server.html" patch="1">http://www.vmware.com/support/server/doc/releasenotes_server.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html" patch="1">http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0905/references">ADV-2008-0905</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41254">vmware-dhcp-unspecified-dos(41254)</ref>
    </refs>
    <vuln_soft>
      <prod name="ace" vendor="vmware">
        <vers num="1.0"/>
        <vers num="2.0"/>
      </prod>
      <prod name="player" vendor="vmware">
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.4"/>
        <vers num="1.0.5"/>
        <vers num="2.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
      </prod>
      <prod name="server" vendor="vmware">
        <vers num="1.0.3"/>
      </prod>
      <prod name="vmware_server" vendor="vmware">
        <vers num="1.0.2"/>
        <vers num="1.0.4"/>
      </prod>
      <prod name="vmware_workstation" vendor="vmware">
        <vers num="5.5.5"/>
        <vers num="6.0.1"/>
        <vers num="6.0.2"/>
      </prod>
      <prod name="workstation" vendor="vmware">
        <vers num="5.5"/>
        <vers num="5.5.3_build_34685"/>
        <vers num="5.5.3_build_42958"/>
        <vers num="5.5.4"/>
        <vers num="5.5.4_build_44386"/>
        <vers num="6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1365" seq="2008-1365" published="2008-03-17" modified="2011-03-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in Trend Micro OfficeScan Corporate Edition 8.0 Patch 2 build 1189 and earlier, and 7.3 Patch 3 build 1314 and earlier, allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a long encrypted password, which triggers the overflow in (1) cgiChkMasterPwd.exe, (2) policyserver.exe as reachable through cgiABLogon.exe, and other vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/officescaz-adv.txt">http://aluigi.altervista.org/adv/officescaz-adv.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28020">28020</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019523">1019523</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0702">ADV-2008-0702</ref>
    </refs>
    <vuln_soft>
      <prod name="officescan_corporate_edition" vendor="trend_micro">
        <vers num="7.3_patch3_build1314" prev="1"/>
        <vers num="8.0_patch2_build1189" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1366" seq="2008-1366" published="2008-03-17" modified="2011-03-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Trend Micro OfficeScan Corporate Edition 8.0 Patch 2 build 1189 and earlier, and 7.3 Patch 3 build 1314 and earlier, allows remote attackers to cause a denial of service (process consumption) via (1) an HTTP request without a Content-Length header or (2) invalid characters in unspecified CGI arguments, which triggers a NULL pointer dereference.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/officescaz-adv.txt">http://aluigi.altervista.org/adv/officescaz-adv.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28020">28020</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019522">1019522</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0702">ADV-2008-0702</ref>
    </refs>
    <vuln_soft>
      <prod name="officescan_corporate_edition" vendor="trend_micro">
        <vers num="7.3_patch3_build1314" prev="1"/>
        <vers num="8.0_patch2_build1189" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1367" seq="2008-1367" published="2008-03-17" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">gcc 4.3.x does not generate a cld instruction while compiling functions used for string manipulation such as memcpy and memmove on x86 and i386, which can prevent the direction flag (DF) from being reset in violation of ABI conventions and cause data to be copied in the wrong direction during signal handling in the Linux kernel, which might allow context-dependent attackers to trigger memory corruption. NOTE: this issue was originally reported for CPU consumption in SBCL.</descript>
      <descript source="nvd">Subscription required to access Link 1014774</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=469058">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=469058</ref>
      <ref source="MLIST" url="http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00417.html">[gcc-patches] 20080306 [PATCH, i386]: Emit cld instruction when stringops are used</ref>
      <ref source="MLIST" url="http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00428.html">[gcc-patches] 20080306 Re: [PATCH, i386]: Emit cld instruction when stringops are used</ref>
      <ref source="MLIST" url="http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00432.html">[gcc-patches] 20080306 Re: [PATCH, i386]: Emit cld instruction when stringops are used</ref>
      <ref source="MLIST" url="http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00499.html">[gcc-patches] 20080307 Re: [PATCH, i386]: Emit cld instruction when stringops are used</ref>
      <ref source="CONFIRM" url="http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=e40cd10ccff3d9fbffd57b93780bee4b7b9bff51">http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=e40cd10ccff3d9fbffd57b93780bee4b7b9bff51</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html">SUSE-SA:2008:030</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00000.html">SUSE-SA:2008:031</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00002.html">SUSE-SA:2008:032</ref>
      <ref source="MLIST" url="http://lists.vmware.com/pipermail/security-announce/2008/000023.html">[Security-announce] 20080728 VMSA-2008-00011 Updated ESX service console packages for Samba and vmnix</ref>
      <ref source="MLIST" url="http://lkml.org/lkml/2008/3/5/207">[linux-kernel] 20080305 Linux doesn't follow x86/x86-64 ABI wrt direction flag</ref>
      <ref source="MISC" url="http://lwn.net/Articles/272048/#Comments">http://lwn.net/Articles/272048/#Comments</ref>
      <ref source="MLIST" url="http://marc.info/?l=git-commits-head&amp;m=120492000901739&amp;w=2">[git-commits-head] 20080307 x86: clear DF before calling signal handler</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2008-0508.html">RHSA-2008:0508</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0211.html">RHSA-2008:0211</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0233.html">RHSA-2008:0233</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29084">29084</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2222/references">ADV-2008-2222</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=437312">https://bugzilla.redhat.com/show_bug.cgi?id=437312</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41340">gcc-cld-dos(41340)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11108">oval:org.mitre.oval:def:11108</ref>
    </refs>
    <vuln_soft>
      <prod name="gcc" vendor="gnu">
        <vers num="4.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1368" seq="2008-1368" published="2008-03-17" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">CRLF injection vulnerability in Microsoft Internet Explorer 5 and 6 allows remote attackers to execute arbitrary FTP commands via an ftp:// URL that contains a URL-encoded CRLF (%0D%0A) before the FTP command, which causes the commands to be inserted into an authenticated FTP connection established earlier in the same browser session, as demonstrated using a DELE command, a variant or possibly a regression of CVE-2004-1166.  NOTE: a trailing "//" can force Internet Explorer to try to reuse an existing authenticated connection.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3750">3750</ref>
      <ref source="MISC" url="http://www.rapid7.com/advisories/R7-0032.jsp">http://www.rapid7.com/advisories/R7-0032.jsp</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489500/100/0/threaded">20080313 Rapid7 Advisory R7-0032: Microsoft Internet Explorer FTP Command Injection Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28208">28208</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0870">ADV-2008-0870</ref>
    </refs>
    <vuln_soft>
      <prod name="ie" vendor="microsoft">
        <vers num="5"/>
        <vers num="6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1369" seq="2008-1369" published="2008-03-18" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">A certain incorrect Sun Solaris 10 image on SPARC Enterprise T5120 and T5220 servers has /etc/default/login and /etc/ssh/sshd_config files that configure root logins in a manner unintended by the vendor, which allows remote attackers to gain privileges via unspecified vectors.</descript>
      <descript source="nvd">Sun link will not execute.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28469">28469</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019708">1019708</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0810/references">ADV-2008-0810</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41332">sparc-configuration-privilege-escalation(41332)</ref>
    </refs>
    <vuln_soft>
      <prod name="sunos" vendor="sun">
        <vers num="5.10"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1370" seq="2008-1370" published="2008-03-18" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in index.php in wildmary Yap Blog 1.1 allows remote attackers to execute arbitrary PHP code via a URL in the page parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28120">28120</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41049">yapblog-index-file-include(41049)</ref>
    </refs>
    <vuln_soft>
      <prod name="yap_blog" vendor="wildmary">
        <vers num="1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1371" seq="2008-1371" published="2008-03-18" modified="2017-08-07" severity="Low" CVSS_version="2.0" CVSS_score="3.6" CVSS_base_score="3.6" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Absolute path traversal vulnerability in install/index.php in Drake CMS 0.4.11 RC8 allows remote attackers to read and execute arbitrary files via a full pathname in the d_root parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
      <descript source="nvd">CVE description identifies vulnerability as remote attacker, but both links describe vulnerability as local-file inclusion.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28165">28165</ref>
      <ref source="MISC" url="http://www.securityfocus.com/bid/28165/exploit">http://www.securityfocus.com/bid/28165/exploit</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41345">drake-cms-index-file-include(41345)</ref>
    </refs>
    <vuln_soft>
      <prod name="drake_cms" vendor="drake_team">
        <vers num="0.4.11_rc8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1372" seq="2008-1372" published="2008-03-18" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">bzlib.c in bzip2 before 1.0.5 allows user-assisted remote attackers to cause a denial of service (crash) via a crafted file that triggers a buffer over-read, as demonstrated by the PROTOS GENOME test suite for Archive Formats.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="NETBSD" url="ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-004.txt.asc">NetBSD-SA2008-004</ref>
      <ref source="CONFIRM" url="http://kb.vmware.com/kb/1006982">http://kb.vmware.com/kb/1006982</ref>
      <ref source="CONFIRM" url="http://kb.vmware.com/kb/1007198">http://kb.vmware.com/kb/1007198</ref>
      <ref source="CONFIRM" url="http://kb.vmware.com/kb/1007504">http://kb.vmware.com/kb/1007504</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2009/Aug/msg00001.html">APPLE-SA-2009-08-05-1</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html">SUSE-SR:2008:011</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200903-40.xml">GLSA-200903-40</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-241786-1">241786</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3757">http://support.apple.com/kb/HT3757</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0118">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0118</ref>
      <ref source="CONFIRM" url="http://www.bzip.org/CHANGES">http://www.bzip.org/CHANGES</ref>
      <ref source="MISC" url="http://www.cert.fi/haavoittuvuudet/joint-advisory-archive-formats.html">http://www.cert.fi/haavoittuvuudet/joint-advisory-archive-formats.html</ref>
      <ref source="MISC" url="http://www.ee.oulu.fi/research/ouspg/protos/testing/c10/archive/">http://www.ee.oulu.fi/research/ouspg/protos/testing/c10/archive/</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200804-02.xml">GLSA-200804-02</ref>
      <ref source="CONFIRM" url="http://www.ipcop.org/index.php?name=News&amp;file=article&amp;sid=40">http://www.ipcop.org/index.php?name=News&amp;file=article&amp;sid=40</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/813451">VU#813451</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:075">MDVSA-2008:075</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0893.html">RHSA-2008:0893</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489968/100/0/threaded">20080321 rPSA-2008-0118-1 bzip2</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/498863/100/0/threaded">20081203 VMSA-2008-0019 VMware Hosted products and patches for ESX and ESXi resolve a critical security issue and update bzip2</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28286">28286</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020867">1020867</ref>
      <ref source="SLACKWARE" url="http://www.slackware.org/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.473263">SSA:2008-098-02</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA09-218A.html">TA09-218A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0915">ADV-2008-0915</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2557">ADV-2008-2557</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/2172">ADV-2009-2172</ref>
      <ref source="CONFIRM" url="https://bugs.gentoo.org/attachment.cgi?id=146488&amp;action=view">https://bugs.gentoo.org/attachment.cgi?id=146488&amp;action=view</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41249">bzip2-archives-code-execution(41249)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10067">oval:org.mitre.oval:def:10067</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6467">oval:org.mitre.oval:def:6467</ref>
      <ref source="UBUNTU" url="https://usn.ubuntu.com/590-1/">USN-590-1</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00165.html">FEDORA-2008-2970</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00225.html">FEDORA-2008-3037</ref>
    </refs>
    <vuln_soft>
      <prod name="bzip2" vendor="bzip">
        <vers num="0.9"/>
        <vers num="0.9.5a"/>
        <vers num="0.9.5b"/>
        <vers num="0.9.5c"/>
        <vers num="0.9.5d"/>
        <vers num="0.9_a"/>
        <vers num="0.9_b"/>
        <vers num="0.9_c"/>
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1373" seq="2008-1373" published="2008-04-03" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.8" CVSS_base_score="5.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="6.5" CVSS_vector="(AV:A/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in the gif_read_lzw function in CUPS 1.3.6 allows remote attackers to have an unknown impact via a GIF file with a large code_size value, a similar issue to CVE-2006-4484.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local_network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00003.html">SUSE-SA:2008:020</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200804-01.xml">GLSA-200804-01</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0136">http://wiki.rpath.com/Advisories:rPSA-2008-0136</ref>
      <ref source="CONFIRM" url="http://www.cups.org/str.php?L2765" patch="1">http://www.cups.org/str.php?L2765</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1625">DSA-1625</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:081">MDVSA-2008:081</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0192.html">RHSA-2008:0192</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0206.html">RHSA-2008:0206</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490486/100/0/threaded">20080404 rPSA-2008-0136-1 cups</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28544">28544</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019739">1019739</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-598-1">USN-598-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1059/references">ADV-2008-1059</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41587">cups-gifreadlzw-bo(41587)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11479">oval:org.mitre.oval:def:11479</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00091.html">FEDORA-2008-2131</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00105.html">FEDORA-2008-2897</ref>
    </refs>
    <vuln_soft>
      <prod name="cups" vendor="easy_software_products">
        <vers num="1.3.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1374" seq="2008-1374" published="2008-04-03" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.4" CVSS_base_score="5.4" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="5.5" CVSS_vector="(AV:A/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Integer overflow in pdftops filter in CUPS in Red Hat Enterprise Linux 3 and 4, when running on 64-bit platforms, allows remote attackers to execute arbitrary code via a crafted PDF file.  NOTE: this issue is due to an incomplete fix for CVE-2004-0888.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local_network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0245">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0245</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0206.html">RHSA-2008:0206</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/495164/100/0/threaded">20080806 rPSA-2008-0245-1 cups</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41758">cups-pdftops-bo(41758)</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2390">https://issues.rpath.com/browse/RPL-2390</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9636">oval:org.mitre.oval:def:9636</ref>
    </refs>
    <vuln_soft>
      <prod name="cups" vendor="easy_software_products">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1375" seq="2008-1375" published="2008-05-02" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.9" CVSS_base_score="6.9" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Race condition in the directory notification subsystem (dnotify) in Linux kernel 2.6.x before 2.6.24.6, and 2.6.25 before 2.6.25.1, allows local users to cause a denial of service (OOPS) and possibly gain privileges via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html">SUSE-SA:2008:030</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00000.html">SUSE-SA:2008:031</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00002.html">SUSE-SA:2008:032</ref>
      <ref source="MLIST" url="http://lists.vmware.com/pipermail/security-announce/2008/000023.html">[Security-announce] 20080728 VMSA-2008-00011 Updated ESX service console packages for Samba and vmnix</ref>
      <ref source="MLIST" url="http://marc.info/?l=linux-kernel&amp;m=120967963803205&amp;w=2" patch="1">[linux-kernel] 20080501 Linux 2.6.24.6</ref>
      <ref source="MLIST" url="http://marc.info/?l=linux-kernel&amp;m=120967964303224&amp;w=2" patch="1">[linux-kernel] 20080501 Linux 2.6.25.1</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0157">http://wiki.rpath.com/Advisories:rPSA-2008-0157</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0157">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0157</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1565">DSA-1565</ref>
      <ref source="CONFIRM" url="http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.36.4">http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.36.4</ref>
      <ref source="CONFIRM" url="http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.24.6">http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.24.6</ref>
      <ref source="CONFIRM" url="http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.1">http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.1</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:104">MDVSA-2008:104</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:105">MDVSA-2008:105</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:167">MDVSA-2008:167</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0211.html">RHSA-2008:0211</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0233.html">RHSA-2008:0233</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0237.html">RHSA-2008:0237</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491566/100/0/threaded">20080502 rPSA-2008-0157-1 kernel</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491732/100/0/threaded">20080507 rPSA-2008-0157-1 kernel</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29003">29003</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019959">1019959</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-618-1">USN-618-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1406/references" adv="1">ADV-2008-1406</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1452/references">ADV-2008-1452</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2222/references" adv="1">ADV-2008-2222</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42131">linux-kernel-dnotify-privilege-escalation(42131)</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2501">https://issues.rpath.com/browse/RPL-2501</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11843">oval:org.mitre.oval:def:11843</ref>
      <ref source="UBUNTU" url="https://usn.ubuntu.com/614-1/">USN-614-1</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00232.html">FEDORA-2008-3873</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.6.0"/>
        <vers num="2.6.1" edition="rc1"/>
        <vers num="2.6.1" edition="rc2"/>
        <vers num="2.6.1" edition="rc3"/>
        <vers num="2.6.2" edition="rc1"/>
        <vers num="2.6.2" edition="rc2"/>
        <vers num="2.6.2" edition="rc3"/>
        <vers num="2.6.3" edition="rc1"/>
        <vers num="2.6.3" edition="rc2"/>
        <vers num="2.6.3" edition="rc3"/>
        <vers num="2.6.3" edition="rc4"/>
        <vers num="2.6.4" edition="rc1"/>
        <vers num="2.6.4" edition="rc2"/>
        <vers num="2.6.4" edition="rc3"/>
        <vers num="2.6.5" edition="rc1"/>
        <vers num="2.6.5" edition="rc2"/>
        <vers num="2.6.5" edition="rc3"/>
        <vers num="2.6.6" edition="rc1"/>
        <vers num="2.6.6" edition="rc2"/>
        <vers num="2.6.6" edition="rc3"/>
        <vers num="2.6.7" edition="rc1"/>
        <vers num="2.6.7" edition="rc2"/>
        <vers num="2.6.7" edition="rc3"/>
        <vers num="2.6.8" edition="rc1"/>
        <vers num="2.6.8" edition="rc2"/>
        <vers num="2.6.8" edition="rc3"/>
        <vers num="2.6.8" edition="rc4"/>
        <vers num="2.6.8.1"/>
        <vers num="2.6.9" edition="rc1"/>
        <vers num="2.6.9" edition="rc2"/>
        <vers num="2.6.9" edition="rc3"/>
        <vers num="2.6.9" edition="rc4"/>
        <vers num="2.6.10" edition="rc1"/>
        <vers num="2.6.10" edition="rc2"/>
        <vers num="2.6.10" edition="rc3"/>
        <vers num="2.6.11" edition="rc1"/>
        <vers num="2.6.11" edition="rc2"/>
        <vers num="2.6.11" edition="rc3"/>
        <vers num="2.6.11" edition="rc4"/>
        <vers num="2.6.11" edition="rc5"/>
        <vers num="2.6.11.1"/>
        <vers num="2.6.11.2"/>
        <vers num="2.6.11.3"/>
        <vers num="2.6.11.4"/>
        <vers num="2.6.11.5"/>
        <vers num="2.6.11.6"/>
        <vers num="2.6.11.7"/>
        <vers num="2.6.11.8"/>
        <vers num="2.6.11.9"/>
        <vers num="2.6.11.10"/>
        <vers num="2.6.11.11"/>
        <vers num="2.6.11.12"/>
        <vers num="2.6.12" edition="rc1"/>
        <vers num="2.6.12" edition="rc2"/>
        <vers num="2.6.12" edition="rc3"/>
        <vers num="2.6.12" edition="rc4"/>
        <vers num="2.6.12" edition="rc5"/>
        <vers num="2.6.12" edition="rc6"/>
        <vers num="2.6.12.1"/>
        <vers num="2.6.12.2"/>
        <vers num="2.6.12.3"/>
        <vers num="2.6.12.4"/>
        <vers num="2.6.12.5"/>
        <vers num="2.6.12.6"/>
        <vers num="2.6.13" edition="rc1"/>
        <vers num="2.6.13" edition="rc2"/>
        <vers num="2.6.13" edition="rc3"/>
        <vers num="2.6.13" edition="rc4"/>
        <vers num="2.6.13" edition="rc5"/>
        <vers num="2.6.13" edition="rc6"/>
        <vers num="2.6.13" edition="rc7"/>
        <vers num="2.6.13.1"/>
        <vers num="2.6.13.2"/>
        <vers num="2.6.13.3"/>
        <vers num="2.6.13.4"/>
        <vers num="2.6.13.5"/>
        <vers num="2.6.14" edition="rc1"/>
        <vers num="2.6.14" edition="rc2"/>
        <vers num="2.6.14" edition="rc3"/>
        <vers num="2.6.14" edition="rc4"/>
        <vers num="2.6.14" edition="rc5"/>
        <vers num="2.6.14.1"/>
        <vers num="2.6.14.2"/>
        <vers num="2.6.14.3"/>
        <vers num="2.6.14.4"/>
        <vers num="2.6.14.5"/>
        <vers num="2.6.14.6"/>
        <vers num="2.6.14.7"/>
        <vers num="2.6.15" edition="rc1"/>
        <vers num="2.6.15" edition="rc2"/>
        <vers num="2.6.15" edition="rc3"/>
        <vers num="2.6.15" edition="rc4"/>
        <vers num="2.6.15" edition="rc5"/>
        <vers num="2.6.15" edition="rc6"/>
        <vers num="2.6.15" edition="rc7"/>
        <vers num="2.6.15.1"/>
        <vers num="2.6.15.2"/>
        <vers num="2.6.15.3"/>
        <vers num="2.6.15.4"/>
        <vers num="2.6.15.5"/>
        <vers num="2.6.15.6"/>
        <vers num="2.6.15.7"/>
        <vers num="2.6.16" edition="rc1"/>
        <vers num="2.6.16" edition="rc2"/>
        <vers num="2.6.16" edition="rc3"/>
        <vers num="2.6.16" edition="rc4"/>
        <vers num="2.6.16" edition="rc5"/>
        <vers num="2.6.16" edition="rc6"/>
        <vers num="2.6.16.1"/>
        <vers num="2.6.16.2"/>
        <vers num="2.6.16.3"/>
        <vers num="2.6.16.4"/>
        <vers num="2.6.16.5"/>
        <vers num="2.6.16.6"/>
        <vers num="2.6.16.7"/>
        <vers num="2.6.16.8"/>
        <vers num="2.6.16.9"/>
        <vers num="2.6.16.10"/>
        <vers num="2.6.16.11"/>
        <vers num="2.6.16.12"/>
        <vers num="2.6.16.13"/>
        <vers num="2.6.16.14"/>
        <vers num="2.6.16.15"/>
        <vers num="2.6.16.16"/>
        <vers num="2.6.16.17"/>
        <vers num="2.6.16.18"/>
        <vers num="2.6.16.19"/>
        <vers num="2.6.16.20"/>
        <vers num="2.6.16.21"/>
        <vers num="2.6.16.22"/>
        <vers num="2.6.16.23"/>
        <vers num="2.6.16.24"/>
        <vers num="2.6.16.25"/>
        <vers num="2.6.16.26"/>
        <vers num="2.6.16.27"/>
        <vers num="2.6.16.28"/>
        <vers num="2.6.16.29"/>
        <vers num="2.6.16.30"/>
        <vers num="2.6.16.31"/>
        <vers num="2.6.16.32"/>
        <vers num="2.6.16.33"/>
        <vers num="2.6.16.34"/>
        <vers num="2.6.16.35"/>
        <vers num="2.6.16.36"/>
        <vers num="2.6.16.37"/>
        <vers num="2.6.16.38"/>
        <vers num="2.6.16.39"/>
        <vers num="2.6.16.40"/>
        <vers num="2.6.16.41"/>
        <vers num="2.6.16.42"/>
        <vers num="2.6.16.43"/>
        <vers num="2.6.16.44"/>
        <vers num="2.6.16.45"/>
        <vers num="2.6.16.46"/>
        <vers num="2.6.16.47"/>
        <vers num="2.6.16.48"/>
        <vers num="2.6.16.49"/>
        <vers num="2.6.16.50"/>
        <vers num="2.6.16.51"/>
        <vers num="2.6.16.52"/>
        <vers num="2.6.16.53"/>
        <vers num="2.6.16.54"/>
        <vers num="2.6.16.55"/>
        <vers num="2.6.16.56"/>
        <vers num="2.6.16.57"/>
        <vers num="2.6.16.58"/>
        <vers num="2.6.16.59"/>
        <vers num="2.6.16.60"/>
        <vers num="2.6.16.61"/>
        <vers num="2.6.16.62"/>
        <vers num="2.6.17" edition="rc1"/>
        <vers num="2.6.17" edition="rc2"/>
        <vers num="2.6.17" edition="rc3"/>
        <vers num="2.6.17" edition="rc4"/>
        <vers num="2.6.17" edition="rc5"/>
        <vers num="2.6.17" edition="rc6"/>
        <vers num="2.6.17.1"/>
        <vers num="2.6.17.2"/>
        <vers num="2.6.17.3"/>
        <vers num="2.6.17.4"/>
        <vers num="2.6.17.5"/>
        <vers num="2.6.17.6"/>
        <vers num="2.6.17.7"/>
        <vers num="2.6.17.8"/>
        <vers num="2.6.17.9"/>
        <vers num="2.6.17.10"/>
        <vers num="2.6.17.11"/>
        <vers num="2.6.17.12"/>
        <vers num="2.6.17.13"/>
        <vers num="2.6.17.14"/>
        <vers num="2.6.18" edition="rc1"/>
        <vers num="2.6.18" edition="rc2"/>
        <vers num="2.6.18" edition="rc3"/>
        <vers num="2.6.18" edition="rc4"/>
        <vers num="2.6.18" edition="rc5"/>
        <vers num="2.6.18" edition="rc6"/>
        <vers num="2.6.18" edition="rc7"/>
        <vers num="2.6.18.1"/>
        <vers num="2.6.18.2"/>
        <vers num="2.6.18.3"/>
        <vers num="2.6.18.4"/>
        <vers num="2.6.18.5"/>
        <vers num="2.6.18.6"/>
        <vers num="2.6.18.7"/>
        <vers num="2.6.18.8"/>
        <vers num="2.6.19" edition="rc1"/>
        <vers num="2.6.19" edition="rc2"/>
        <vers num="2.6.19" edition="rc3"/>
        <vers num="2.6.19" edition="rc4"/>
        <vers num="2.6.19" edition="rc5"/>
        <vers num="2.6.19" edition="rc6"/>
        <vers num="2.6.19.1"/>
        <vers num="2.6.19.2"/>
        <vers num="2.6.19.3"/>
        <vers num="2.6.19.4"/>
        <vers num="2.6.19.5"/>
        <vers num="2.6.19.6"/>
        <vers num="2.6.19.7"/>
        <vers num="2.6.20" edition="rc1"/>
        <vers num="2.6.20" edition="rc2"/>
        <vers num="2.6.20" edition="rc3"/>
        <vers num="2.6.20" edition="rc4"/>
        <vers num="2.6.20" edition="rc5"/>
        <vers num="2.6.20" edition="rc6"/>
        <vers num="2.6.20" edition="rc7"/>
        <vers num="2.6.20.1"/>
        <vers num="2.6.20.2"/>
        <vers num="2.6.20.3"/>
        <vers num="2.6.20.4"/>
        <vers num="2.6.20.5"/>
        <vers num="2.6.20.6"/>
        <vers num="2.6.20.7"/>
        <vers num="2.6.20.8"/>
        <vers num="2.6.20.9"/>
        <vers num="2.6.20.10"/>
        <vers num="2.6.20.11"/>
        <vers num="2.6.20.12"/>
        <vers num="2.6.20.13"/>
        <vers num="2.6.20.14"/>
        <vers num="2.6.20.15"/>
        <vers num="2.6.20.16"/>
        <vers num="2.6.20.17"/>
        <vers num="2.6.20.18"/>
        <vers num="2.6.20.19"/>
        <vers num="2.6.20.20"/>
        <vers num="2.6.20.21"/>
        <vers num="2.6.21" edition="rc1"/>
        <vers num="2.6.21" edition="rc2"/>
        <vers num="2.6.21" edition="rc3"/>
        <vers num="2.6.21" edition="rc4"/>
        <vers num="2.6.21" edition="rc5"/>
        <vers num="2.6.21" edition="rc6"/>
        <vers num="2.6.21" edition="rc7"/>
        <vers num="2.6.21.1"/>
        <vers num="2.6.21.2"/>
        <vers num="2.6.21.3"/>
        <vers num="2.6.21.4"/>
        <vers num="2.6.21.5"/>
        <vers num="2.6.21.6"/>
        <vers num="2.6.21.7"/>
        <vers num="2.6.22" edition="rc1"/>
        <vers num="2.6.22" edition="rc2"/>
        <vers num="2.6.22" edition="rc3"/>
        <vers num="2.6.22" edition="rc4"/>
        <vers num="2.6.22" edition="rc5"/>
        <vers num="2.6.22" edition="rc6"/>
        <vers num="2.6.22" edition="rc7"/>
        <vers num="2.6.22.1"/>
        <vers num="2.6.22.2"/>
        <vers num="2.6.22.3"/>
        <vers num="2.6.22.4"/>
        <vers num="2.6.22.5"/>
        <vers num="2.6.22.6"/>
        <vers num="2.6.22.7"/>
        <vers num="2.6.22.8"/>
        <vers num="2.6.22.9"/>
        <vers num="2.6.22.10"/>
        <vers num="2.6.22.11"/>
        <vers num="2.6.22.12"/>
        <vers num="2.6.22.13"/>
        <vers num="2.6.22.14"/>
        <vers num="2.6.22.15"/>
        <vers num="2.6.22.16"/>
        <vers num="2.6.22.17"/>
        <vers num="2.6.22.18"/>
        <vers num="2.6.22.19"/>
        <vers num="2.6.22.20"/>
        <vers num="2.6.22.21"/>
        <vers num="2.6.22.22"/>
        <vers num="2.6.23" edition="rc1"/>
        <vers num="2.6.23" edition="rc2"/>
        <vers num="2.6.23" edition="rc3"/>
        <vers num="2.6.23" edition="rc4"/>
        <vers num="2.6.23" edition="rc5"/>
        <vers num="2.6.23" edition="rc6"/>
        <vers num="2.6.23" edition="rc7"/>
        <vers num="2.6.23" edition="rc8"/>
        <vers num="2.6.23" edition="rc9"/>
        <vers num="2.6.23.1"/>
        <vers num="2.6.23.2"/>
        <vers num="2.6.23.3"/>
        <vers num="2.6.23.4"/>
        <vers num="2.6.23.5"/>
        <vers num="2.6.23.6"/>
        <vers num="2.6.23.7"/>
        <vers num="2.6.23.8"/>
        <vers num="2.6.23.9"/>
        <vers num="2.6.23.10"/>
        <vers num="2.6.23.11"/>
        <vers num="2.6.23.12"/>
        <vers num="2.6.23.13"/>
        <vers num="2.6.23.14"/>
        <vers num="2.6.23.15"/>
        <vers num="2.6.23.16"/>
        <vers num="2.6.23.17"/>
        <vers num="2.6.24" edition="rc1"/>
        <vers num="2.6.24" edition="rc2"/>
        <vers num="2.6.24" edition="rc3"/>
        <vers num="2.6.24" edition="rc4"/>
        <vers num="2.6.24" edition="rc5"/>
        <vers num="2.6.24" edition="rc6"/>
        <vers num="2.6.24" edition="rc7"/>
        <vers num="2.6.24" edition="rc8"/>
        <vers num="2.6.24.1"/>
        <vers num="2.6.24.2"/>
        <vers num="2.6.24.3"/>
        <vers num="2.6.24.4"/>
        <vers num="2.6.24.5"/>
        <vers num="2.6.25"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1376" seq="2008-1376" published="2008-08-01" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">A certain Red Hat build script for nfs-utils before 1.0.9-35z.el5_2 on Red Hat Enterprise Linux (RHEL) 5 omits TCP wrappers support, which might allow remote attackers to bypass intended access restrictions.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0486.html">RHSA-2008:0486</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2009-0955.html">RHSA-2009:0955</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30466">30466</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020589">1020589</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/44256">redhat-nfsutils-weak-security(44256)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10638">oval:org.mitre.oval:def:10638</ref>
    </refs>
    <vuln_soft>
      <prod name="nfs_utils" vendor="redhat">
        <vers num="1.0.9" edition="35z.el5_2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1377" seq="2008-1377" published="2008-06-16" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.0" CVSS_base_score="9.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The (1) SProcRecordCreateContext and (2) SProcRecordRegisterClients functions in the Record extension and the (3) SProcSecurityGenerateAuthorization function in the Security extension in the X server 1.4 in X.Org X11R7.3 allow context-dependent attackers to execute arbitrary code via requests with crafted length values that specify an arbitrary number of bytes to be swapped on the heap, which triggers heap corruption.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-1377.diff">ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-1377.diff</ref>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01543321">SSRT080083</ref>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=721">20080611 Multiple Vendor X Server Record and Security Extensions Multiple Memory Corruption Vulnerabilities</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html">APPLE-SA-2009-02-12</ref>
      <ref source="MLIST" url="http://lists.freedesktop.org/archives/xorg/2008-June/036026.html">[xorg] 20080611 X.Org security advisory june 2008 - Multiple vulnerabilities in X server extensions</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html" patch="1">SUSE-SA:2008:027</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html">SUSE-SR:2008:019</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2008-0502.html" patch="1">RHSA-2008:0502</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2008-0504.html">RHSA-2008:0504</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2008-0512.html">RHSA-2008:0512</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200806-07.xml">GLSA-200806-07</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020247">1020247</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1">238686</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3438">http://support.apple.com/kb/HT3438</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm">http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1595" patch="1">DSA-1595</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml">GLSA-200807-07</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:115">MDVSA-2008:115</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:116">MDVSA-2008:116</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0503.html">RHSA-2008:0503</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493548/100/0/threaded">20080620 rPSA-2008-0200-1 xorg-server</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493550/100/0/threaded">20080621 rPSA-2008-0201-1 xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-616-1" patch="1">USN-616-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1803">ADV-2008-1803</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1833">ADV-2008-1833</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1983/references">ADV-2008-1983</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/3000">ADV-2008-3000</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2607">https://issues.rpath.com/browse/RPL-2607</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2619">https://issues.rpath.com/browse/RPL-2619</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10109">oval:org.mitre.oval:def:10109</ref>
    </refs>
    <vuln_soft>
      <prod name="x11" vendor="x">
        <vers num="r7.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1378" seq="2008-1378" published="2009-03-26" modified="2009-03-26" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2008-2360, CVE-2008-2361, CVE-2008-2362.  Reason: This candidate has been withdrawn by its CNA.  It was SPLIT into separate candidates before publication.  Notes: All CVE users should reference CVE-2008-2360, CVE-2008-2361, and CVE-2008-2362 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2008-1379" seq="2008-1379" published="2008-06-16" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:C/I:N/A:N)">
    <desc>
      <descript source="cve">Integer overflow in the fbShmPutImage function in the MIT-SHM extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent attackers to read arbitrary process memory via crafted values for a Pixmap width and height.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-1379.diff" patch="1">ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-1379.diff</ref>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01543321">SSRT080083</ref>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=722">20080611 Multiple Vendor X Server MIT-SHM Extension Information Disclosure Vulnerability</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html">APPLE-SA-2009-02-12</ref>
      <ref source="MLIST" url="http://lists.freedesktop.org/archives/xorg/2008-June/036026.html">[xorg] 20080611 X.Org security advisory june 2008 - Multiple vulnerabilities in X server extensions</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html">SUSE-SA:2008:027</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html">SUSE-SR:2008:019</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2008-0502.html">RHSA-2008:0502</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2008-0504.html">RHSA-2008:0504</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2008-0512.html">RHSA-2008:0512</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200806-07.xml">GLSA-200806-07</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020246">1020246</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1">238686</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3438">http://support.apple.com/kb/HT3438</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm">http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1595">DSA-1595</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml">GLSA-200807-07</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:115">MDVSA-2008:115</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:116">MDVSA-2008:116</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:179">MDVSA-2008:179</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0503.html">RHSA-2008:0503</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493548/100/0/threaded">20080620 rPSA-2008-0200-1 xorg-server</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493550/100/0/threaded">20080621 rPSA-2008-0201-1 xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29669" patch="1">29669</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-616-1">USN-616-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1803">ADV-2008-1803</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1833">ADV-2008-1833</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1983/references">ADV-2008-1983</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/3000">ADV-2008-3000</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43016">xorg-fbshmputimage-information-disclosure(43016)</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2607">https://issues.rpath.com/browse/RPL-2607</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2619">https://issues.rpath.com/browse/RPL-2619</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8966">oval:org.mitre.oval:def:8966</ref>
    </refs>
    <vuln_soft>
      <prod name="x11" vendor="x">
        <vers num="r7.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1380" seq="2008-1380" published="2008-04-17" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The JavaScript engine in Mozilla Firefox before 2.0.0.14, Thunderbird before 2.0.0.14, and SeaMonkey before 1.1.10 allows remote attackers to cause a denial of service (garbage collector crash) and possibly have other impacts via a crafted web page.  NOTE: this is due to an incorrect fix for CVE-2008-1237.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html">SUSE-SR:2008:011</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200808-03.xml">GLSA-200808-03</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.383152">SSA:2008-191-03</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.391769">SSA:2008-108-01</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1">238492</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1555">DSA-1555</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1558">DSA-1558</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1562">DSA-1562</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2009/dsa-1696">DSA-1696</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml">GLSA-200805-18</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/441529">VU#441529</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:110">MDVSA-2008:110</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/security/announce/2008/mfsa2008-20.html">http://www.mozilla.org/security/announce/2008/mfsa2008-20.html</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2008_13_sr.html">SUSE-SR:2008:013</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0222.html">RHSA-2008:0222</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0223.html">RHSA-2008:0223</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0224.html">RHSA-2008:0224</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491838/100/0/threaded">20080508 FLEA-2008-0008-1 firefox</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28818">28818</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019873">1019873</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-602-1">USN-602-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1251/references">ADV-2008-1251</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1793/references">ADV-2008-1793</ref>
      <ref source="MISC" url="https://bugzilla.mozilla.org/show_bug.cgi?id=425576">https://bugzilla.mozilla.org/show_bug.cgi?id=425576</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41857">mozilla-garbage-code-execution(41857)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10752">oval:org.mitre.oval:def:10752</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00407.html">FEDORA-2008-3231</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00463.html">FEDORA-2008-3264</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00058.html">FEDORA-2008-3519</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00074.html">FEDORA-2008-3557</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="2.0" edition="beta1"/>
        <vers num="2.0" edition="rc2"/>
        <vers num="2.0" edition="rc3"/>
        <vers num="2.0.0.1"/>
        <vers num="2.0.0.2"/>
        <vers num="2.0.0.3"/>
        <vers num="2.0.0.4"/>
        <vers num="2.0.0.5"/>
        <vers num="2.0.0.6"/>
        <vers num="2.0.0.7"/>
        <vers num="2.0.0.8"/>
        <vers num="2.0.0.9"/>
        <vers num="2.0.0.10"/>
        <vers num="2.0.0.11"/>
        <vers num="2.0.0.12"/>
        <vers num="2.0.0.13" prev="1"/>
      </prod>
      <prod name="seamonkey" vendor="mozilla">
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.4"/>
        <vers num="1.0.5"/>
        <vers num="1.0.6"/>
        <vers num="1.0.7"/>
        <vers num="1.0.8"/>
        <vers num="1.0.9"/>
        <vers num="1.0.99"/>
        <vers num="1.1"/>
        <vers num="1.1.2"/>
        <vers num="1.1.3"/>
        <vers num="1.1.4"/>
        <vers num="1.1.5"/>
        <vers num="1.1.6"/>
        <vers num="1.1.7"/>
        <vers num="1.1.8"/>
        <vers num="1.1.9" prev="1"/>
      </prod>
      <prod name="thunderbird" vendor="mozilla">
        <vers num="2.0.0.0"/>
        <vers num="2.0.0.1"/>
        <vers num="2.0.0.2"/>
        <vers num="2.0.0.3"/>
        <vers num="2.0.0.4"/>
        <vers num="2.0.0.5"/>
        <vers num="2.0.0.6"/>
        <vers num="2.0.0.8"/>
        <vers num="2.0.0.9"/>
        <vers num="2.0.0.11"/>
        <vers num="2.0.0.12"/>
        <vers num="2.0.0.13" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1381" seq="2008-1381" published="2008-05-01" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">ZoneMinder before 1.23.3 allows remote authenticated users, and possibly unauthenticated attackers in some installations, to execute arbitrary commands via shell metacharacters in a crafted URL.</descript>
    </desc>
    <sols>
      <sol source="nvd">The following link contains patch information: http://www.zoneminder.com/wiki/index.php/1.23.2_Patches</sol>
    </sols>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.awe.com/mark/blog/200804272230.html">http://www.awe.com/mark/blog/200804272230.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28968">28968</ref>
      <ref source="CONFIRM" url="http://www.zoneminder.com/wiki/index.php/Change_History#Release_1.23.3">http://www.zoneminder.com/wiki/index.php/Change_History#Release_1.23.3</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42046">zoneminder-unspecified-code-execution(42046)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00078.html">FEDORA-2008-3516</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00085.html">FEDORA-2008-3462</ref>
    </refs>
    <vuln_soft>
      <prod name="zoneminder" vendor="zoneminder">
        <vers num="0.0.1"/>
        <vers num="0.9.7"/>
        <vers num="0.9.8"/>
        <vers num="0.9.9"/>
        <vers num="0.9.10"/>
        <vers num="0.9.11"/>
        <vers num="0.9.12"/>
        <vers num="0.9.13"/>
        <vers num="0.9.14"/>
        <vers num="0.9.15"/>
        <vers num="0.9.16"/>
        <vers num="1.17.0"/>
        <vers num="1.17.1"/>
        <vers num="1.17.2"/>
        <vers num="1.18.0"/>
        <vers num="1.18.1"/>
        <vers num="1.19.0"/>
        <vers num="1.19.1"/>
        <vers num="1.19.2"/>
        <vers num="1.19.3"/>
        <vers num="1.19.4"/>
        <vers num="1.19.5"/>
        <vers num="1.20.0"/>
        <vers num="1.20.1"/>
        <vers num="1.21.0"/>
        <vers num="1.21.1"/>
        <vers num="1.21.2"/>
        <vers num="1.21.3"/>
        <vers num="1.21.4"/>
        <vers num="1.22.0"/>
        <vers num="1.22.1"/>
        <vers num="1.22.2"/>
        <vers num="1.22.3"/>
        <vers num="1.23.0"/>
        <vers num="1.23.1"/>
        <vers num="1.23.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1382" seq="2008-1382" published="2008-04-14" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">libpng 1.0.6 through 1.0.32, 1.2.0 through 1.2.26, and 1.4.0beta01 through 1.4.0beta19 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a PNG file with zero length "unknown" chunks, which trigger an access of uninitialized memory.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://libpng.sourceforge.net/Advisory-1.2.26.txt">http://libpng.sourceforge.net/Advisory-1.2.26.txt</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html">APPLE-SA-2008-09-15</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2009/May/msg00002.html">APPLE-SA-2009-05-12</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html">SUSE-SR:2008:010</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200804-15.xml">GLSA-200804-15</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200805-10.xml">GLSA-200805-10</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200812-15.xml">GLSA-200812-15</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.541247">SSA:2008-119-01</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-66-259989-1">259989</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020521.1-1">1020521</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3549">http://support.apple.com/kb/HT3549</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2009-208.htm">http://support.avaya.com/elmodocs2/security/ASA-2009-208.htm</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0151">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0151</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2009/dsa-1750">DSA-1750</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:156">MDVSA-2008:156</ref>
      <ref source="MISC" url="http://www.ocert.org/advisories/ocert-2008-003.html">http://www.ocert.org/advisories/ocert-2008-003.html</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2009-0333.html">RHSA-2009:0333</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490823/100/0/threaded">20080414 [oCERT-2008-003] libpng zero-length chunks incorrect handling</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491424/100/0/threaded">20080429 rPSA-2008-0151-1 libpng</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/503912/100/0/threaded">20090529 VMSA-2009-0007 VMware Hosted products and ESX and ESXi patches resolve security issues</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28770">28770</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019840">1019840</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-260A.html">TA08-260A</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA09-133A.html">TA09-133A</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2009-0007.html">http://www.vmware.com/security/advisories/VMSA-2009-0007.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1225/references">ADV-2008-1225</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2584">ADV-2008-2584</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/1297">ADV-2009-1297</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/1451">ADV-2009-1451</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/1462">ADV-2009-1462</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/1560">ADV-2009-1560</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41800">libpng-zero-length-code-execution(41800)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10326">oval:org.mitre.oval:def:10326</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6275">oval:org.mitre.oval:def:6275</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00033.html">FEDORA-2008-4847</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00080.html">FEDORA-2008-4910</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00111.html">FEDORA-2008-4947</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00721.html">FEDORA-2008-3683</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00951.html">FEDORA-2008-3979</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00960.html">FEDORA-2008-3937</ref>
    </refs>
    <vuln_soft>
      <prod name="libpng" vendor="libpng">
        <vers num="1.0.6" edition="a"/>
        <vers num="1.0.6" edition="d"/>
        <vers num="1.0.6" edition="e"/>
        <vers num="1.0.6" edition="f"/>
        <vers num="1.0.6" edition="g"/>
        <vers num="1.0.6" edition="h"/>
        <vers num="1.0.6" edition="i"/>
        <vers num="1.0.6" edition="j"/>
        <vers num="1.0.7" edition="beta11"/>
        <vers num="1.0.7" edition="beta12"/>
        <vers num="1.0.7" edition="beta13"/>
        <vers num="1.0.7" edition="beta14"/>
        <vers num="1.0.7" edition="beta15"/>
        <vers num="1.0.7" edition="beta16"/>
        <vers num="1.0.7" edition="beta17"/>
        <vers num="1.0.7" edition="beta18"/>
        <vers num="1.0.7" edition="rc1"/>
        <vers num="1.0.7" edition="rc2"/>
        <vers num="1.0.8" edition="beta1"/>
        <vers num="1.0.8" edition="beta2"/>
        <vers num="1.0.8" edition="beta3"/>
        <vers num="1.0.8" edition="beta4"/>
        <vers num="1.0.8" edition="rc1"/>
        <vers num="1.0.9" edition="beta1"/>
        <vers num="1.0.9" edition="beta10"/>
        <vers num="1.0.9" edition="beta2"/>
        <vers num="1.0.9" edition="beta3"/>
        <vers num="1.0.9" edition="beta4"/>
        <vers num="1.0.9" edition="beta5"/>
        <vers num="1.0.9" edition="beta6"/>
        <vers num="1.0.9" edition="beta7"/>
        <vers num="1.0.9" edition="beta8"/>
        <vers num="1.0.9" edition="beta9"/>
        <vers num="1.0.9" edition="rc1"/>
        <vers num="1.0.9" edition="rc2"/>
        <vers num="1.0.10" edition="beta1"/>
        <vers num="1.0.10" edition="rc1"/>
        <vers num="1.0.11" edition="beta1"/>
        <vers num="1.0.11" edition="beta2"/>
        <vers num="1.0.11" edition="beta3"/>
        <vers num="1.0.11" edition="rc1"/>
        <vers num="1.0.12" edition="beta1"/>
        <vers num="1.0.12" edition="rc1"/>
        <vers num="1.0.13"/>
        <vers num="1.0.14"/>
        <vers num="1.0.15" edition="rc1"/>
        <vers num="1.0.15" edition="rc2"/>
        <vers num="1.0.15" edition="rc3"/>
        <vers num="1.0.16"/>
        <vers num="1.0.17"/>
        <vers num="1.0.18"/>
        <vers num="1.0.19" edition="rc1"/>
        <vers num="1.0.19" edition="rc2"/>
        <vers num="1.0.19" edition="rc3"/>
        <vers num="1.0.19" edition="rc5"/>
        <vers num="1.0.20"/>
        <vers num="1.0.21" edition="rc1"/>
        <vers num="1.0.21" edition="rc2"/>
        <vers num="1.0.22" edition="rc1"/>
        <vers num="1.0.23" edition="rc1"/>
        <vers num="1.0.23" edition="rc2"/>
        <vers num="1.0.23" edition="rc3"/>
        <vers num="1.0.23" edition="rc4"/>
        <vers num="1.0.23" edition="rc5"/>
        <vers num="1.0.24" edition="rc1"/>
        <vers num="1.0.25" edition="rc1"/>
        <vers num="1.0.25" edition="rc2"/>
        <vers num="1.0.26"/>
        <vers num="1.0.27" edition="rc1"/>
        <vers num="1.0.27" edition="rc2"/>
        <vers num="1.0.27" edition="rc3"/>
        <vers num="1.0.27" edition="rc4"/>
        <vers num="1.0.27" edition="rc5"/>
        <vers num="1.0.27" edition="rc6"/>
        <vers num="1.0.28" edition="rc2"/>
        <vers num="1.0.28" edition="rc3"/>
        <vers num="1.0.28" edition="rc4"/>
        <vers num="1.0.28" edition="rc5"/>
        <vers num="1.0.28" edition="rc6"/>
        <vers num="1.0.29" edition="beta1"/>
        <vers num="1.0.29" edition="rc1"/>
        <vers num="1.0.29" edition="rc2"/>
        <vers num="1.0.29" edition="rc3"/>
        <vers num="1.0.30" edition="rc1"/>
        <vers num="1.0.31" edition="rc01"/>
        <vers num="1.0.32"/>
        <vers num="1.2.0" edition="beta1"/>
        <vers num="1.2.0" edition="beta2"/>
        <vers num="1.2.0" edition="beta3"/>
        <vers num="1.2.0" edition="beta4"/>
        <vers num="1.2.0" edition="beta5"/>
        <vers num="1.2.0" edition="rc1"/>
        <vers num="1.2.1" edition="beta1"/>
        <vers num="1.2.1" edition="beta2"/>
        <vers num="1.2.1" edition="beta3"/>
        <vers num="1.2.1" edition="beta4"/>
        <vers num="1.2.1" edition="rc1"/>
        <vers num="1.2.1" edition="rc2"/>
        <vers num="1.2.2" edition="beta1"/>
        <vers num="1.2.2" edition="beta2"/>
        <vers num="1.2.2" edition="beta3"/>
        <vers num="1.2.2" edition="beta4"/>
        <vers num="1.2.2" edition="beta5"/>
        <vers num="1.2.2" edition="beta6"/>
        <vers num="1.2.2" edition="rc1"/>
        <vers num="1.2.3" edition="rc1"/>
        <vers num="1.2.3" edition="rc2"/>
        <vers num="1.2.3" edition="rc3"/>
        <vers num="1.2.3" edition="rc4"/>
        <vers num="1.2.3" edition="rc5"/>
        <vers num="1.2.3" edition="rc6"/>
        <vers num="1.2.4" edition="beta1"/>
        <vers num="1.2.4" edition="beta2"/>
        <vers num="1.2.4" edition="beta3"/>
        <vers num="1.2.4" edition="rc1"/>
        <vers num="1.2.5" edition="beta1"/>
        <vers num="1.2.5" edition="beta2"/>
        <vers num="1.2.5" edition="rc1"/>
        <vers num="1.2.5" edition="rc2"/>
        <vers num="1.2.5" edition="rc3"/>
        <vers num="1.2.6" edition="beta1"/>
        <vers num="1.2.6" edition="beta2"/>
        <vers num="1.2.6" edition="beta3"/>
        <vers num="1.2.6" edition="beta4"/>
        <vers num="1.2.6" edition="rc1"/>
        <vers num="1.2.6" edition="rc2"/>
        <vers num="1.2.6" edition="rc3"/>
        <vers num="1.2.6" edition="rc4"/>
        <vers num="1.2.6" edition="rc5"/>
        <vers num="1.2.7" edition="beta1"/>
        <vers num="1.2.7" edition="beta2"/>
        <vers num="1.2.8" edition="beta1"/>
        <vers num="1.2.8" edition="beta2"/>
        <vers num="1.2.8" edition="beta3"/>
        <vers num="1.2.8" edition="beta4"/>
        <vers num="1.2.8" edition="beta5"/>
        <vers num="1.2.8" edition="rc1"/>
        <vers num="1.2.8" edition="rc2"/>
        <vers num="1.2.8" edition="rc3"/>
        <vers num="1.2.8" edition="rc4"/>
        <vers num="1.2.8" edition="rc5"/>
        <vers num="1.2.9" edition="beta1"/>
        <vers num="1.2.9" edition="beta10"/>
        <vers num="1.2.9" edition="beta2"/>
        <vers num="1.2.9" edition="beta3"/>
        <vers num="1.2.9" edition="beta4"/>
        <vers num="1.2.9" edition="beta5"/>
        <vers num="1.2.9" edition="beta6"/>
        <vers num="1.2.9" edition="beta7"/>
        <vers num="1.2.9" edition="beta8"/>
        <vers num="1.2.9" edition="beta9"/>
        <vers num="1.2.9" edition="rc1"/>
        <vers num="1.2.10" edition="beta1"/>
        <vers num="1.2.10" edition="beta2"/>
        <vers num="1.2.10" edition="beta3"/>
        <vers num="1.2.10" edition="beta4"/>
        <vers num="1.2.10" edition="beta5"/>
        <vers num="1.2.10" edition="beta6"/>
        <vers num="1.2.10" edition="beta7"/>
        <vers num="1.2.10" edition="rc1"/>
        <vers num="1.2.10" edition="rc2"/>
        <vers num="1.2.10" edition="rc3"/>
        <vers num="1.2.11" edition="beta1"/>
        <vers num="1.2.11" edition="beta2"/>
        <vers num="1.2.11" edition="beta3"/>
        <vers num="1.2.11" edition="beta4"/>
        <vers num="1.2.11" edition="rc1"/>
        <vers num="1.2.11" edition="rc2"/>
        <vers num="1.2.11" edition="rc3"/>
        <vers num="1.2.11" edition="rc5"/>
        <vers num="1.2.13" edition="beta1"/>
        <vers num="1.2.13" edition="rc1"/>
        <vers num="1.2.13" edition="rc2"/>
        <vers num="1.2.14" edition="beta1"/>
        <vers num="1.2.14" edition="beta2"/>
        <vers num="1.2.14" edition="rc1"/>
        <vers num="1.2.15" edition="beta1"/>
        <vers num="1.2.15" edition="beta2"/>
        <vers num="1.2.15" edition="beta3"/>
        <vers num="1.2.15" edition="beta4"/>
        <vers num="1.2.15" edition="beta5"/>
        <vers num="1.2.15" edition="beta6"/>
        <vers num="1.2.15" edition="rc1"/>
        <vers num="1.2.15" edition="rc2"/>
        <vers num="1.2.15" edition="rc3"/>
        <vers num="1.2.15" edition="rc4"/>
        <vers num="1.2.15" edition="rc5"/>
        <vers num="1.2.16" edition="beta1"/>
        <vers num="1.2.16" edition="beta2"/>
        <vers num="1.2.16" edition="rc1"/>
        <vers num="1.2.17" edition="beta1"/>
        <vers num="1.2.17" edition="beta2"/>
        <vers num="1.2.17" edition="rc1"/>
        <vers num="1.2.17" edition="rc2"/>
        <vers num="1.2.17" edition="rc3"/>
        <vers num="1.2.17" edition="rc4"/>
        <vers num="1.2.19" edition="beta1"/>
        <vers num="1.2.19" edition="beta10"/>
        <vers num="1.2.19" edition="beta11"/>
        <vers num="1.2.19" edition="beta12"/>
        <vers num="1.2.19" edition="beta13"/>
        <vers num="1.2.19" edition="beta14"/>
        <vers num="1.2.19" edition="beta15"/>
        <vers num="1.2.19" edition="beta16"/>
        <vers num="1.2.19" edition="beta17"/>
        <vers num="1.2.19" edition="beta18"/>
        <vers num="1.2.19" edition="beta19"/>
        <vers num="1.2.19" edition="beta2"/>
        <vers num="1.2.19" edition="beta20"/>
        <vers num="1.2.19" edition="beta21"/>
        <vers num="1.2.19" edition="beta22"/>
        <vers num="1.2.19" edition="beta23"/>
        <vers num="1.2.19" edition="beta24"/>
        <vers num="1.2.19" edition="beta25"/>
        <vers num="1.2.19" edition="beta26"/>
        <vers num="1.2.19" edition="beta27"/>
        <vers num="1.2.19" edition="beta28"/>
        <vers num="1.2.19" edition="beta29"/>
        <vers num="1.2.19" edition="beta3"/>
        <vers num="1.2.19" edition="beta30"/>
        <vers num="1.2.19" edition="beta31"/>
        <vers num="1.2.19" edition="beta4"/>
        <vers num="1.2.19" edition="beta5"/>
        <vers num="1.2.19" edition="beta6"/>
        <vers num="1.2.19" edition="beta7"/>
        <vers num="1.2.19" edition="beta8"/>
        <vers num="1.2.19" edition="beta9"/>
        <vers num="1.2.19" edition="rc1"/>
        <vers num="1.2.19" edition="rc2"/>
        <vers num="1.2.19" edition="rc3"/>
        <vers num="1.2.19" edition="rc4"/>
        <vers num="1.2.19" edition="rc5"/>
        <vers num="1.2.19" edition="rc6"/>
        <vers num="1.2.20" edition="beta01"/>
        <vers num="1.2.20" edition="beta02"/>
        <vers num="1.2.20" edition="beta03"/>
        <vers num="1.2.20" edition="beta04"/>
        <vers num="1.2.20" edition="rc1"/>
        <vers num="1.2.20" edition="rc2"/>
        <vers num="1.2.20" edition="rc3"/>
        <vers num="1.2.20" edition="rc4"/>
        <vers num="1.2.20" edition="rc5"/>
        <vers num="1.2.20" edition="rc6"/>
        <vers num="1.2.21" edition="rc3"/>
        <vers num="1.2.22" edition="beta1"/>
        <vers num="1.2.22" edition="beta2"/>
        <vers num="1.2.22" edition="beta2-1.2.21"/>
        <vers num="1.2.22" edition="beta3"/>
        <vers num="1.2.22" edition="beta3-1.2.21"/>
        <vers num="1.2.22" edition="beta4"/>
        <vers num="1.2.22" edition="beta4-1.2.21"/>
        <vers num="1.2.22" edition="rc1"/>
        <vers num="1.2.22" edition="rc1-1.2.21"/>
        <vers num="1.2.23" edition="beta01"/>
        <vers num="1.2.23" edition="beta02"/>
        <vers num="1.2.23" edition="beta03"/>
        <vers num="1.2.23" edition="beta04"/>
        <vers num="1.2.23" edition="beta05"/>
        <vers num="1.2.23" edition="rc01"/>
        <vers num="1.2.24" edition="beta01"/>
        <vers num="1.2.24" edition="beta02"/>
        <vers num="1.2.24" edition="beta03"/>
        <vers num="1.2.24" edition="rc01"/>
        <vers num="1.2.25" edition="beta01"/>
        <vers num="1.2.25" edition="beta02"/>
        <vers num="1.2.25" edition="beta03"/>
        <vers num="1.2.25" edition="beta04"/>
        <vers num="1.2.25" edition="beta05"/>
        <vers num="1.2.25" edition="beta06"/>
        <vers num="1.2.25" edition="rc01"/>
        <vers num="1.2.25" edition="rc02"/>
        <vers num="1.2.26" edition="beta01"/>
        <vers num="1.2.26" edition="beta02"/>
        <vers num="1.2.26" edition="beta03"/>
        <vers num="1.2.26" edition="beta04"/>
        <vers num="1.2.26" edition="beta05"/>
        <vers num="1.2.26" edition="beta06"/>
        <vers num="1.2.26" edition="rc01"/>
        <vers num="1.4" edition="beta1"/>
        <vers num="1.4" edition="beta10"/>
        <vers num="1.4" edition="beta11"/>
        <vers num="1.4" edition="beta12"/>
        <vers num="1.4" edition="beta13"/>
        <vers num="1.4" edition="beta14"/>
        <vers num="1.4" edition="beta15"/>
        <vers num="1.4" edition="beta16"/>
        <vers num="1.4" edition="beta17"/>
        <vers num="1.4" edition="beta18"/>
        <vers num="1.4" edition="beta19"/>
        <vers num="1.4" edition="beta2"/>
        <vers num="1.4" edition="beta3"/>
        <vers num="1.4" edition="beta4"/>
        <vers num="1.4" edition="beta5"/>
        <vers num="1.4" edition="beta6"/>
        <vers num="1.4" edition="beta7"/>
        <vers num="1.4" edition="beta8"/>
        <vers num="1.4" edition="beta9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1383" seq="2008-1383" published="2008-03-18" modified="2017-08-07" severity="Low" CVSS_version="2.0" CVSS_score="1.9" CVSS_base_score="1.9" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The docert function in ssl-cert.eclass, when used by src_compile or src_install on Gentoo Linux, stores the SSL key in a binpkg, which allows local users to extract the key from the binpkg, and causes multiple systems that use this binpkg to have the same SSL key and certificate.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200803-30.xml">GLSA-200803-30</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28350">28350</ref>
      <ref source="CONFIRM" url="https://bugs.gentoo.org/show_bug.cgi?id=174759">https://bugs.gentoo.org/show_bug.cgi?id=174759</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41336">gentoo-docert-sslkey-weak-security(41336)</ref>
    </refs>
    <vuln_soft>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1384" seq="2008-1384" published="2008-03-27" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Integer overflow in PHP 5.2.5 and earlier allows context-dependent attackers to cause a denial of service and possibly have unspecified other impact via a printf format parameter with a large width specifier, related to the php_sprintf_appendstring function in formatted_print.c and probably other functions for formatted strings (aka *printf functions).</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://cvs.php.net/viewvc.cgi/php-src/NEWS?revision=1.2027.2.547.2.1120&amp;view=markup">http://cvs.php.net/viewvc.cgi/php-src/NEWS?revision=1.2027.2.547.2.1120&amp;view=markup</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html">SUSE-SR:2008:014</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200811-05.xml">GLSA-200811-05</ref>
      <ref source="SREASONRES" url="http://securityreason.com/achievement_securityalert/52">20080320 PHP 5.2.5 and prior : *printf() functions Integer Overflow</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0176">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0176</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0178">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0178</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1572">DSA-1572</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2009:022">MDVSA-2009:022</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2009:023">MDVSA-2009:023</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489962/100/0/threaded">20080321 {securityreason.com}PHP 5 *printf() - Integer Overflow</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492535/100/0/threaded">20080523 rPSA-2008-0176-1 php php-cgi php-imap php-mcrypt php-mysql php-mysqli php-pgsql php-soap php-xsl php5 php5-cgi php5-imap php5-mcrypt php5-mysql php5-mysqli php5-pear php5-pgsql php5-soap php5-xsl</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492671/100/0/threaded">20080527 rPSA-2008-0178-1 php php-mysql php-pgsql</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28392">28392</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-628-1">USN-628-1</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41386">php-phpsprintfappendstring-overflow(41386)</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2503">https://issues.rpath.com/browse/RPL-2503</ref>
    </refs>
    <vuln_soft>
      <prod name="php" vendor="php">
        <vers num="5.2.5" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1385" seq="2008-1385" published="2008-04-23" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the Top Referrers (aka referrer) plugin in Serendipity (S9Y) before 1.3.1 allows remote attackers to inject arbitrary web script or HTML via the Referer HTTP header.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2008-04/0590.html">20080422 Correcting CVEs (was Re: [Full-disclosure] Cross site scripting issues in s9y (CVE-2008-1386, CVE-2008-1387))</ref>
      <ref source="CONFIRM" url="http://blog.s9y.org/archives/193-Serendipity-1.3.1-released.html" patch="1">http://blog.s9y.org/archives/193-Serendipity-1.3.1-released.html</ref>
      <ref source="MISC" url="http://int21.de/cve/CVE-2008-1385-s9y.html">http://int21.de/cve/CVE-2008-1385-s9y.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491176/100/0/threaded">20080422 Correcting CVEs (was Re: [Full-disclosure] Cross site scripting issues in s9y (CVE-2008-1386, CVE-2008-1387))</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28885" patch="1">28885</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019915">1019915</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1348/references">ADV-2008-1348</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41965">topreferrers-referer-xss(41965)</ref>
    </refs>
    <vuln_soft>
      <prod name="serendipity" vendor="s9y">
        <vers num="0.3"/>
        <vers num="0.4"/>
        <vers num="0.5_pl1"/>
        <vers num="0.6_pl3"/>
        <vers num="0.7"/>
        <vers num="0.7.1"/>
        <vers num="0.8"/>
        <vers num="0.8.1"/>
        <vers num="0.8.2"/>
        <vers num="0.8.3"/>
        <vers num="0.8.4"/>
        <vers num="0.8.5"/>
        <vers num="0.9"/>
        <vers num="0.9.1"/>
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.4"/>
        <vers num="1.1"/>
        <vers num="1.1.1"/>
        <vers num="1.1.2"/>
        <vers num="1.1.3"/>
        <vers num="1.1.4"/>
        <vers num="1.2"/>
        <vers num="1.2.1"/>
        <vers num="1.3" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1386" seq="2008-1386" published="2008-04-23" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in the installer in Serendipity (S9Y) 1.3 allow remote attackers to inject arbitrary web script or HTML via (1) unspecified path fields or (2) the database host field.  NOTE: the timing window for exploitation of this issue might be limited.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2008-04/0590.html">20080422 Correcting CVEs (was Re: [Full-disclosure] Cross site scripting issues in s9y (CVE-2008-1386, CVE-2008-1387))</ref>
      <ref source="CONFIRM" url="http://blog.s9y.org/archives/193-Serendipity-1.3.1-released.html">http://blog.s9y.org/archives/193-Serendipity-1.3.1-released.html</ref>
      <ref source="MISC" url="http://int21.de/cve/CVE-2008-1386-s9y.html">http://int21.de/cve/CVE-2008-1386-s9y.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491176/100/0/threaded">20080422 Correcting CVEs (was Re: [Full-disclosure] Cross site scripting issues in s9y (CVE-2008-1386, CVE-2008-1387))</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28885" patch="1">28885</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019915">1019915</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1348/references">ADV-2008-1348</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41967">serendipity-installer-xss(41967)</ref>
    </refs>
    <vuln_soft>
      <prod name="serendipity" vendor="s9y">
        <vers num="1.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1387" seq="2008-1387" published="2008-04-16" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">ClamAV before 0.93 allows remote attackers to cause a denial of service (CPU consumption) via a crafted ARJ archive, as demonstrated by the PROTOS GENOME test suite for Archive Formats.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://int21.de/cve/CVE-2008-1387-clamav.html">http://int21.de/cve/CVE-2008-1387-clamav.html</ref>
      <ref source="CONFIRM" url="http://kolab.org/security/kolab-vendor-notice-20.txt">http://kolab.org/security/kolab-vendor-notice-20.txt</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html">APPLE-SA-2008-09-15</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00009.html">SUSE-SA:2008:024</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200805-19.xml">GLSA-200805-19</ref>
      <ref source="CONFIRM" url="http://up2date.astaro.com/2008/08/up2date_asg_v7300_ga_released.html">http://up2date.astaro.com/2008/08/up2date_asg_v7300_ga_released.html</ref>
      <ref source="MISC" url="http://www.cert.fi/haavoittuvuudet/joint-advisory-archive-formats.html" patch="1">http://www.cert.fi/haavoittuvuudet/joint-advisory-archive-formats.html</ref>
      <ref source="MISC" url="http://www.ee.oulu.fi/research/ouspg/protos/testing/c10/archive/">http://www.ee.oulu.fi/research/ouspg/protos/testing/c10/archive/</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:088">MDVSA-2008:088</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490863/100/0/threaded">20080415 clamav: Endless loop / hang with crafter arj, CVE-2008-1387</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28782">28782</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28784">28784</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-260A.html">TA08-260A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1227/references">ADV-2008-1227</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2584">ADV-2008-2584</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41822">clamav-arj-unspecified-dos(41822)</ref>
      <ref source="CONFIRM" url="https://www.clamav.net/bugzilla/show_bug.cgi?id=897">https://www.clamav.net/bugzilla/show_bug.cgi?id=897</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00576.html">FEDORA-2008-3358</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00625.html">FEDORA-2008-3420</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00249.html">FEDORA-2008-3900</ref>
    </refs>
    <vuln_soft>
      <prod name="clamav" vendor="clam_anti-virus">
        <vers num="0.90"/>
        <vers num="0.90.1"/>
        <vers num="0.90_rc1.1"/>
        <vers num="0.90_rc2"/>
        <vers num="0.90_rc3"/>
        <vers num="0.90rc1"/>
        <vers num="0.91"/>
        <vers num="0.92"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1389" seq="2008-1389" published="2008-09-04" modified="2011-03-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">libclamav/chmunpack.c in the chm-parser in ClamAV before 0.94 allows remote attackers to cause a denial of service (application crash) via a malformed CHM file, related to an "invalid memory access."</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://int21.de/cve/CVE-2008-1389-clamav-chd.html">http://int21.de/cve/CVE-2008-1389-clamav-chd.html</ref>
      <ref source="CONFIRM" url="http://kolab.org/security/kolab-vendor-notice-22.txt">http://kolab.org/security/kolab-vendor-notice-22.txt</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html">APPLE-SA-2008-10-09</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html">SUSE-SR:2008:018</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200809-18.xml">GLSA-200809-18</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?group_id=86638&amp;release_id=623661" patch="1">http://sourceforge.net/project/shownotes.php?group_id=86638&amp;release_id=623661</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3216">http://support.apple.com/kb/HT3216</ref>
      <ref source="CONFIRM" url="http://svn.clamav.net/svn/clamav-devel/trunk/ChangeLog">http://svn.clamav.net/svn/clamav-devel/trunk/ChangeLog</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:189">MDVSA-2008:189</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30994">30994</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/31681">31681</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020805">1020805</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2484">ADV-2008-2484</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2564">ADV-2008-2564</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2780">ADV-2008-2780</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00332.html">FEDORA-2008-9644</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00348.html">FEDORA-2008-9651</ref>
      <ref source="CONFIRM" url="https://wwws.clamav.net/bugzilla/show_bug.cgi?id=1089">https://wwws.clamav.net/bugzilla/show_bug.cgi?id=1089</ref>
    </refs>
    <vuln_soft>
      <prod name="clamav" vendor="clam_anti-virus">
        <vers num="0.11"/>
        <vers num="0.12"/>
        <vers num="0.13"/>
        <vers num="0.14" edition="pre"/>
        <vers num="0.15"/>
        <vers num="0.20"/>
        <vers num="0.21"/>
        <vers num="0.22"/>
        <vers num="0.23"/>
        <vers num="0.24"/>
        <vers num="0.51"/>
        <vers num="0.52"/>
        <vers num="0.53"/>
        <vers num="0.54"/>
        <vers num="0.60"/>
        <vers num="0.60p"/>
        <vers num="0.65"/>
        <vers num="0.67"/>
        <vers num="0.68"/>
        <vers num="0.68.1"/>
        <vers num="0.70"/>
        <vers num="0.71"/>
        <vers num="0.72"/>
        <vers num="0.73"/>
        <vers num="0.74"/>
        <vers num="0.75"/>
        <vers num="0.75.1"/>
        <vers num="0.80" edition="rc"/>
        <vers num="0.80" edition="rc2"/>
        <vers num="0.80" edition="rc3"/>
        <vers num="0.80" edition="rc4"/>
        <vers num="0.81" edition="rc1"/>
        <vers num="0.82"/>
        <vers num="0.83"/>
        <vers num="0.84" edition="rc1"/>
        <vers num="0.84" edition="rc2"/>
        <vers num="0.85"/>
        <vers num="0.85.1"/>
        <vers num="0.86" edition="rc1"/>
        <vers num="0.86.1"/>
        <vers num="0.86.2"/>
        <vers num="0.87"/>
        <vers num="0.87.1"/>
        <vers num="0.88"/>
        <vers num="0.88.1"/>
        <vers num="0.88.2"/>
        <vers num="0.88.3"/>
        <vers num="0.88.4"/>
        <vers num="0.88.5"/>
        <vers num="0.88.6"/>
        <vers num="0.88.7"/>
        <vers num="0.90"/>
        <vers num="0.90.1"/>
        <vers num="0.90.2"/>
        <vers num="0.90.3"/>
        <vers num="0.91"/>
        <vers num="0.91.1"/>
        <vers num="0.91.2"/>
        <vers num="0.92"/>
        <vers num="0.92.1"/>
        <vers num="0.93"/>
        <vers num="0.93.1"/>
        <vers num="0.93.3" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1390" seq="2008-1390" published="2008-03-24" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The AsteriskGUI HTTP server in Asterisk Open Source 1.4.x before 1.4.19-rc3 and 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6, AsteriskNOW before 1.0.2, Appliance Developer Kit before revision 104704, and s800i 1.0.x before 1.1.0.2 generates insufficiently random manager ID values, which makes it easier for remote attackers to hijack a manager session via a series of ID guesses.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://downloads.digium.com/pub/security/AST-2008-005.html">http://downloads.digium.com/pub/security/AST-2008-005.html</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3764">3764</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489819/100/0/threaded">20080318 AST-2008-005: HTTP Manager ID is predictable</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28316">28316</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019679">1019679</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41304">asterisk-httpmanagerid-weak-security(41304)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html">FEDORA-2008-2554</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html">FEDORA-2008-2620</ref>
    </refs>
    <vuln_soft>
      <prod name="asterisk" vendor="asterisk">
        <vers num="1.4.1"/>
        <vers num="1.4.2"/>
        <vers num="1.4.3"/>
        <vers num="1.4.4"/>
        <vers num="1.4.5"/>
        <vers num="1.4.6"/>
        <vers num="1.4.7"/>
        <vers num="1.4.8"/>
        <vers num="1.4.9"/>
        <vers num="1.4.10"/>
        <vers num="1.4.11"/>
        <vers num="1.4.12"/>
        <vers num="1.4.13"/>
        <vers num="1.4.14"/>
        <vers num="1.4.15"/>
        <vers num="1.4.16"/>
        <vers num="1.4.17"/>
        <vers num="1.4.18.1"/>
        <vers num="1.4_beta"/>
        <vers num="1.4_revision_95946"/>
        <vers num="1.6"/>
      </prod>
      <prod name="asterisk_appliance_developer_kit" vendor="asterisk">
        <vers num="0.2"/>
        <vers num="0.3"/>
        <vers num="0.4"/>
        <vers num="0.5"/>
        <vers num="0.6"/>
        <vers num="0.7"/>
        <vers num="0.8"/>
        <vers num="1.4"/>
      </prod>
      <prod name="asterisk_business_edition" vendor="asterisk">
        <vers num="c.1.0-beta7"/>
        <vers num="c.1.0-beta8"/>
      </prod>
      <prod name="asterisknow" vendor="asterisk">
        <vers num="1.0"/>
        <vers num="beta_5"/>
        <vers num="beta_6"/>
        <vers num="beta_7"/>
      </prod>
      <prod name="s800i" vendor="asterisk">
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1391" seq="2008-1391" published="2008-03-27" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple integer overflows in libc in NetBSD 4.x, FreeBSD 6.x and 7.x, and probably other BSD and Apple Mac OS platforms allow context-dependent attackers to execute arbitrary code via large values of certain integer fields in the format argument to (1) the strfmon function in lib/libc/stdlib/strfmon.c, related to the GET_NUMBER macro; and (2) the printf function, related to left_prec and right_prec.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008//Dec/msg00000.html">APPLE-SA-2008-12-15</ref>
      <ref source="SREASONRES" url="http://securityreason.com/achievement_securityalert/53">20080325 *BSD libc (strfmon) Multiple vulnerabilities</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3770">3770</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3338">http://support.apple.com/kb/HT3338</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2010/dsa-2058">DSA-2058</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490158/100/0/threaded">20080327 [securityreason] *BSD libc (strfmon) Multiple vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28479">28479</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019722">1019722</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-350A.html">TA08-350A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/3444">ADV-2008-3444</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41504">bsd-strfmon-overflow(41504)</ref>
      <ref source="SUSE" url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00007.html">SUSE-SA:2010:052</ref>
    </refs>
    <vuln_soft>
      <prod name="freebsd" vendor="freebsd">
        <vers num="6.0" edition="release"/>
        <vers num="6.0" edition="stable"/>
        <vers num="6.0_p5_release"/>
        <vers num="7.0" edition="pre-release"/>
        <vers num="7.0_beta4"/>
        <vers num="7.0_releng"/>
      </prod>
      <prod name="netbsd" vendor="netbsd">
        <vers num="4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1392" seq="2008-1392" published="2008-03-19" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The default configuration of VMware Workstation 6.0.2, VMware Player 2.0.x before 2.0.3, and VMware ACE 2.0.x before 2.0.1 makes the console of the guest OS accessible through anonymous VIX API calls, which has unknown impact and attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MLIST" url="http://lists.vmware.com/pipermail/security-announce/2008/000008.html">[security-announce] 20080317 VMSA-2008-0005 Updated VMware Workstation, VMware Player, VMware Server, VMware ACE, and VMware Fusion resolve critical security issues</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-201209-25.xml">GLSA-201209-25</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3755">3755</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489739/100/0/threaded">20080318 VMSA-2008-0005 Updated VMware Workstation, VMware Player, VMware Server, VMware ACE, and VMware Fusion resolve critical security issues</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28276">28276</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2008-0005.html" adv="1" patch="1">http://www.vmware.com/security/advisories/VMSA-2008-0005.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html" adv="1" patch="1">http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/support/player2/doc/releasenotes_player2.html" adv="1" patch="1">http://www.vmware.com/support/player2/doc/releasenotes_player2.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html">http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41551">vmware-vix-api-unspecified(41551)</ref>
    </refs>
    <vuln_soft>
      <prod name="ace" vendor="vmware">
        <vers num="2.0" prev="1"/>
      </prod>
      <prod name="player" vendor="vmware">
        <vers num="2.0.2" prev="1"/>
      </prod>
      <prod name="vmware_workstation" vendor="vmware">
        <vers num="6.0.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1393" seq="2008-1393" published="2008-03-19" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Plone CMS 3.0.5, and probably other 3.x versions, places a base64 encoded form of the username and password in the __ac cookie for the admin account, which makes it easier for remote attackers to obtain administrative privileges by sniffing the network.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://plone.org/documentation/how-to/secure-login-without-plain-text-passwords">http://plone.org/documentation/how-to/secure-login-without-plain-text-passwords</ref>
      <ref source="MISC" url="http://plone.org/products/plone/roadmap/48?">http://plone.org/products/plone/roadmap/48?</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3754">3754</ref>
      <ref source="MISC" url="http://www.procheckup.com/Hacking_Plone_CMS.pdf">http://www.procheckup.com/Hacking_Plone_CMS.pdf</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489544/100/0/threaded">20080313 PR08-02: Plone CMS Security Research - the Art of Plowning</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41427">plone-accookie-admin-mitm(41427)</ref>
    </refs>
    <vuln_soft>
      <prod name="plone_cms" vendor="plone">
        <vers num="3" prev="1"/>
        <vers num="3.0.5" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1394" seq="2008-1394" published="2008-03-19" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Plone CMS before 3 places a base64 encoded form of the username and password in the __ac cookie for all user accounts, which makes it easier for remote attackers to obtain access by sniffing the network.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://plone.org/about/security/overview/security-overview-of-plone/">http://plone.org/about/security/overview/security-overview-of-plone/</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3754">3754</ref>
      <ref source="MISC" url="http://www.procheckup.com/Hacking_Plone_CMS.pdf">http://www.procheckup.com/Hacking_Plone_CMS.pdf</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489544/100/0/threaded">20080313 PR08-02: Plone CMS Security Research - the Art of Plowning</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41425">plone-accookie-mitm(41425)</ref>
    </refs>
    <vuln_soft>
      <prod name="plone_cms" vendor="plone">
        <vers num="2.0.5"/>
        <vers num="2.1.2"/>
        <vers num="2.1.3" edition="rc1"/>
        <vers num="2.5" edition="beta1"/>
        <vers num="2.5" edition="beta2"/>
        <vers num="2.5.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1395" seq="2008-1395" published="2008-03-19" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Plone CMS does not record users' authentication states, and implements the logout feature solely on the client side, which makes it easier for context-dependent attackers to reuse a logged-out session.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3754">3754</ref>
      <ref source="MISC" url="http://www.procheckup.com/Hacking_Plone_CMS.pdf">http://www.procheckup.com/Hacking_Plone_CMS.pdf</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489544/100/0/threaded">20080313 PR08-02: Plone CMS Security Research - the Art of Plowning</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41423">plone-authenticationstate-weak-security(41423)</ref>
    </refs>
    <vuln_soft>
      <prod name="plone_cms" vendor="plone">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1396" seq="2008-1396" published="2008-03-19" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Plone CMS 3.x uses invariant data (a client username and a server secret) when calculating an HMAC-SHA1 value for an authentication cookie, which makes it easier for remote attackers to gain permanent access to an account by sniffing the network.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3754">3754</ref>
      <ref source="MISC" url="http://www.procheckup.com/Hacking_Plone_CMS.pdf">http://www.procheckup.com/Hacking_Plone_CMS.pdf</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489544/100/0/threaded">20080313 PR08-02: Plone CMS Security Research - the Art of Plowning</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41421">plone-hmacsha1-mitm(41421)</ref>
    </refs>
    <vuln_soft>
      <prod name="plone_cms" vendor="plone">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1397" seq="2008-1397" published="2008-03-19" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Check Point VPN-1 Power/UTM, with NGX R60 through R65 and NG AI R55 software, allows remote authenticated users to cause a denial of service (site-to-site VPN tunnel outage), and possibly intercept network traffic, by configuring the local RFC1918 IP address to be the same as one of this tunnel's endpoint RFC1918 IP addresses, and then using SecuRemote to connect to a network interface at the other endpoint.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://puresecurity.com.au/index.php?action=fullnews&amp;id=5">http://puresecurity.com.au/index.php?action=fullnews&amp;id=5</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/992585">VU#992585</ref>
      <ref source="MISC" url="http://www.puresecurity.com.au/files/PureSecurity%20VPN-1%20DoS_Spoofing%20Attack%20against%20VPN%20tunnels.pdf">http://www.puresecurity.com.au/files/PureSecurity%20VPN-1%20DoS_Spoofing%20Attack%20against%20VPN%20tunnels.pdf</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28299">28299</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019666">1019666</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0953/references">ADV-2008-0953</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41260">vpn1-ipaddress-dos(41260)</ref>
      <ref source="CONFIRM" url="https://supportcenter.checkpoint.com/supportcenter/portal?solutionid=sk34579" patch="1">https://supportcenter.checkpoint.com/supportcenter/portal?solutionid=sk34579</ref>
    </refs>
    <vuln_soft>
      <prod name="check_point_vpn-1_pro" vendor="checkpoint">
        <vers num="ngx_r61"/>
        <vers num="ngx_r62_ga"/>
      </prod>
      <prod name="vpn-1" vendor="checkpoint">
        <vers num="ngx_r60" edition=":pro"/>
      </prod>
      <prod name="vpn-1_firewall-1" vendor="checkpoint">
        <vers num="ng_ai_r55"/>
      </prod>
      <prod name="vpn-1_power_utm" vendor="checkpoint">
        <vers num="ngx_r65_with_messaging_security"/>
      </prod>
      <prod name="vpn-1_power_utm_with_ngx" vendor="checkpoint">
        <vers num="r65"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1398" seq="2008-1398" published="2008-03-20" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in online.php in AuraCMS 2.0 through 2.2.1 allows remote attackers to execute arbitrary SQL commands via the X-Forwarded-For field (HTTP_X_FORWARDED_FOR environment variable) in an HTTP header.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28257">28257</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41217">auracms-online-sql-injection(41217)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5256">5256</ref>
    </refs>
    <vuln_soft>
      <prod name="auracms" vendor="auracms">
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="2.2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1399" seq="2008-1399" published="2008-03-20" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in index.php in Clansphere 2008 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28224">28224</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41190">clansphere-index-xss(41190)</ref>
    </refs>
    <vuln_soft>
      <prod name="clansphere" vendor="clansphere">
        <vers num="2008"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1400" seq="2008-1400" published="2008-03-20" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in the Net Inspector HTTP Server (mghttpd) in MG-SOFT Net Inspector 6.5.0.828 and earlier for Windows allows remote attackers to read arbitrary files via a "..\" (dot dot backslash) or "../" (dot dot slash) in the URI.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/netinsp-adv.txt">http://aluigi.altervista.org/adv/netinsp-adv.txt</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489704/100/0/threaded">20080317 Multiple vulnerabilities in Net Inspector 6.5.0.828</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28266">28266</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5269">5269</ref>
    </refs>
    <vuln_soft>
      <prod name="net_inspector" vendor="mg-soft">
        <vers num="6.5.0.828"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1401" seq="2008-1401" published="2008-03-20" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Format string vulnerability in the Net Inspector HTTP server (mghttpd) in MG-SOFT Net Inspector 6.5.0.828 and earlier for Windows allows remote attackers to execute arbitrary code via format string specifiers in the URI, which is recorded in a log file.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/netinsp-adv.txt">http://aluigi.altervista.org/adv/netinsp-adv.txt</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489704/100/0/threaded">20080317 Multiple vulnerabilities in Net Inspector 6.5.0.828</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28266">28266</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5269">5269</ref>
    </refs>
    <vuln_soft>
      <prod name="net_inspector" vendor="mg-soft">
        <vers num="windows" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1402" seq="2008-1402" published="2008-03-20" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.1" CVSS_base_score="7.1" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">MG-SOFT Net Inspector 6.5.0.828 and earlier for Windows allows remote attackers to cause a (1) denial of service (exception and crash) via a UDP packet to the SNMP Trap Service (MgWTrap3.exe) or (2) denial of service (device freeze or memory consumption) via a malformed request to the Net Inspector Server (niengine).</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/netinsp-adv.txt">http://aluigi.altervista.org/adv/netinsp-adv.txt</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489704/100/0/threaded">20080317 Multiple vulnerabilities in Net Inspector 6.5.0.828</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28266">28266</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5269">5269</ref>
    </refs>
    <vuln_soft>
      <prod name="net_inspector" vendor="mg-soft">
        <vers num="6.5.0.828" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1403" seq="2008-1403" published="2008-03-20" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the TFTP server in BootManage TFTPD 1.99 and earlier in BootManage Administrator 7.1 and earlier allows remote attackers to execute arbitrary code via a request with a long filename.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/bootixtftpd-adv.txt">http://aluigi.altervista.org/adv/bootixtftpd-adv.txt</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489705/100/0/threaded">20080317 Buffer-overflow in BootManage TFTPD 1.99</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28270">28270</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41226">bootmanage-tftpserver-filename-bo(41226)</ref>
    </refs>
    <vuln_soft>
      <prod name="administrator" vendor="bootmanage">
        <vers num="windows" prev="1"/>
      </prod>
      <prod name="tftpd" vendor="bootmanage">
        <vers num="windows" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1404" seq="2008-1404" published="2008-03-20" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the Viso (Industry Book) 2.04 and 2.03 module for eXV2 allows remote attackers to execute arbitrary SQL commands via the kid parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28255">28255</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41216">viso-index-sql-injection(41216)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5254">5254</ref>
    </refs>
    <vuln_soft>
      <prod name="exv2" vendor="exv2">
        <vers num="2.0.3" edition=":visio"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1405" seq="2008-1405" published="2008-03-20" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in code/display.php in fuzzylime (cms) 3.01 allows remote attackers to execute arbitrary PHP code via a URL in the admindir parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://irk4z.wordpress.com/2008/03/15/fuzzylime-cms-301-remote-file-inclusion-vulnerability/">http://irk4z.wordpress.com/2008/03/15/fuzzylime-cms-301-remote-file-inclusion-vulnerability/</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0912/references" adv="1">ADV-2008-0912</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41221">fuzzylime-display-file-include(41221)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5260">5260</ref>
    </refs>
    <vuln_soft>
      <prod name="fuzzylime" vendor="fuzzylime">
        <vers num="3.01"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1406" seq="2008-1406" published="2008-03-20" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in annonces-p-f.php in the MyAnnonces 1.8 module for eXV2 allows remote attackers to execute arbitrary SQL commands via the lid parameter in an ImprAnn action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28254">28254</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41214">myannonces-annoncespf-sql-injection(41214)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5252">5252</ref>
    </refs>
    <vuln_soft>
      <prod name="exv2" vendor="exv2">
        <vers num="1.8" edition=":myannonces"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1407" seq="2008-1407" published="2008-03-20" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the WebChat 1.60 module for eXV2 allows remote attackers to execute arbitrary SQL commands via the roomid parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28256">28256</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41213">webchat-index-sql-injection(41213)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5255">5255</ref>
    </refs>
    <vuln_soft>
      <prod name="exv2" vendor="exv2">
        <vers num="1.60" edition=":webchat"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1408" seq="2008-1408" published="2008-03-20" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in includes/functions/banners-external.php in phpBP 2 RC3 (2.204) FIX 4 allows remote attackers to execute arbitrary SQL commands via the id parameter in a banner_out action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://irk4z.wordpress.com/2008/03/16/phpbp-rc3-2204-fix4-remote-sql-injection-vulnerability/">http://irk4z.wordpress.com/2008/03/16/phpbp-rc3-2204-fix4-remote-sql-injection-vulnerability/</ref>
      <ref source="CONFIRM" url="http://www.phpbp.com/filedownload-phpbp2-RC3-204-fix5_22.html">http://www.phpbp.com/filedownload-phpbp2-RC3-204-fix5_22.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28272">28272</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0910/references">ADV-2008-0910</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41222">phpbp-index-sql-injection(41222)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5263">5263</ref>
    </refs>
    <vuln_soft>
      <prod name="phpbp" vendor="phpbp">
        <vers num="rc3_2.204" edition=":fix4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1409" seq="2008-1409" published="2008-03-20" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple directory traversal vulnerabilities in the Default theme in Exero CMS 1.0.1 allow remote attackers to include and execute arbitrary local files via directory traversal sequences in the theme parameter to (1) index.php, (2) editpassword.php, and (3) avatar.php in usercp/; (4) custompage.php; (5) errors/404.php; (6) memberslist.php and (7) profile.php in members/; (8) index.php and (9) fullview.php in news/; and (10) nopermission.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28273">28273</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0909/references">ADV-2008-0909</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41238">exerocms-theme-file-include(41238)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5265">5265</ref>
    </refs>
    <vuln_soft>
      <prod name="exero_cms" vendor="exero">
        <vers num="1.0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1410" seq="2008-1410" published="2008-03-20" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in the PXE Server (pxesrv.exe) in Acronis Snap Deploy 2.0.0.1076 and earlier allows remote attackers to read arbitrary files via directory traversal sequences to the TFTP service.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/acropxe-adv.txt">http://aluigi.altervista.org/adv/acropxe-adv.txt</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3758">3758</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489358/100/0/threaded">20080310 Directory traversal and NULL pointer in Acronis PXE Server 2.0.0.1076</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28182">28182</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0814/references">ADV-2008-0814</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41074">acronissnap-pxeserver-directory-traversal(41074)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5228">5228</ref>
    </refs>
    <vuln_soft>
      <prod name="snap_deploy" vendor="acronis">
        <vers num="2.0.0.1076"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1411" seq="2008-1411" published="2008-03-20" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The PXE Server (pxesrv.exe) in Acronis Snap Deploy 2.0.0.1076 and earlier allows remote attackers to cause a denial of service (crash) via an incomplete TFTP request, which triggers a NULL pointer dereference.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/acropxe-adv.txt">http://aluigi.altervista.org/adv/acropxe-adv.txt</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3758">3758</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489358/100/0/threaded">20080310 Directory traversal and NULL pointer in Acronis PXE Server 2.0.0.1076</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28182">28182</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0814/references">ADV-2008-0814</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41075">acronissnap-pxeserver-dos(41075)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5228">5228</ref>
    </refs>
    <vuln_soft>
      <prod name="snap_deploy" vendor="acronis">
        <vers num="2.0.0.1076"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1412" seq="2008-1412" published="2008-03-20" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in multiple F-Secure anti-virus products, including Internet Security 2006 through 2008, Anti-Virus 2006 through 2008, and others, allows remote attackers to execute arbitrary code or cause a denial of service (hang or crash) via a malformed archive that triggers an unhandled exception, as demonstrated by the PROTOS GENOME test suite for Archive Formats.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://support.f-secure.com/enu/corporate/downloads/hotfixes/av-cs-hotfixes.shtml">http://support.f-secure.com/enu/corporate/downloads/hotfixes/av-cs-hotfixes.shtml</ref>
      <ref source="CONFIRM" url="http://support.f-secure.com/enu/corporate/downloads/hotfixes/av-mimesweeper-hotfixes.shtml">http://support.f-secure.com/enu/corporate/downloads/hotfixes/av-mimesweeper-hotfixes.shtml</ref>
      <ref source="MISC" url="http://www.cert.fi/haavoittuvuudet/joint-advisory-archive-formats.html">http://www.cert.fi/haavoittuvuudet/joint-advisory-archive-formats.html</ref>
      <ref source="MISC" url="http://www.ee.oulu.fi/research/ouspg/protos/testing/c10/archive/">http://www.ee.oulu.fi/research/ouspg/protos/testing/c10/archive/</ref>
      <ref source="CONFIRM" url="http://www.f-secure.com/security/fsc-2008-2.shtml" patch="1">http://www.f-secure.com/security/fsc-2008-2.shtml</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28282">28282</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019618">1019618</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019619">1019619</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019620">1019620</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0903/references">ADV-2008-0903</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41234">fsecure-archives-code-execution(41234)</ref>
    </refs>
    <vuln_soft>
      <prod name="f-secure_anti-virus" vendor="f-secure">
        <vers num="2006"/>
        <vers num="2007" edition="second_edition"/>
        <vers num="2008"/>
      </prod>
      <prod name="f-secure_anti-virus_client_security" vendor="f-secure">
        <vers num="6.04" prev="1"/>
      </prod>
      <prod name="f-secure_anti-virus_for_linux" vendor="f-secure">
        <vers num="4.65" prev="1"/>
      </prod>
      <prod name="f-secure_anti-virus_for_workstations" vendor="f-secure">
        <vers num="7.11" prev="1"/>
      </prod>
      <prod name="f-secure_anti-virus_linux_client_security" vendor="f-secure">
        <vers num="5.54" prev="1"/>
      </prod>
      <prod name="f-secure_client_security" vendor="f-secure">
        <vers num="7.11" prev="1"/>
      </prod>
      <prod name="f-secure_internet_security" vendor="f-secure">
        <vers num="2006"/>
        <vers num="2007" edition="second_edition"/>
        <vers num="2008"/>
      </prod>
      <prod name="f-secure_mobile_antivirus_for_s60" vendor="f-secure">
        <vers num="2nd_edition"/>
      </prod>
      <prod name="f-secure_mobile_antivirus_for_windows_mobile" vendor="f-secure">
        <vers num="5.0"/>
        <vers num="6"/>
        <vers num="2003"/>
      </prod>
      <prod name="f-secure_mobile_security_for_series_80" vendor="f-secure">
        <vers num=""/>
      </prod>
      <prod name="f-secure_protection_service_for_business" vendor="f-secure">
        <vers num="3.10" prev="1"/>
      </prod>
      <prod name="f-secure_protection_service_for_consumers" vendor="f-secure">
        <vers num="7.00" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1413" seq="2008-1413" published="2008-03-20" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in search.php in SNewsCMS Rus 2.1 through 2.4 allows remote attackers to inject arbitrary web script or HTML via the query parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3757">3757</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489686/100/0/threaded">20080316 vuln in snewscms Rus v 2.3</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28262">28262</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41243">snewscms-search-xss(41243)</ref>
    </refs>
    <vuln_soft>
      <prod name="snews_cms_rus" vendor="snews">
        <vers num="2.1"/>
        <vers num="2.3"/>
        <vers num="2.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1414" seq="2008-1414" published="2008-03-20" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Multiple Time Sheets (MTS) 5.0 and earlier allows remote attackers to inject arbitrary web script or HTML via the tab parameter to (1) index.php, as demonstrated using mixed case and encoded whitespace characters in the tag; or (2) clientinfo.php, (3) invoices.php, (4) smartlinks.php, and (5) todo.php, as demonstrated using a META tag.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3756">3756</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489689/100/0/threaded">20080317 Mutiple Timesheets &lt;= 5.0 - Multiple Remote Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28263">28263</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0911/references">ADV-2008-0911</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41227">mts-index-xss(41227)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5262">5262</ref>
    </refs>
    <vuln_soft>
      <prod name="multiple_time_sheets" vendor="riceball">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1415" seq="2008-1415" published="2008-03-20" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in index.php in Multiple Time Sheets (MTS) 5.0 and earlier allows remote attackers to read arbitrary files via "../..//" (modified dot dot) sequences in the tab parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3756">3756</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489689/100/0/threaded">20080317 Mutiple Timesheets &lt;= 5.0 - Multiple Remote Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28263">28263</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0911/references">ADV-2008-0911</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5262">5262</ref>
    </refs>
    <vuln_soft>
      <prod name="multiple_time_sheets" vendor="riceball">
        <vers num="5.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1416" seq="2008-1416" published="2008-03-20" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple PHP remote file inclusion vulnerabilities in PHPauction GPL 2.51 allow remote attackers to execute arbitrary PHP code via a URL in the include_path parameter to (1) converter.inc.php, (2) messages.inc.php, and (3) settings.inc.php in includes/.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28284">28284</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0908/references">ADV-2008-0908</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41239">phpauction-includepath-file-include(41239)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5266">5266</ref>
    </refs>
    <vuln_soft>
      <prod name="phpauction_gpl" vendor="phpauction">
        <vers num="2.51"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1417" seq="2008-1417" published="2008-03-20" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.9" CVSS_base_score="6.9" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The prerm script in axyl 2.1.7 allows local users to overwrite arbitrary files via a symlink attack on the axyl.conf temporary file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=471227">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=471227</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41406">axyl-prerm-symlink(41406)</ref>
    </refs>
    <vuln_soft>
      <prod name="axyl" vendor="axyl">
        <vers num="2.1.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1419" seq="2008-1419" published="2008-05-16" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Xiph.org libvorbis 1.2.0 and earlier does not properly handle a zero value for codebook.dim, which allows remote attackers to cause a denial of service (crash or infinite loop) or trigger an integer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00001.html" adv="1">SUSE-SR:2008:012</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200806-09.xml" adv="1">GLSA-200806-09</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1591" adv="1">DSA-1591</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:102">MDVSA-2008:102</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0270.html">RHSA-2008:0270</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0271.html">RHSA-2008:0271</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29206" adv="1">29206</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020029" adv="1">1020029</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/USN-682-1" adv="1">USN-682-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1510/references">ADV-2008-1510</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=440700">https://bugzilla.redhat.com/show_bug.cgi?id=440700</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42397">libvorbis-ogg-bo(42397)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42400">libvorbis-ogg-dos(42400)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10104">oval:org.mitre.oval:def:10104</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00243.html" adv="1">FEDORA-2008-3934</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00247.html" adv="1">FEDORA-2008-3898</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00256.html" adv="1">FEDORA-2008-3910</ref>
    </refs>
    <vuln_soft>
      <prod name="libvorbis" vendor="xiph.org">
        <vers num="1.0.0"/>
        <vers num="1.0.1"/>
        <vers num="1.1.0"/>
        <vers num="1.1.1"/>
        <vers num="1.2.0"/>
        <vers num="1.12"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1420" seq="2008-1420" published="2008-05-16" modified="2018-10-03" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Integer overflow in residue partition value (aka partvals) evaluation in Xiph.org libvorbis 1.2.0 and earlier allows remote attackers to execute arbitrary code via a crafted OGG file, which triggers a heap overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00001.html" adv="1">SUSE-SR:2008:012</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200806-09.xml" adv="1">GLSA-200806-09</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1591" adv="1">DSA-1591</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:102">MDVSA-2008:102</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0270.html">RHSA-2008:0270</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0271.html">RHSA-2008:0271</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29206">29206</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020029" adv="1">1020029</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/USN-682-1" adv="1">USN-682-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1510/references">ADV-2008-1510</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=440706">https://bugzilla.redhat.com/show_bug.cgi?id=440706</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42402">libvorbis-residue-bo(42402)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9500">oval:org.mitre.oval:def:9500</ref>
      <ref source="UBUNTU" url="https://usn.ubuntu.com/825-1/">USN-825-1</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00243.html">FEDORA-2008-3934</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00247.html">FEDORA-2008-3898</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00256.html">FEDORA-2008-3910</ref>
    </refs>
    <vuln_soft>
      <prod name="libvorbis" vendor="xiph.org">
        <vers num="1.0.0"/>
        <vers num="1.0.1"/>
        <vers num="1.1.0"/>
        <vers num="1.1.1"/>
        <vers num="1.2.0"/>
        <vers num="1.12"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1421" seq="2008-1421" published="2017-08-10" modified="2017-08-10" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was withdrawn by its CNA.  Further investigation showed that it was not a security issue.  Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2008-1422" seq="2008-1422" published="2017-08-10" modified="2017-08-10" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2008-1419.  Reason: This candidate is a reservation duplicate of CVE-2008-1419.  Notes: All CVE users should reference CVE-2008-1419 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2008-1423" seq="2008-1423" published="2008-05-16" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Integer overflow in a certain quantvals and quantlist calculation in Xiph.org libvorbis 1.2.0 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted OGG file with a large virtual space for its codebook, which triggers a heap overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00001.html" adv="1">SUSE-SR:2008:012</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200806-09.xml" adv="1">GLSA-200806-09</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1591" adv="1">DSA-1591</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:102">MDVSA-2008:102</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0270.html">RHSA-2008:0270</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0271.html">RHSA-2008:0271</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29206" adv="1">29206</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020029" adv="1">1020029</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/USN-682-1" adv="1">USN-682-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1510/references">ADV-2008-1510</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=440709">https://bugzilla.redhat.com/show_bug.cgi?id=440709</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42403">libvorbis-quantvals-quantlist-bo(42403)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9851">oval:org.mitre.oval:def:9851</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00243.html">FEDORA-2008-3934</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00247.html">FEDORA-2008-3898</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00256.html">FEDORA-2008-3910</ref>
    </refs>
    <vuln_soft>
      <prod name="libvorbis" vendor="xiph.org">
        <vers num="1.0.0"/>
        <vers num="1.0.1"/>
        <vers num="1.1.0"/>
        <vers num="1.1.1"/>
        <vers num="1.1.2"/>
        <vers num="1.2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1425" seq="2008-1425" published="2008-03-20" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the gallery module in Easy-Clanpage 2.2 allows remote attackers to execute arbitrary SQL commands via the id parameter in a kate action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28309">28309</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41303">easyclanpage-index-sql-injection(41303)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5275">5275</ref>
    </refs>
    <vuln_soft>
      <prod name="easy-clanpage" vendor="easy-clanpage">
        <vers num="2.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1426" seq="2008-1426" published="2008-03-20" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in album.asp in KAPhotoservice allows remote attackers to execute arbitrary SQL commands via the albumid parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489891/100/0/threaded">20080320 KAPhotoservice (album.asp) Remote SQL Injection Exploit</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28306">28306</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41300">kaphotoservice-album-sql-injection(41300)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5274">5274</ref>
    </refs>
    <vuln_soft>
      <prod name="kaphotoservice" vendor="kaphotoservice">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1427" seq="2008-1427" published="2008-03-20" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the Joobi Acajoom (com_acajoom) 1.1.5 and 1.2.5 component for Joomla! allows remote attackers to execute arbitrary SQL commands via the mailingid parameter in a mailing view action to index.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28305">28305</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41290">acajoom-index-sql-injection(41290)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5273">5273</ref>
    </refs>
    <vuln_soft>
      <prod name="acajoom" vendor="joobi">
        <vers num="1.1.5"/>
        <vers num="1.2.5"/>
      </prod>
      <prod name="com_acajoom" vendor="joomla">
        <vers num="1.1.5"/>
        <vers num="1.2.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1428" seq="2008-1428" published="2008-03-20" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in the Ubercart 5.x before 5.x-1.0-beta7 module for Drupal allow remote attackers to inject arbitrary web script or HTML via a text attribute value for a product.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://drupal.org/node/233492" patch="1">http://drupal.org/node/233492</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0867/references">ADV-2008-0867</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41184">ubercart-attribute-xss(41184)</ref>
    </refs>
    <vuln_soft>
      <prod name="ubercart_module" vendor="drupal">
        <vers num="5-1.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1429" seq="2008-1429" published="2008-03-20" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Secure Internet Live Conferencing (SILC) Server before 1.1.1 allows remote attackers to cause a denial of service (daemon crash) via a NEW_CLIENT packet without a nickname.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200804-27.xml">GLSA-200804-27</ref>
      <ref source="CONFIRM" url="http://silcnet.org/docs/release/SILC%20Server%201.1.1">http://silcnet.org/docs/release/SILC%20Server%201.1.1</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28450">28450</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019711">1019711</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0919/references">ADV-2008-0919</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41307">silc-server-newclient-dos(41307)</ref>
    </refs>
    <vuln_soft>
      <prod name="silc-server" vendor="silc">
        <vers num="1.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1430" seq="2008-1430" published="2008-03-20" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in links.asp in ASPapp allows remote attackers to execute arbitrary SQL commands via the CatId parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5276">5276</ref>
    </refs>
    <vuln_soft>
      <prod name="aspapp" vendor="iatek">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1431" seq="2008-1431" published="2008-03-20" modified="2018-10-11" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">RaidSonic NAS-4220-B with 2.6.0-n(2007-10-11) firmware stores a partition encryption key in an unencrypted /system/.crypt file with base64 encoding, which allows local users to obtain the key.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3760">3760</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489690/100/0/threaded">20080316 raidsonic nas-4220 crypt disk key leak (stored in plain on unencrypted partition)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28264">28264</ref>
    </refs>
    <vuln_soft>
      <prod name="firmware" vendor="raidsonic_technology">
        <vers num="2.6.0-n"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1432" seq="2008-1432" published="2008-03-20" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in SolutionSearch.do in ManageEngine SupportCenter Plus 7.0.0 allows remote attackers to inject arbitrary web script or HTML via the searchText parameter, a related issue to CVE-2008-1299.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs/>
    <vuln_soft>
      <prod name="supportcenter_plus" vendor="manageengine">
        <vers num="7.0.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1433" seq="2008-1433" published="2017-05-11" modified="2017-05-11" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2008. Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2008-1434" seq="2008-1434" published="2008-05-13" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Use-after-free vulnerability in Microsoft Word in Office 2000 and XP SP3, 2003 SP2 and SP3, and 2007 Office System SP1 and earlier allows remote attackers to execute arbitrary code via an HTML document with a large number of Cascading Style Sheets (CSS) selectors, related to a "memory handling error" that triggers memory corruption.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=700">20080513 Microsoft Word CSS Processing Memory Corruption Vulnerability</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=121129490723574&amp;w=2">SSRT080071</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29105" patch="1">29105</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020014">1020014</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-134A.html">TA08-134A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1504/references" adv="1">ADV-2008-1504</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-026">MS08-026</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5012">oval:org.mitre.oval:def:5012</ref>
    </refs>
    <vuln_soft>
      <prod name="office" vendor="microsoft">
        <vers num="2000" edition="sp3"/>
        <vers num="2003" edition="sp2"/>
        <vers num="2003" edition="sp3"/>
        <vers num="2004" edition=":mac"/>
        <vers num="2007"/>
        <vers num="2007_sp1"/>
        <vers num="2008" edition=":mac"/>
        <vers num="xp" edition="sp3"/>
      </prod>
      <prod name="office_compatibility_pack_for_word_excel_ppt_2007" vendor="microsoft">
        <vers num="" edition=":sp1"/>
      </prod>
      <prod name="word_viewer" vendor="microsoft">
        <vers num="2003" edition=":sp3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1435" seq="2008-1435" published="2008-07-08" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Windows Explorer in Microsoft Windows Vista up to SP1, and Server 2008, allows user-assisted remote attackers to execute arbitrary code via crafted saved-search (.search-ms) files that are not properly handled when saving, aka "Windows Saved Search Vulnerability."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/30109">30109</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020436">1020436</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-190A.html">TA08-190A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2020/references">ADV-2008-2020</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-038">MS08-038</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5600">oval:org.mitre.oval:def:5600</ref>
    </refs>
    <vuln_soft>
      <prod name="windows-nt" vendor="microsoft">
        <vers num="2008"/>
      </prod>
      <prod name="windows_vista" vendor="microsoft">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1436" seq="2008-1436" published="2008-04-21" modified="2019-02-26" severity="High" CVSS_version="2.0" CVSS_score="9.0" CVSS_base_score="9.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Microsoft Windows XP Professional SP2, Vista, and Server 2003 and 2008 does not properly assign activities to the (1) NetworkService and (2) LocalService accounts, which might allow context-dependent attackers to gain privileges by using one service process to capture a resource from a second service process that has a LocalSystem privilege-escalation ability, related to improper management of the SeImpersonatePrivilege user right, as originally reported for Internet Information Services (IIS), aka Token Kidnapping.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://blogs.technet.com/msrc/archive/2008/04/17/msrc-blog-microsoft-security-advisory-951306.aspx">http://blogs.technet.com/msrc/archive/2008/04/17/msrc-blog-microsoft-security-advisory-951306.aspx</ref>
      <ref source="MISC" url="http://isc.sans.org/diary.html?storyid=4306">http://isc.sans.org/diary.html?storyid=4306</ref>
      <ref source="MISC" url="http://milw0rm.com/sploits/2008-Churrasco.zip">http://milw0rm.com/sploits/2008-Churrasco.zip</ref>
      <ref source="MISC" url="http://nomoreroot.blogspot.com/2008/10/windows-2003-poc-exploit-for-token.html">http://nomoreroot.blogspot.com/2008/10/windows-2003-poc-exploit-for-token.html</ref>
      <ref source="MISC" url="http://securitywatch.eweek.com/flaws/microsoft_belatedly_admits_to_windows_server_2008_token_kidnapping.html">http://securitywatch.eweek.com/flaws/microsoft_belatedly_admits_to_windows_server_2008_token_kidnapping.html</ref>
      <ref source="MISC" url="http://www.argeniss.com/research/Churrasco.zip">http://www.argeniss.com/research/Churrasco.zip</ref>
      <ref source="MISC" url="http://www.argeniss.com/research/TokenKidnapping.pdf">http://www.argeniss.com/research/TokenKidnapping.pdf</ref>
      <ref source="CONFIRM" url="http://www.microsoft.com/technet/security/advisory/951306.mspx">http://www.microsoft.com/technet/security/advisory/951306.mspx</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491111/100/0/threaded">20080419 Token Kidnapping (Microsoft Security Advisory 951306) presentation available</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/497168/100/0/threaded">20081008 Token Kidnapping Windows 2003 PoC exploit</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28833">28833</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019904">1019904</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA09-104A.html">TA09-104A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1264/references" adv="1">ADV-2008-1264</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/1026" adv="1">ADV-2009-1026</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-012">MS09-012</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41880">ms-windows-localsystem-privilege-escalation(41880)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5891">oval:org.mitre.oval:def:5891</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/6705">6705</ref>
    </refs>
    <vuln_soft>
      <prod name="windows-nt" vendor="microsoft">
        <vers num="vista" edition="sp1:x64"/>
        <vers num="vista" edition="sp2:x64"/>
      </prod>
      <prod name="windows_server_2003" vendor="microsoft">
        <vers num="" edition="sp1:itanium"/>
        <vers num="" edition="sp2"/>
      </prod>
      <prod name="windows_server_2008" vendor="microsoft">
        <vers num="" edition=":itanium"/>
        <vers num="" edition=":x32"/>
        <vers num="" edition=":x64"/>
      </prod>
      <prod name="windows_vista" vendor="microsoft">
        <vers num="" edition=":x64"/>
        <vers num="-" edition="sp1"/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition="sp2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1437" seq="2008-1437" published="2008-05-13" modified="2018-10-12" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Microsoft Malware Protection Engine (mpengine.dll) 1.1.3520.0 and 0.1.13.192, as used in multiple Microsoft products, allows context-dependent attackers to cause a denial of service (engine hang and restart) via a crafted file, a different vulnerability than CVE-2008-1438.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=121129490723574&amp;w=2">SSRT080071</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29060">29060</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020016">1020016</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-134A.html">TA08-134A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1506/references">ADV-2008-1506</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-029">MS08-029</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13981">oval:org.mitre.oval:def:13981</ref>
    </refs>
    <vuln_soft>
      <prod name="antigen_for_exchange" vendor="microsoft">
        <vers num=""/>
      </prod>
      <prod name="antigen_for_smtp_gateway" vendor="microsoft">
        <vers num=""/>
      </prod>
      <prod name="diagnostics_and_recovery_toolkit" vendor="microsoft">
        <vers num="6.0"/>
      </prod>
      <prod name="forefront_client_security" vendor="microsoft">
        <vers num=""/>
      </prod>
      <prod name="forefront_security_for_exchange_server" vendor="microsoft">
        <vers num=""/>
      </prod>
      <prod name="forefront_security_for_sharepoint" vendor="microsoft">
        <vers num=""/>
      </prod>
      <prod name="malware_protection_engine" vendor="microsoft">
        <vers num="0.1.13.192"/>
        <vers num="1.1.3520.0"/>
      </prod>
      <prod name="windows_defender" vendor="microsoft">
        <vers num=""/>
      </prod>
      <prod name="windows_live_onecare" vendor="microsoft">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1438" seq="2008-1438" published="2008-05-13" modified="2018-10-12" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Microsoft Malware Protection Engine (mpengine.dll) 1.1.3520.0 and 0.1.13.192, as used in multiple Microsoft products, allows context-dependent attackers to cause a denial of service (disk space exhaustion) via a file with "crafted data structures" that trigger the creation of large temporary files, a different vulnerability than CVE-2008-1437.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=121129490723574&amp;w=2">SSRT080071</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29073">29073</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020016">1020016</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-134A.html">TA08-134A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1506/references">ADV-2008-1506</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-029">MS08-029</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14375">oval:org.mitre.oval:def:14375</ref>
    </refs>
    <vuln_soft>
      <prod name="antigen_for_exchange" vendor="microsoft">
        <vers num=""/>
      </prod>
      <prod name="antigen_for_smtp_gateway" vendor="microsoft">
        <vers num=""/>
      </prod>
      <prod name="diagnostics_and_recovery_toolkit" vendor="microsoft">
        <vers num="6.0"/>
      </prod>
      <prod name="forefront_client_security" vendor="microsoft">
        <vers num=""/>
      </prod>
      <prod name="forefront_security_for_exchange_server" vendor="microsoft">
        <vers num=""/>
      </prod>
      <prod name="forefront_security_for_sharepoint" vendor="microsoft">
        <vers num=""/>
      </prod>
      <prod name="malware_protection_engine" vendor="microsoft">
        <vers num="0.1.13.192"/>
        <vers num="1.1.3520.0"/>
      </prod>
      <prod name="windows_defender" vendor="microsoft">
        <vers num=""/>
      </prod>
      <prod name="windows_live_onecare" vendor="microsoft">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1439" seq="2008-1439" published="2017-05-11" modified="2017-05-11" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2008. Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2008-1440" seq="2008-1440" published="2008-06-11" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="7.1" CVSS_base_score="7.1" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Microsoft Windows XP SP2 and SP3, and Server 2003 SP1 and SP2, does not properly validate the option length field in Pragmatic General Multicast (PGM) packets, which allows remote attackers to cause a denial of service (infinite loop and system hang) via a crafted PGM packet, aka the "PGM Invalid Length Vulnerability."</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020230" adv="1">1020230</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29508" patch="1">29508</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-162B.html" adv="1">TA08-162B</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1783">ADV-2008-1783</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-036">MS08-036</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5473">oval:org.mitre.oval:def:5473</ref>
    </refs>
    <vuln_soft>
      <prod name="windows" vendor="microsoft">
        <vers num="server_2003" edition=":x64"/>
        <vers num="server_2003" edition="sp1:itanium"/>
        <vers num="server_2003" edition="sp2:itanium"/>
        <vers num="server_2003" edition="sp2:x64"/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition="sp1"/>
        <vers num="" edition="sp2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1441" seq="2008-1441" published="2008-06-11" modified="2018-10-12" severity="Medium" CVSS_version="2.0" CVSS_score="5.4" CVSS_base_score="5.4" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Microsoft Windows XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows remote attackers to cause a denial of service (system hang) via a series of Pragmatic General Multicast (PGM) packets with invalid fragment options, aka the "PGM Malformed Fragment Vulnerability."</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020231" adv="1">1020231</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29509" adv="1">29509</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-162B.html" adv="1">TA08-162B</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1783">ADV-2008-1783</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-036">MS08-036</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5604" adv="1">oval:org.mitre.oval:def:5604</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_server_2003" vendor="microsoft">
        <vers num="-" edition=":~~~~x64~"/>
        <vers num="-" edition="sp1:~~~~itanium~"/>
        <vers num="-" edition="sp2:~~~~itanium~"/>
        <vers num="-" edition="sp2:~~~~x64~"/>
      </prod>
      <prod name="windows_server_2008" vendor="microsoft">
        <vers num="-" edition=":~~~~itanium~"/>
        <vers num="-" edition=":~~~~x64~"/>
      </prod>
      <prod name="windows_vista" vendor="microsoft">
        <vers num="-" edition=":~~~~x64~"/>
        <vers num="-" edition="sp1:~~~~x64~"/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="-" edition=":~~professional~~x64~"/>
        <vers num="-" edition="sp2:~~professional~~x64~"/>
        <vers num="-" edition="sp3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1442" seq="2008-1442" published="2008-06-11" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in the substringData method in Microsoft Internet Explorer 6 and 7 allows remote attackers to execute arbitrary code, related to an unspecified manipulation of a DOM object before a call to this method, aka the "HTML Objects Memory Corruption Vulnerability."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=121380194923597&amp;w=2">HPSBST02344</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3934" adv="1">3934</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020225" patch="1">1020225</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493253/100/0/threaded">20080610 ZDI-08-039: Microsoft Internet Explorer DOM Ojbect substringData() Heap Overflow Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29556" adv="1">29556</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-162B.html" adv="1">TA08-162B</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1778">ADV-2008-1778</ref>
      <ref source="MISC" url="http://www.zerodayinitiative.com/advisories/ZDI-08-039/" adv="1" patch="1">http://www.zerodayinitiative.com/advisories/ZDI-08-039/</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-031">MS08-031</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5720">oval:org.mitre.oval:def:5720</ref>
    </refs>
    <vuln_soft>
      <prod name="internet_explorer" vendor="microsoft">
        <vers num="6"/>
        <vers num="7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1443" seq="2008-1443" published="2017-05-11" modified="2017-05-11" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2008. Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2008-1444" seq="2008-1444" published="2008-06-11" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in Microsoft DirectX 7.0 and 8.1 on Windows 2000 SP4 allows remote attackers to execute arbitrary code via a Synchronized Accessible Media Interchange (SAMI) file with crafted parameters for a Class Name variable, aka the "SAMI Format Parsing Vulnerability."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=121380194923597&amp;w=2">HPSBST02344</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3937" adv="1">3937</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020223" adv="1">1020223</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493250/100/0/threaded">20080610 ZDI-08-040: Microsoft DirectX SAMI File Format Name Parsing Stack Overflow Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29578" adv="1" patch="1">29578</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-162B.html" adv="1">TA08-162B</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1780">ADV-2008-1780</ref>
      <ref source="MISC" url="http://www.zerodayinitiative.com/advisories/ZDI-08-040/" adv="1">http://www.zerodayinitiative.com/advisories/ZDI-08-040/</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-033">MS08-033</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5562">oval:org.mitre.oval:def:5562</ref>
    </refs>
    <vuln_soft>
      <prod name="directx" vendor="microsoft">
        <vers num="7.0"/>
        <vers num="8.1"/>
        <vers num="9.0"/>
        <vers num="10.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1445" seq="2008-1445" published="2008-06-11" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="7.1" CVSS_base_score="7.1" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Active Directory on Microsoft Windows 2000 Server SP4, XP Professional SP2 and SP3, Server 2003 SP1 and SP2, and Server 2008 allows remote authenticated users to cause a denial of service (system hang or reboot) via a crafted LDAP request.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020229" adv="1">1020229</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493338/100/0/threaded">20080613 Securify bulletin: Microsoft Active Directory Denial-of-service</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493342/100/0/threaded">20080613 RE: Securify bulletin: Microsoft Active Directory Denial-of-service</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29584" patch="1">29584</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-162B.html" adv="1">TA08-162B</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1782">ADV-2008-1782</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-035">MS08-035</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4910">oval:org.mitre.oval:def:4910</ref>
    </refs>
    <vuln_soft>
      <prod name="windows-nt" vendor="microsoft">
        <vers num="2008" edition=":x32"/>
        <vers num="2008" edition=":x64"/>
        <vers num="xp" edition="sp3:pro"/>
      </prod>
      <prod name="windows_2003_server" vendor="microsoft">
        <vers num="" edition=":x64"/>
        <vers num="" edition="sp1:itanium"/>
        <vers num="" edition="sp2:itanium"/>
        <vers num="" edition="sp2:x64"/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition="sp2:x64"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1446" seq="2008-1446" published="2008-10-14" modified="2019-07-03" severity="High" CVSS_version="2.0" CVSS_score="9.0" CVSS_base_score="9.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Integer overflow in the Internet Printing Protocol (IPP) ISAPI extension in Microsoft Internet Information Services (IIS) 5.0 through 7.0 on Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, and Server 2008 allows remote authenticated users to execute arbitrary code via an HTTP POST request that triggers an outbound IPP connection from a web server to a machine operated by the attacker, aka "Integer Overflow in IPP Service Vulnerability."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=122479227205998&amp;w=2">SSRT080143</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/793233">VU#793233</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/31682" patch="1">31682</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1021048">1021048</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-288A.html">TA08-288A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2813">ADV-2008-2813</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-062">MS08-062</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/45545">win-ipp-service-code-execution(45545)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/45548">win-ms08kb953155-update(45548)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5764">oval:org.mitre.oval:def:5764</ref>
    </refs>
    <vuln_soft>
      <prod name="iis" vendor="microsoft">
        <vers num="5.0"/>
      </prod>
      <prod name="internet_information_server" vendor="microsoft">
        <vers num="5.1"/>
        <vers num="6.0" edition="beta"/>
        <vers num="7.0"/>
      </prod>
      <prod name="windows_2000" vendor="microsoft">
        <vers num="" edition="sp4"/>
      </prod>
      <prod name="windows_server_2003" vendor="microsoft">
        <vers num="" edition="sp1:itanium"/>
        <vers num="" edition="sp1:x64"/>
        <vers num="" edition="sp2"/>
      </prod>
      <prod name="windows_server_2008" vendor="microsoft">
        <vers num="" edition=":itanium"/>
        <vers num="" edition=":x32"/>
        <vers num="" edition=":x64"/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition="sp2:x64"/>
        <vers num="" edition="sp3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1447" seq="2008-1447" published="2008-07-08" modified="2019-10-09" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug."</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="NETBSD" url="ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc" adv="1">NetBSD-SA2008-009</ref>
      <ref source="MISC" url="http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html">http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html</ref>
      <ref source="CONFIRM" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401" adv="1">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401</ref>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520">HPSBOV02357</ref>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368">HPSBNS02405</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html" adv="1">APPLE-SA-2008-07-31</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html" adv="1">APPLE-SA-2008-09-09</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html" adv="1">APPLE-SA-2008-09-12</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html" adv="1">APPLE-SA-2008-09-15</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html">20080830 VMSA-2008-0014 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX address information disclosure, privilege escalation and other security issues.</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html" adv="1">SUSE-SA:2008:033</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html" adv="1">SUSE-SR:2008:017</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=121630706004256&amp;w=2" adv="1">SSRT080058</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=121866517322103&amp;w=2" adv="1">HPSBTU02358</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=123324863916385&amp;w=2" adv="1">HPSBMP02404</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=141879471518471&amp;w=2" adv="1">HPSBOV03226</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2008-0533.html" adv="1">RHSA-2008:0533</ref>
      <ref source="FREEBSD" url="http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc" adv="1">FreeBSD-SA-08:06</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200807-08.xml" adv="1">GLSA-200807-08</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200812-17.xml" adv="1">GLSA-200812-17</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-201209-25.xml" adv="1">GLSA-201209-25</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.452680" adv="1">SSA:2008-205-01</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.539239" adv="1">SSA:2008-191</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1" adv="1">239392</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1" adv="1">240048</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3026" adv="1">http://support.apple.com/kb/HT3026</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3129" adv="1">http://support.apple.com/kb/HT3129</ref>
      <ref source="CONFIRM" url="http://support.citrix.com/article/CTX117991" adv="1">http://support.citrix.com/article/CTX117991</ref>
      <ref source="CONFIRM" url="http://support.citrix.com/article/CTX118183" adv="1">http://support.citrix.com/article/CTX118183</ref>
      <ref source="CONFIRM" url="http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&amp;id=762152" adv="1">http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&amp;id=762152</ref>
      <ref source="CONFIRM" url="http://up2date.astaro.com/2008/08/up2date_7202_released.html" adv="1">http://up2date.astaro.com/2008/08/up2date_7202_released.html</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231" adv="1">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018" adv="1">http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018</ref>
      <ref source="CONFIRM" url="http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning" adv="1">http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning</ref>
      <ref source="MISC" url="http://www.caughq.org/exploits/CAU-EX-2008-0002.txt" adv="1">http://www.caughq.org/exploits/CAU-EX-2008-0002.txt</ref>
      <ref source="MISC" url="http://www.caughq.org/exploits/CAU-EX-2008-0003.txt" adv="1">http://www.caughq.org/exploits/CAU-EX-2008-0003.txt</ref>
      <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml" adv="1">20080708 Multiple Cisco Products Vulnerable to DNS Cache Poisoning Attacks</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1603" patch="1">DSA-1603</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1604" adv="1">DSA-1604</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1605" adv="1">DSA-1605</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1619" adv="1">DSA-1619</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1623" adv="1">DSA-1623</ref>
      <ref source="MISC" url="http://www.doxpara.com/?p=1176" adv="1">http://www.doxpara.com/?p=1176</ref>
      <ref source="MISC" url="http://www.doxpara.com/DMK_BO2K8.ppt" adv="1">http://www.doxpara.com/DMK_BO2K8.ppt</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ26667" adv="1">IZ26667</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ26668" adv="1">IZ26668</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ26669" adv="1">IZ26669</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ26670" adv="1">IZ26670</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ26671" adv="1">IZ26671</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ26672" adv="1">IZ26672</ref>
      <ref source="CONFIRM" url="http://www.ipcop.org/index.php?name=News&amp;file=article&amp;sid=40" adv="1">http://www.ipcop.org/index.php?name=News&amp;file=article&amp;sid=40</ref>
      <ref source="CONFIRM" url="http://www.isc.org/index.pl?/sw/bind/bind-security.php" adv="1">http://www.isc.org/index.pl?/sw/bind/bind-security.php</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/800113" adv="1">VU#800113</ref>
      <ref source="CONFIRM" url="http://www.kb.cert.org/vuls/id/MIMG-7DWR4J" adv="1">http://www.kb.cert.org/vuls/id/MIMG-7DWR4J</ref>
      <ref source="CONFIRM" url="http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q" adv="1">http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:139" adv="1">MDVSA-2008:139</ref>
      <ref source="MISC" url="http://www.nominum.com/asset_upload_file741_2661.pdf" adv="1">http://www.nominum.com/asset_upload_file741_2661.pdf</ref>
      <ref source="CONFIRM" url="http://www.novell.com/support/viewContent.do?externalId=7000912" adv="1">http://www.novell.com/support/viewContent.do?externalId=7000912</ref>
      <ref source="OPENBSD" url="http://www.openbsd.org/errata42.html#013_bind" adv="1">[4.2] 013: SECURITY FIX: July 23, 2008</ref>
      <ref source="OPENBSD" url="http://www.openbsd.org/errata43.html#004_bind" adv="1">[4.3] 004: SECURITY FIX: July 23, 2008</ref>
      <ref source="CONFIRM" url="http://www.phys.uu.nl/~rombouts/pdnsd.html" adv="1">http://www.phys.uu.nl/~rombouts/pdnsd.html</ref>
      <ref source="CONFIRM" url="http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog" adv="1">http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0789.html" adv="1">RHSA-2008:0789</ref>
      <ref source="CONFIRM" url="http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html" adv="1">http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html</ref>
      <ref source="CONFIRM" url="http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/" adv="1">http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/495289/100/0/threaded" adv="1">20080808 New paper: An Illustrated Guide to the Kaminsky DNS Vulnerability</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/495869/100/0/threaded" adv="1">20080830 VMSA-2008-0014 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX address information disclosure, privilege escalation and other security issues.</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30131" adv="1">30131</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020437" adv="1">1020437</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020438" adv="1">1020438</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020440" adv="1">1020440</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020448" adv="1">1020448</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020449" adv="1">1020449</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020548" adv="1">1020548</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020558" adv="1">1020558</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020560" adv="1">1020560</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020561" adv="1">1020561</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020575" adv="1">1020575</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020576" adv="1">1020576</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020577" adv="1">1020577</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020578" adv="1">1020578</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020579" adv="1">1020579</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020651" adv="1">1020651</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020653" adv="1">1020653</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020702" adv="1">1020702</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020802" adv="1">1020802</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020804" adv="1">1020804</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-622-1" adv="1">USN-622-1</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-627-1" adv="1">USN-627-1</ref>
      <ref source="MISC" url="http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html" adv="1">http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-190A.html" adv="1">TA08-190A</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-190B.html" adv="1">TA08-190B</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-260A.html" adv="1">TA08-260A</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2008-0014.html" adv="1">http://www.vmware.com/security/advisories/VMSA-2008-0014.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2019/references" adv="1">ADV-2008-2019</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2023/references" adv="1">ADV-2008-2023</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2025/references" adv="1">ADV-2008-2025</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2029/references" adv="1">ADV-2008-2029</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2030/references" adv="1">ADV-2008-2030</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2050/references" adv="1">ADV-2008-2050</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2051/references" adv="1">ADV-2008-2051</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2052/references" adv="1">ADV-2008-2052</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2055/references" adv="1">ADV-2008-2055</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2092/references" adv="1">ADV-2008-2092</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2113/references" adv="1">ADV-2008-2113</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2114/references" adv="1">ADV-2008-2114</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2123/references" adv="1">ADV-2008-2123</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2139/references" adv="1">ADV-2008-2139</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2166/references" adv="1">ADV-2008-2166</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2195/references" adv="1">ADV-2008-2195</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2196/references" adv="1">ADV-2008-2196</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2197/references" adv="1">ADV-2008-2197</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2268" adv="1">ADV-2008-2268</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2291" adv="1">ADV-2008-2291</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2334" adv="1">ADV-2008-2334</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2342" adv="1">ADV-2008-2342</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2377" adv="1">ADV-2008-2377</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2383" adv="1">ADV-2008-2383</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2384" adv="1">ADV-2008-2384</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2466" adv="1">ADV-2008-2466</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2467" adv="1">ADV-2008-2467</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2482" adv="1">ADV-2008-2482</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2525" adv="1">ADV-2008-2525</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2549" adv="1">ADV-2008-2549</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2558" adv="1">ADV-2008-2558</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2582" adv="1">ADV-2008-2582</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2584" adv="1">ADV-2008-2584</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/0297" adv="1">ADV-2009-0297</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/0311" adv="1">ADV-2009-0311</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2010/0622" adv="1">ADV-2010-0622</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037" adv="1" patch="1">MS08-037</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43334" adv="1">win-dns-client-server-spoofing(43334)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43637" adv="1">cisco-multiple-dns-cache-poisoning(43637)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117" sig="1">oval:org.mitre.oval:def:12117</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725" sig="1">oval:org.mitre.oval:def:5725</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761" sig="1">oval:org.mitre.oval:def:5761</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917" sig="1">oval:org.mitre.oval:def:5917</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627" sig="1">oval:org.mitre.oval:def:9627</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/6122" adv="1">6122</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/6123" adv="1">6123</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/6130" adv="1">6130</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html" adv="1">FEDORA-2008-6256</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html" adv="1">FEDORA-2008-6281</ref>
    </refs>
    <vuln_soft>
      <prod name="bind" vendor="isc">
        <vers num="4"/>
        <vers num="8"/>
        <vers num="9.2.9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1448" seq="2008-1448" published="2008-08-12" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="7.1" CVSS_base_score="7.1" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:N/A:N)">
    <desc>
      <descript source="cve">The MHTML protocol handler in a component of Microsoft Outlook Express 5.5 SP2 and 6 through SP1, and Windows Mail, does not assign the correct Internet Explorer Security Zone to UNC share pathnames, which allows remote attackers to bypass intended access restrictions and read arbitrary files via an mhtml: URI in conjunction with a redirection, aka "URL Parsing Cross-Domain Information Disclosure Vulnerability."</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=121915960406986&amp;w=2">HPSBST02360</ref>
      <ref source="MISC" url="http://www.coresecurity.com/content/internet-explorer-zone-elevation">http://www.coresecurity.com/content/internet-explorer-zone-elevation</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/495458/100/0/threaded">20080813 CORE-2008-0103: Internet Explorer Zone Elevation Restrictions Bypass and Security Zone Restrictions Bypass</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30585" patch="1">30585</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020679">1020679</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020680">1020680</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-225A.html">TA08-225A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2352" adv="1">ADV-2008-2352</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-048">MS08-048</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5886">oval:org.mitre.oval:def:5886</ref>
    </refs>
    <vuln_soft>
      <prod name="outlook_express" vendor="microsoft">
        <vers num="5.5" edition="sp2"/>
        <vers num="6.0" edition="sp1"/>
      </prod>
      <prod name="windows_mail" vendor="microsoft">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1449" seq="2008-1449" published="2017-05-11" modified="2017-05-11" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2008. Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2008-1450" seq="2008-1450" published="2017-05-11" modified="2017-05-11" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2008. Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2008-1451" seq="2008-1451" published="2008-06-11" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The WINS service on Microsoft Windows 2000 SP4, and Server 2003 SP1 and SP2, does not properly validate data structures in WINS network packets, which allows local users to gain privileges via a crafted packet, aka "Memory Overwrite Vulnerability."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020228" patch="1">1020228</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29588" patch="1">29588</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-162B.html">TA08-162B</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1781">ADV-2008-1781</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-034">MS08-034</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5582">oval:org.mitre.oval:def:5582</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_2000" vendor="microsoft">
        <vers num="-" edition="sp4"/>
      </prod>
      <prod name="windows_2003_server" vendor="microsoft">
        <vers num="-" edition="sp1"/>
        <vers num="-" edition="sp2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1452" seq="2008-1452" published="2017-05-11" modified="2017-05-11" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2008. Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2008-1453" seq="2008-1453" published="2008-06-11" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="8.3" CVSS_base_score="8.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="6.5" CVSS_vector="(AV:A/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The Bluetooth stack in Microsoft Windows XP SP2 and SP3, and Vista Gold and SP1, allows physically proximate attackers to execute arbitrary code via a large series of Service Discovery Protocol (SDP) packets.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local_network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020221" patch="1">1020221</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29522" patch="1">29522</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-162B.html" adv="1">TA08-162B</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1777">ADV-2008-1777</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-030">MS08-030</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4730">oval:org.mitre.oval:def:4730</ref>
    </refs>
    <vuln_soft>
      <prod name="windows-nt" vendor="microsoft">
        <vers num="xp" edition="sp3"/>
      </prod>
      <prod name="windows_vista" vendor="microsoft">
        <vers num="" edition=":x64"/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition=":x64"/>
        <vers num="" edition="sp2:x64"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1454" seq="2008-1454" published="2008-07-08" modified="2019-02-26" severity="High" CVSS_version="2.0" CVSS_score="9.4" CVSS_base_score="9.4" CVSS_impact_subscore="9.2" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Microsoft DNS in Windows 2000 SP4, Server 2003 SP1 and SP2, and Server 2008 allows remote attackers to conduct cache poisoning attacks via unknown vectors related to accepting "records from a response that is outside the remote server's authority," aka "DNS Cache Poisoning Vulnerability," a different vulnerability than CVE-2008-1447.</descript>
    </desc>
    <loss_types>
      <avail/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/30132" patch="1">30132</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020437">1020437</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-190A.html">TA08-190A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2019/references" adv="1">ADV-2008-2019</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037">MS08-037</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5380">oval:org.mitre.oval:def:5380</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_2000" vendor="microsoft">
        <vers num="" edition="sp4"/>
      </prod>
      <prod name="windows_server_2003" vendor="microsoft">
        <vers num="" edition="sp1:itanium"/>
        <vers num="" edition="sp1:x64"/>
        <vers num="" edition="sp2"/>
      </prod>
      <prod name="windows_server_2008" vendor="microsoft">
        <vers num="" edition=":x32"/>
        <vers num="" edition=":x64"/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition="sp2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1455" seq="2008-1455" published="2008-08-12" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">A "memory calculation error" in Microsoft Office PowerPoint 2000 SP3, 2002 SP3, 2003 SP2, and 2007 through SP1; Office Compatibility Pack for Word, Excel, and PowerPoint 2007 through SP1; and Office 2004 for Mac allows remote attackers to execute arbitrary code via a PowerPoint file with crafted list values that trigger memory corruption, aka "Parsing Overflow Vulnerability."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=121915960406986&amp;w=2">HPSBST02360</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30579">30579</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020676">1020676</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-225A.html">TA08-225A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2355">ADV-2008-2355</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-051">MS08-051</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5555">oval:org.mitre.oval:def:5555</ref>
    </refs>
    <vuln_soft>
      <prod name="compatibility_pack_word_excel_powerpoint" vendor="microsoft">
        <vers num="2007" edition="sp1"/>
      </prod>
      <prod name="office" vendor="microsoft">
        <vers num="2000" edition="sp3"/>
        <vers num="2003" edition="sp2"/>
        <vers num="2003" edition="sp3"/>
        <vers num="2004" edition=":mac"/>
        <vers num="2007" edition="sp1"/>
        <vers num="xp" edition="sp3"/>
      </prod>
      <prod name="office_powerpoint_viewer" vendor="microsoft">
        <vers num="2003"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1456" seq="2008-1456" published="2008-08-13" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="9.0" CVSS_base_score="9.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Array index vulnerability in the Event System in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows remote authenticated users to execute arbitrary code via a crafted event subscription request that is used to access an array of function pointers.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=121915960406986&amp;w=2">HPSBST02360</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30586">30586</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020677">1020677</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-225A.html">TA08-225A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2353">ADV-2008-2353</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-049">MS08-049</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5630">oval:org.mitre.oval:def:5630</ref>
    </refs>
    <vuln_soft>
      <prod name="windows-nt" vendor="microsoft">
        <vers num="2008"/>
        <vers num="vista" edition=":gold"/>
        <vers num="xp" edition="sp3"/>
      </prod>
      <prod name="windows_2000" vendor="microsoft">
        <vers num="" edition="sp4"/>
      </prod>
      <prod name="windows_2003_server" vendor="microsoft">
        <vers num="" edition="sp1"/>
        <vers num="" edition="sp2"/>
      </prod>
      <prod name="windows_vista" vendor="microsoft">
        <vers num="-" edition="sp1"/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition="sp2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1457" seq="2008-1457" published="2008-08-13" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="9.0" CVSS_base_score="9.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The Event System in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 does not properly validate per-user subscriptions, which allows remote authenticated users to execute arbitrary code via a crafted event subscription request.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=121915960406986&amp;w=2">HPSBST02360</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30584">30584</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020677">1020677</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-225A.html">TA08-225A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2353">ADV-2008-2353</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-049">MS08-049</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6095">oval:org.mitre.oval:def:6095</ref>
    </refs>
    <vuln_soft>
      <prod name="windows-nt" vendor="microsoft">
        <vers num="2008"/>
        <vers num="vista" edition=":gold"/>
        <vers num="xp" edition="sp3"/>
      </prod>
      <prod name="windows_2000" vendor="microsoft">
        <vers num="" edition="sp4"/>
      </prod>
      <prod name="windows_2003_server" vendor="microsoft">
        <vers num="" edition="sp1"/>
        <vers num="" edition="sp2"/>
      </prod>
      <prod name="windows_vista" vendor="microsoft">
        <vers num="-" edition="sp1"/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition="sp2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1458" seq="2008-1458" published="2008-03-24" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php in CS-Cart 1.3.2 allows remote attackers to inject arbitrary web script or HTML via the q parameter in a products search action.  NOTE: it was also reported that 1.3.5-SP2 trial edition is also affected.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3762">3762</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489857/100/0/threaded">20080319 CS-Cart XSS</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28333">28333</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41306">cscart-index-xss(41306)</ref>
    </refs>
    <vuln_soft>
      <prod name="cs-cart" vendor="cs-cart">
        <vers num="1.3.2" edition="sp2:trial_edition"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1459" seq="2008-1459" published="2008-03-24" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the Alberghi (com_alberghi) 2.1.3 and earlier component for Mambo and Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a detail action to index.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28331">28331</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41285">alberghi-index-sql-injection(41285)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5278">5278</ref>
    </refs>
    <vuln_soft>
      <prod name="com_alberghi" vendor="joomlaitalia">
        <vers num="2.1.3"/>
      </prod>
      <prod name="com_alberghi" vendor="mamboitalia">
        <vers num="2.1.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1460" seq="2008-1460" published="2008-03-24" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the Joovideo (com_joovideo) 1.0 and 1.2.2 component for Mambo and Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a detail action to index.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28318">28318</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41279">joovideo-index-sql-injection(41279)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5277">5277</ref>
    </refs>
    <vuln_soft>
      <prod name="com_joovideo" vendor="joomlapixel">
        <vers num="1.0"/>
        <vers num="1.2.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1461" seq="2008-1461" published="2008-03-24" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.6" CVSS_base_score="7.6" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in XnView 1.92.1 allows user-assisted remote attackers to execute arbitrary code via a long filename argument on the command line.  NOTE: it is unclear whether there are common handler configurations in which this argument is controlled by an attacker.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3761">3761</ref>
      <ref source="MISC" url="http://www.click-internet.fr/index.php?cki=News&amp;news=9">http://www.click-internet.fr/index.php?cki=News&amp;news=9</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489658/100/0/threaded">20080315 XNview 1.92.1 Long Filename Overflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28259">28259</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41245">xnview-filename-bo(41245)</ref>
    </refs>
    <vuln_soft>
      <prod name="xnview" vendor="xnview">
        <vers num="1.92.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1462" seq="2008-1462" published="2008-03-24" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the sections (Section) module in RunCMS allows remote attackers to execute arbitrary SQL commands via the artid parameter in a viewarticle action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28378">28378</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41377">section-index-sql-injection(41377)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5285">5285</ref>
    </refs>
    <vuln_soft>
      <prod name="runcms" vendor="runcms">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1463" seq="2008-1463" published="2008-03-24" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the management GUI in Imperva SecureSphere MX Management Server 5.0 allows remote attackers to inject arbitrary web script or HTML via an invalid or prohibited request to a web server protected by SecureSphere, which triggers injection into the "corrective action" section of an alert page.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://imperva.com/go/secadv/20080318">http://imperva.com/go/secadv/20080318</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28279">28279</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41359">securesphere-mxmanagementserver-gui-xss(41359)</ref>
    </refs>
    <vuln_soft>
      <prod name="securesphere" vendor="imperva">
        <vers num="5.0"/>
      </prod>
      <prod name="securesphere_mx_management_server" vendor="imperva">
        <vers num="5"/>
        <vers num="5.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1464" seq="2008-1464" published="2008-03-24" modified="2011-07-26" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in Gallarific Free Edition 1.1 allow remote attackers to execute arbitrary SQL commands via the (1) query parameter to (a) search.php; (2) gusername and (3) gpassword parameters to (b) login.php; and the (4) username and (5) password parameters to (c) gadmin/index.php in a signin action.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
      <descript source="nvd">More information is available at: http://www.securityfocus.com/bid/28163</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs/>
    <vuln_soft>
      <prod name="gallarific" vendor="gallarific">
        <vers num="1.1" edition="-:free"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1465" seq="2008-1465" published="2008-03-24" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the Detodas Restaurante (com_restaurante) 1.0 component for Mambo and Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a detail action to index.php, a different product than CVE-2008-0562.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28324">28324</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41283">restaurante-index-sql-injection(41283)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5280">5280</ref>
    </refs>
    <vuln_soft>
      <prod name="com_restaurante" vendor="detodas">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1466" seq="2008-1466" published="2008-03-24" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple PHP remote file inclusion vulnerabilities in W-Agora 4.0 allow remote attackers to execute arbitrary PHP code via a URL in the bn_dir_default parameter to (1) add_user.php, (2) create_forum.php, (3) create_user.php, (4) delete_notes.php, (5) delete_user.php, (6) edit_forum.php, (7) mail_users.php, (8) moderate_notes.php, and (9) reorder_forums.php.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28366">28366</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41352">wagora-bndirdefault-file-include(41352)</ref>
    </refs>
    <vuln_soft>
      <prod name="w-agora" vendor="w-agora">
        <vers num="4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1467" seq="2008-1467" published="2008-03-24" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">** DISPUTED **  CenterIM 4.22.3 and earlier allows user-assisted remote attackers to execute arbitrary commands via shell metacharacters in a URI, related to "received URLs in the message window."  NOTE: this issue has been disputed due to the user-assisted nature, since the URL must be selected and launched by the victim.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28362">28362</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0956/references">ADV-2008-0956</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41362">centerim-chat-shell-command-execution(41362)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5283">5283</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00073.html">FEDORA-2008-2867</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00076.html">FEDORA-2008-2869</ref>
    </refs>
    <vuln_soft>
      <prod name="centerim" vendor="centerim">
        <vers num="4.22.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1468" seq="2008-1468" published="2008-03-24" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in namazu.cgi in Namazu before 2.0.18 allows remote attackers to inject arbitrary web script or HTML via UTF-7 encoded input, related to failure to set the charset, a different vector than CVE-2004-1318 and CVE-2001-1350. NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02029444">HPSBMA02492</ref>
      <ref source="JVN" url="http://jvn.jp/jp/JVN%2300892830/index.html">JVN#00892830</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html">SUSE-SR:2008:017</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=127239985506823&amp;w=2">SSRT100083</ref>
      <ref source="CONFIRM" url="http://www.namazu.org/security.html.en">http://www.namazu.org/security.html.en</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28380">28380</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41360">namazu-character-encoding-xss(41360)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00575.html">FEDORA-2008-2678</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00654.html">FEDORA-2008-2767</ref>
    </refs>
    <vuln_soft>
      <prod name="namazu" vendor="namazu">
        <vers num="1.3.0.11"/>
        <vers num="2.0"/>
        <vers num="2.0.2"/>
        <vers num="2.0.12"/>
        <vers num="2.0.13"/>
        <vers num="2.0.14"/>
        <vers num="2.0.15"/>
        <vers num="2.0.16"/>
        <vers num="2.0.17" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1469" seq="2008-1469" published="2008-03-24" modified="2011-07-25" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:P)">
    <desc>
      <descript source="cve">Gallarific Free Edition 1.1 does not require authentication for (1) photos.php, (2) comments.php, and (3) gallery.php in gadmin/, which allows remote attackers to edit objects via a direct request, different vectors than CVE-2008-1327.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
      <descript source="nvd">More information available at: http://www.securityfocus.com/bid/28163/info</descript>
    </desc>
    <loss_types>
      <avail/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs/>
    <vuln_soft>
      <prod name="gallarific" vendor="gallarific">
        <vers num="1.1" edition="-:free"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1470" seq="2008-1470" published="2008-03-24" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Incomplete blacklist vulnerability in IISWebAgentIF.dll in the WebID RSA Authentication Agent 5.3, and possibly earlier, allows remote attackers to conduct cross-site scripting (XSS) attacks via the postdata parameter, due to an incomplete fix for CVE-2005-1118.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3768">3768</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489691/100/0/threaded">20080317 Security Advisory on RSA Web ID (XSS)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28277">28277</ref>
    </refs>
    <vuln_soft>
      <prod name="webid" vendor="rsa">
        <vers num="5.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1471" seq="2008-1471" published="2008-03-24" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The cpoint.sys driver in Panda Internet Security 2008 and Antivirus+ Firewall 2008 allows local users to cause a denial of service (system crash or kernel panic), overwrite memory, or execute arbitrary code via a crafted IOCTL request that triggers an out-of-bounds write of kernel memory.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.pandasecurity.com/homeusers/support/card?id=41231&amp;idIdioma=2&amp;ref=ProdExp" patch="1">http://www.pandasecurity.com/homeusers/support/card?id=41231&amp;idIdioma=2&amp;ref=ProdExp</ref>
      <ref source="CONFIRM" url="http://www.pandasecurity.com/homeusers/support/card?id=41337&amp;idIdioma=2&amp;ref=ProdExp" patch="1">http://www.pandasecurity.com/homeusers/support/card?id=41337&amp;idIdioma=2&amp;ref=ProdExp</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489292/100/0/threaded">20080308 [TKADV2008-001] Panda Internet Security/Antivirus+Firewall 2008 cpoint.sys Kernel Driver Memory Corruption Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28150" patch="1">28150</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019568">1019568</ref>
      <ref source="MISC" url="http://www.trapkit.de/advisories/TKADV2008-001.txt" patch="1">http://www.trapkit.de/advisories/TKADV2008-001.txt</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0801/references">ADV-2008-0801</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41079">panda-antivirus-cpointsys-priv-escalation(41079)</ref>
    </refs>
    <vuln_soft>
      <prod name="panda_antivirus_and_firewall" vendor="panda">
        <vers num="2008"/>
      </prod>
      <prod name="panda_internet_security" vendor="panda">
        <vers num="2008"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1472" seq="2008-1472" published="2008-03-24" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the ListCtrl ActiveX Control (ListCtrl.ocx), as used in multiple CA products including BrightStor ARCserve Backup R11.5, Desktop Management Suite r11.1 through r11.2, and Unicenter products r11.1 through r11.2, allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a long argument to the AddColumn method.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://community.ca.com/blogs/casecurityresponseblog/archive/2008/3/28.aspx">http://community.ca.com/blogs/casecurityresponseblog/archive/2008/3/28.aspx</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489893/100/0/threaded">20080320 Note about recently publicized CA BrightStor ActiveX exploit code</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490263/100/0/threaded">20080328 CA Multiple Products DSM ListCtrl ActiveX Control Buffer Overflow Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28268">28268</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019617">1019617</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0902/references" adv="1">ADV-2008-0902</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41225">ca-arcserve-listctrl-bo(41225)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5264">5264</ref>
    </refs>
    <vuln_soft>
      <prod name="brightstor_arcserve_backup_laptops_desktops" vendor="computer_associates">
        <vers num="11.5"/>
      </prod>
      <prod name="desktop_management_suite" vendor="computer_associates">
        <vers num="r11.1" edition="a"/>
        <vers num="r11.1" edition="c1"/>
        <vers num="r11.1" edition="ga"/>
        <vers num="r11.2"/>
      </prod>
      <prod name="unicenter_dsm_r11_list_control_atx" vendor="computer_associates">
        <vers num="11.2.3.1895"/>
      </prod>
      <prod name="asset_management" vendor="unicenter">
        <vers num="r11.1" edition="a"/>
        <vers num="r11.1" edition="c1"/>
        <vers num="r11.1" edition="ga"/>
        <vers num="r11.2" edition="a"/>
        <vers num="r11.2" edition="c1"/>
      </prod>
      <prod name="desktop_management_bundle" vendor="unicenter">
        <vers num="r11.1" edition="a"/>
        <vers num="r11.1" edition="c1"/>
        <vers num="r11.1" edition="ga"/>
        <vers num="r11.2" edition="a"/>
        <vers num="r11.2" edition="c1"/>
      </prod>
      <prod name="remote_control" vendor="unicenter">
        <vers num="r11.1" edition="a"/>
        <vers num="r11.1" edition="c1"/>
        <vers num="r11.1" edition="ga"/>
        <vers num="r11.2" edition="a"/>
        <vers num="r11.2" edition="c1"/>
      </prod>
      <prod name="software_delivery" vendor="unicenter">
        <vers num="r11.1" edition="a"/>
        <vers num="r11.1" edition="c1"/>
        <vers num="r11.1" edition="ga"/>
        <vers num="r11.2" edition="a"/>
        <vers num="r11.2" edition="c1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1473" seq="2008-1473" published="2008-03-24" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The Altiris Client Service (AClient.exe) in Symantec Altiris Deployment Solution 6.8.x before 6.9.164 allows local users to gain privileges via a "Shatter" style attack.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://securityresponse.symantec.com/avcenter/security/Content/2008.03.10.html" patch="1">http://securityresponse.symantec.com/avcenter/security/Content/2008.03.10.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28110">28110</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019569">1019569</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0843/references" adv="1">ADV-2008-0843</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41100">symantec-altiris-aclient-priv-escalation(41100)</ref>
    </refs>
    <vuln_soft>
      <prod name="altiris_deployment_solution" vendor="symantec">
        <vers num="6.8" edition="sp1"/>
        <vers num="6.8" edition="sp2"/>
        <vers num="6.8.282"/>
        <vers num="6.8.378"/>
        <vers num="6.8.380"/>
        <vers num="6.8.380.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1474" seq="2008-1474" published="2008-03-24" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple unspecified vulnerabilities in Roundup before 1.4.4 have unknown impact and attack vectors, some of which may be related to cross-site scripting (XSS).</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://roundup.cvs.sourceforge.net/roundup/roundup/CHANGES.txt?revision=1.939&amp;view=markup" adv="1" patch="1">http://roundup.cvs.sourceforge.net/roundup/roundup/CHANGES.txt?revision=1.939&amp;view=markup</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200805-21.xml">GLSA-200805-21</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1554">DSA-1554</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28239" patch="1">28239</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0891" adv="1">ADV-2008-0891</ref>
      <ref source="MISC" url="https://bugzilla.redhat.com/show_bug.cgi?id=436546">https://bugzilla.redhat.com/show_bug.cgi?id=436546</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41241">roundup-multiple-unspecified(41241)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00264.html">FEDORA-2008-2370</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00375.html">FEDORA-2008-2471</ref>
    </refs>
    <vuln_soft>
      <prod name="roundup" vendor="roundup-tracker">
        <vers num="0.1.0"/>
        <vers num="0.1.1"/>
        <vers num="0.1.2"/>
        <vers num="0.1.3"/>
        <vers num="0.2.0"/>
        <vers num="0.2.1"/>
        <vers num="0.2.2"/>
        <vers num="0.2.3"/>
        <vers num="0.2.4"/>
        <vers num="0.2.5"/>
        <vers num="0.2.6"/>
        <vers num="0.2.7"/>
        <vers num="0.2.8"/>
        <vers num="0.3.0" edition="pre1"/>
        <vers num="0.3.0" edition="pre2"/>
        <vers num="0.3.0" edition="pre3"/>
        <vers num="0.4.0" edition="b1"/>
        <vers num="0.4.0" edition="b2"/>
        <vers num="0.4.1"/>
        <vers num="0.4.2" edition="pr1"/>
        <vers num="0.5"/>
        <vers num="0.5.0" edition="beta1"/>
        <vers num="0.5.0" edition="beta2"/>
        <vers num="0.5.0" edition="pr1"/>
        <vers num="0.5.1"/>
        <vers num="0.5.2"/>
        <vers num="0.5.3"/>
        <vers num="0.5.4"/>
        <vers num="0.5.5"/>
        <vers num="0.5.6"/>
        <vers num="0.5.7"/>
        <vers num="0.5.8" edition="stable"/>
        <vers num="0.5.9"/>
        <vers num="0.6.0" edition="b1"/>
        <vers num="0.6.0" edition="b2"/>
        <vers num="0.6.0" edition="b3"/>
        <vers num="0.6.0" edition="b4"/>
        <vers num="0.6.1"/>
        <vers num="0.6.2"/>
        <vers num="0.6.3"/>
        <vers num="0.6.4"/>
        <vers num="0.6.5"/>
        <vers num="0.6.6"/>
        <vers num="0.6.7"/>
        <vers num="0.6.8"/>
        <vers num="0.6.9"/>
        <vers num="0.6.10"/>
        <vers num="0.6.11"/>
        <vers num="0.7.0" edition="b1"/>
        <vers num="0.7.0" edition="b2"/>
        <vers num="0.7.0" edition="b3"/>
        <vers num="0.7.1"/>
        <vers num="0.7.2"/>
        <vers num="0.7.3"/>
        <vers num="0.7.4"/>
        <vers num="0.7.5"/>
        <vers num="0.7.6"/>
        <vers num="0.7.7"/>
        <vers num="0.7.8"/>
        <vers num="0.7.9"/>
        <vers num="0.7.10"/>
        <vers num="0.7.11"/>
        <vers num="0.7.12"/>
        <vers num="0.8.0" edition="b1"/>
        <vers num="0.8.0" edition="b2"/>
        <vers num="0.8.1"/>
        <vers num="0.8.2"/>
        <vers num="0.8.3"/>
        <vers num="0.8.4"/>
        <vers num="0.8.5"/>
        <vers num="0.8.6"/>
        <vers num="0.9.0" edition="b1"/>
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.1.0"/>
        <vers num="1.1.1"/>
        <vers num="1.1.2"/>
        <vers num="1.2.0"/>
        <vers num="1.2.1"/>
        <vers num="1.3.0"/>
        <vers num="1.3.1"/>
        <vers num="1.3.2"/>
        <vers num="1.3.3"/>
        <vers num="1.4.0"/>
        <vers num="1.4.1"/>
        <vers num="1.4.2"/>
        <vers num="1.4.3" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1475" seq="2008-1475" published="2008-03-24" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">The xml-rpc server in Roundup 1.4.4 does not check property permissions, which allows attackers to bypass restrictions and edit or read restricted properties via the (1) list, (2) display, and (3) set methods.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200805-21.xml">GLSA-200805-21</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/tracker/index.php?func=detail&amp;aid=1907211&amp;group_id=31577&amp;atid=402788">http://sourceforge.net/tracker/index.php?func=detail&amp;aid=1907211&amp;group_id=31577&amp;atid=402788</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28238">28238</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0891">ADV-2008-0891</ref>
      <ref source="MISC" url="https://bugzilla.redhat.com/show_bug.cgi?id=436546">https://bugzilla.redhat.com/show_bug.cgi?id=436546</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41240">roundup-xmlrpc-security-bypass(41240)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00264.html">FEDORA-2008-2370</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00375.html">FEDORA-2008-2471</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00452.html">FEDORA-2008-9712</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00478.html">FEDORA-2008-9734</ref>
    </refs>
    <vuln_soft>
      <prod name="roundup" vendor="roundup-tracker">
        <vers num="0.1.0"/>
        <vers num="0.1.1"/>
        <vers num="0.1.2"/>
        <vers num="0.1.3"/>
        <vers num="0.2.0"/>
        <vers num="0.2.1"/>
        <vers num="0.2.2"/>
        <vers num="0.2.3"/>
        <vers num="0.2.4"/>
        <vers num="0.2.5"/>
        <vers num="0.2.6"/>
        <vers num="0.2.7"/>
        <vers num="0.2.8"/>
        <vers num="0.3.0" edition="pre1"/>
        <vers num="0.3.0" edition="pre2"/>
        <vers num="0.3.0" edition="pre3"/>
        <vers num="0.4.0" edition="b1"/>
        <vers num="0.4.0" edition="b2"/>
        <vers num="0.4.1"/>
        <vers num="0.4.2" edition="pr1"/>
        <vers num="0.5"/>
        <vers num="0.5.0" edition="beta1"/>
        <vers num="0.5.0" edition="beta2"/>
        <vers num="0.5.0" edition="pr1"/>
        <vers num="0.5.1"/>
        <vers num="0.5.2"/>
        <vers num="0.5.3"/>
        <vers num="0.5.4"/>
        <vers num="0.5.5"/>
        <vers num="0.5.6"/>
        <vers num="0.5.7"/>
        <vers num="0.5.8" edition="stable"/>
        <vers num="0.5.9"/>
        <vers num="0.6.0" edition="b1"/>
        <vers num="0.6.0" edition="b2"/>
        <vers num="0.6.0" edition="b3"/>
        <vers num="0.6.0" edition="b4"/>
        <vers num="0.6.1"/>
        <vers num="0.6.2"/>
        <vers num="0.6.3"/>
        <vers num="0.6.4"/>
        <vers num="0.6.5"/>
        <vers num="0.6.6"/>
        <vers num="0.6.7"/>
        <vers num="0.6.8"/>
        <vers num="0.6.9"/>
        <vers num="0.6.10"/>
        <vers num="0.6.11"/>
        <vers num="0.7.0" edition="b1"/>
        <vers num="0.7.0" edition="b2"/>
        <vers num="0.7.0" edition="b3"/>
        <vers num="0.7.1"/>
        <vers num="0.7.2"/>
        <vers num="0.7.3"/>
        <vers num="0.7.4"/>
        <vers num="0.7.5"/>
        <vers num="0.7.6"/>
        <vers num="0.7.7"/>
        <vers num="0.7.8"/>
        <vers num="0.7.9"/>
        <vers num="0.7.10"/>
        <vers num="0.7.11"/>
        <vers num="0.7.12"/>
        <vers num="0.8.0" edition="b1"/>
        <vers num="0.8.0" edition="b2"/>
        <vers num="0.8.1"/>
        <vers num="0.8.2"/>
        <vers num="0.8.3"/>
        <vers num="0.8.4"/>
        <vers num="0.8.5"/>
        <vers num="0.8.6"/>
        <vers num="0.9.0" edition="b1"/>
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.1.0"/>
        <vers num="1.1.1"/>
        <vers num="1.1.2"/>
        <vers num="1.2.0"/>
        <vers num="1.2.1"/>
        <vers num="1.3.0"/>
        <vers num="1.3.1"/>
        <vers num="1.3.2"/>
        <vers num="1.3.3"/>
        <vers num="1.4.0"/>
        <vers num="1.4.1"/>
        <vers num="1.4.2"/>
        <vers num="1.4.3" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1476" seq="2008-1476" published="2008-03-24" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Serendipity (S9Y) before 1.3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to received trackbacks.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://blog.s9y.org/archives/192-Serendipity-1.3-released-addresses-security.html">http://blog.s9y.org/archives/192-Serendipity-1.3-released-addresses-security.html</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1528">DSA-1528</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28298">28298</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0925/references">ADV-2008-0925</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41343">serendipity-trackbacks-data-xss(41343)</ref>
    </refs>
    <vuln_soft>
      <prod name="serendipity" vendor="serendipity">
        <vers num="0.3"/>
        <vers num="0.4"/>
        <vers num="0.5_pl1"/>
        <vers num="0.6_pl3"/>
        <vers num="0.7"/>
        <vers num="0.7.1"/>
        <vers num="0.8"/>
        <vers num="0.8.1"/>
        <vers num="0.8.2"/>
        <vers num="0.8.3"/>
        <vers num="0.8.4"/>
        <vers num="0.8.5"/>
        <vers num="0.9"/>
        <vers num="0.9.1"/>
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.4"/>
        <vers num="1.1"/>
        <vers num="1.1.1"/>
        <vers num="1.1.2"/>
        <vers num="1.1.3"/>
        <vers num="1.1.4"/>
        <vers num="1.2"/>
        <vers num="1.2.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1477" seq="2008-1477" published="2008-03-24" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in busca.php in eForum 0.4 allow remote attackers to inject arbitrary web script or HTML via the (1) busca and (2) link parameters.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://omni.playhack.net/blog/?p=10">http://omni.playhack.net/blog/?p=10</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3767">3767</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489738/100/0/threaded">20080318 eForum 0.4 XSS</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28293">28293</ref>
    </refs>
    <vuln_soft>
      <prod name="eforum" vendor="jcorporate">
        <vers num="0.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1478" seq="2008-1478" published="2008-03-24" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Home FTP Server 1.4.5.89 allows remote attackers to cause a denial of service (crash) by opening a FTP passive mode connection, then closing the original FTP connection.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3766">3766</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489706/100/0/threaded">20080317 Home FTP Server DoS</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28283">28283</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5270">5270</ref>
    </refs>
    <vuln_soft>
      <prod name="home_ftp_server" vendor="ari_pikivirta">
        <vers num="1.4.5.89"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1479" seq="2008-1479" published="2008-03-24" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php in cyberfrogs.net cfnetgs 0.24 allows remote attackers to inject arbitrary web script or HTML via the directory parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28267">28267</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41391">cfnetgs-index-xss(41391)</ref>
    </refs>
    <vuln_soft>
      <prod name="cfnetgs" vendor="cyberfrogs">
        <vers num="0.24"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1480" seq="2008-1480" published="2008-03-24" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">rpc.metad in Sun Solaris 10 allows remote attackers to cause a denial of service (daemon crash) via a malformed RPC request.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-249146-1">249146</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2009-015.htm">http://support.avaya.com/elmodocs2/security/ASA-2009-015.htm</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28261">28261</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019652">1019652</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0918/references">ADV-2008-0918</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/0206">ADV-2009-0206</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41224">solaris-rpcmetad-dos(41224)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5698">oval:org.mitre.oval:def:5698</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5258">5258</ref>
    </refs>
    <vuln_soft>
      <prod name="solaris" vendor="sun">
        <vers num="10" edition=":x86"/>
      </prod>
      <prod name="sunos" vendor="sun">
        <vers num="5.10"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1481" seq="2008-1481" published="2008-03-24" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php in webSPELL 4.1.2 allows remote attackers to inject arbitrary web script or HTML via the board parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28294">28294</ref>
      <ref source="MISC" url="http://www.securityfocus.com/bid/28294/exploit">http://www.securityfocus.com/bid/28294/exploit</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41417">webspell-board-xss(41417)</ref>
    </refs>
    <vuln_soft>
      <prod name="webspell" vendor="webspell">
        <vers num="4.1.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1482" seq="2008-1482" published="2008-03-24" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple integer overflows in xine-lib 1.1.11 and earlier allow remote attackers to trigger heap-based buffer overflows and possibly execute arbitrary code via (1) a crafted .FLV file, which triggers an overflow in demuxers/demux_flv.c; (2) a crafted .MOV file, which triggers an overflow in demuxers/demux_qt.c; (3) a crafted .RM file, which triggers an overflow in demuxers/demux_real.c; (4) a crafted .MVE file, which triggers an overflow in demuxers/demux_wc3movie.c; (5) a crafted .MKV file, which triggers an overflow in demuxers/ebml.c; or (6) a crafted .CAK file, which triggers an overflow in demuxers/demux_film.c.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/xinehof-adv.txt">http://aluigi.altervista.org/adv/xinehof-adv.txt</ref>
      <ref source="MISC" url="http://aluigi.org/poc/xinehof.zip">http://aluigi.org/poc/xinehof.zip</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00005.html">SUSE-SR:2008:008</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200808-01.xml">GLSA-200808-01</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3769">3769</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.441137">SSA:2008-092-01</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1586">DSA-1586</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:178">MDVSA-2008:178</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489894/100/0/threaded">20080320 Multiple heap overflows in xine-lib 1.1.11</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28370">28370</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-635-1">USN-635-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0981/references">ADV-2008-0981</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=438663">https://bugzilla.redhat.com/show_bug.cgi?id=438663</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41350">xinelib-multiple-bo(41350)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00143.html">FEDORA-2008-2945</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00157.html">FEDORA-2008-2849</ref>
    </refs>
    <vuln_soft>
      <prod name="xine-lib" vendor="xine">
        <vers num="1.1.11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1483" seq="2008-1483" published="2008-03-24" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.9" CVSS_base_score="6.9" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">OpenSSH 4.3p2, and probably other versions, allows local users to hijack forwarded X connections by causing ssh to set DISPLAY to :10, even when another process is listening on the associated port, as demonstrated by opening TCP port 6010 (IPv4) and sniffing a cookie sent by Emacs.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="NETBSD" url="ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-005.txt.asc">NetBSD-SA2008-005</ref>
      <ref source="CONFIRM" url="http://aix.software.ibm.com/aix/efixes/security/ssh_advisory.asc">http://aix.software.ibm.com/aix/efixes/security/ssh_advisory.asc</ref>
      <ref source="CONFIRM" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=463011">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=463011</ref>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01462841">HPSBUX02337</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html">APPLE-SA-2008-09-15</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00007.html">SUSE-SR:2008:009</ref>
      <ref source="FREEBSD" url="http://security.FreeBSD.org/advisories/FreeBSD-SA-08:05.openssh.asc">FreeBSD-SA-08:05</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=590180&amp;group_id=69227">http://sourceforge.net/project/shownotes.php?release_id=590180&amp;group_id=69227</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-237444-1">237444</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-77-1019235.1-1">1019235</ref>
      <ref source="CONFIRM" url="http://support.attachmate.com/techdocs/2374.html">http://support.attachmate.com/techdocs/2374.html</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2008-205.htm">http://support.avaya.com/elmodocs2/security/ASA-2008-205.htm</ref>
      <ref source="CISCO" url="http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2008-1483">20130220 OpenSSH Forwarded X Connection Session Hijack Vulnerability</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0120">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0120</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1576">DSA-1576</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200804-03.xml">GLSA-200804-03</ref>
      <ref source="MLIST" url="http://www.globus.org/mail_archive/security-announce/2008/04/msg00000.html">[security-announce] 20080403 Globus Security Advisory 2008-01: GSI-OpenSSH vulnerability</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:078">MDVSA-2008:078</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490054/100/0/threaded">20080325 rPSA-2008-0120-1 gnome-ssh-askpass openssh openssh-client openssh-server</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28444">28444</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019707">1019707</ref>
      <ref source="SLACKWARE" url="http://www.slackware.org/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.540188">SSA:2008-095-01</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-260A.html">TA08-260A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0994/references">ADV-2008-0994</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1123/references">ADV-2008-1123</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1124/references">ADV-2008-1124</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1448/references">ADV-2008-1448</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1526/references">ADV-2008-1526</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1624/references">ADV-2008-1624</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1630/references">ADV-2008-1630</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2396">ADV-2008-2396</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2584">ADV-2008-2584</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41438">openssh-sshd-session-hijacking(41438)</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2397">https://issues.rpath.com/browse/RPL-2397</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6085">oval:org.mitre.oval:def:6085</ref>
      <ref source="UBUNTU" url="https://usn.ubuntu.com/597-1/">USN-597-1</ref>
    </refs>
    <vuln_soft>
      <prod name="openssh" vendor="openbsd">
        <vers num="4.3p2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1484" seq="2008-1484" published="2008-03-24" modified="2018-10-11" severity="Low" CVSS_version="2.0" CVSS_score="3.5" CVSS_base_score="3.5" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="6.8" CVSS_vector="(AV:N/AC:M/Au:S/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The password reset feature in PunBB 1.2.16 and earlier uses predictable random numbers based on the system time, which allows remote authenticated users to determine the new password via a brute force attack on a seed that is based on the approximate creation time of the targeted account.  NOTE: this issue might be related to CVE-2006-5737.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://punbb.org/download/changelogs/1.2.16_to_1.2.17.txt">http://punbb.org/download/changelogs/1.2.16_to_1.2.17.txt</ref>
      <ref source="CONFIRM" url="http://punbb.org/forums/viewtopic.php?id=18460">http://punbb.org/forums/viewtopic.php?id=18460</ref>
      <ref source="MISC" url="http://sektioneins.de/advisories/SE-2008-01.txt">http://sektioneins.de/advisories/SE-2008-01.txt</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488408/100/200/threaded">20080220 Advisory SE-2008-01: PunBB Blind Password Recovery Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27908" patch="1">27908</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5165">5165</ref>
    </refs>
    <vuln_soft>
      <prod name="punbb" vendor="punbb">
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0_alpha"/>
        <vers num="1.0_beta1"/>
        <vers num="1.0_beta2"/>
        <vers num="1.0_beta3"/>
        <vers num="1.0_rc1"/>
        <vers num="1.0_rc2"/>
        <vers num="1.1"/>
        <vers num="1.1.1"/>
        <vers num="1.1.2"/>
        <vers num="1.1.3"/>
        <vers num="1.1.4"/>
        <vers num="1.1.5"/>
        <vers num="1.2"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2"/>
        <vers num="1.2.3"/>
        <vers num="1.2.4"/>
        <vers num="1.2.5"/>
        <vers num="1.2.6"/>
        <vers num="1.2.7"/>
        <vers num="1.2.8"/>
        <vers num="1.2.9"/>
        <vers num="1.2.10"/>
        <vers num="1.2.11"/>
        <vers num="1.2.12"/>
        <vers num="1.2.13"/>
        <vers num="1.2.14"/>
        <vers num="1.2.15"/>
        <vers num="1.2.16"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1485" seq="2008-1485" published="2008-03-24" modified="2009-09-01" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in PunBB 1.2.16 and earlier allows remote attackers to inject arbitrary web script or HTML via the get_host parameter to moderate.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://punbb.org/download/changelogs/1.2.16_to_1.2.17.txt">http://punbb.org/download/changelogs/1.2.16_to_1.2.17.txt</ref>
    </refs>
    <vuln_soft>
      <prod name="punbb" vendor="punbb">
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0_alpha"/>
        <vers num="1.0_beta1"/>
        <vers num="1.0_beta2"/>
        <vers num="1.0_beta3"/>
        <vers num="1.0_rc1"/>
        <vers num="1.0_rc2"/>
        <vers num="1.1"/>
        <vers num="1.1.1"/>
        <vers num="1.1.2"/>
        <vers num="1.1.3"/>
        <vers num="1.1.4"/>
        <vers num="1.1.5"/>
        <vers num="1.2"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2"/>
        <vers num="1.2.3"/>
        <vers num="1.2.4"/>
        <vers num="1.2.5"/>
        <vers num="1.2.6"/>
        <vers num="1.2.7"/>
        <vers num="1.2.8"/>
        <vers num="1.2.9"/>
        <vers num="1.2.10"/>
        <vers num="1.2.11"/>
        <vers num="1.2.12"/>
        <vers num="1.2.13"/>
        <vers num="1.2.14"/>
        <vers num="1.2.15"/>
        <vers num="1.2.16"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1486" seq="2008-1486" published="2008-03-24" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in Phorum before 5.2.6, when mysql_use_ft is disabled, allows remote attackers to execute arbitrary SQL commands via the non-fulltext search.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.phorum.org/phorum5/read.php?64,126815,126815" patch="1">http://www.phorum.org/phorum5/read.php?64,126815,126815</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28540">28540</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41418">phorum-nonfulltext-sql-injection(41418)</ref>
    </refs>
    <vuln_soft>
      <prod name="phorum" vendor="phorum">
        <vers num="5.0.0_alpha"/>
        <vers num="5.0.1_alpha"/>
        <vers num="5.0.2_alpha"/>
        <vers num="5.0.3_beta"/>
        <vers num="5.0.4_beta"/>
        <vers num="5.0.4a_beta"/>
        <vers num="5.0.5_beta"/>
        <vers num="5.0.6_beta"/>
        <vers num="5.0.7_beta"/>
        <vers num="5.0.7a_beta"/>
        <vers num="5.0.8_rc"/>
        <vers num="5.0.9"/>
        <vers num="5.0.10"/>
        <vers num="5.0.11"/>
        <vers num="5.0.12"/>
        <vers num="5.0.13"/>
        <vers num="5.0.13a"/>
        <vers num="5.0.14"/>
        <vers num="5.0.14a"/>
        <vers num="5.0.15"/>
        <vers num="5.0.15a"/>
        <vers num="5.0.16"/>
        <vers num="5.0.17"/>
        <vers num="5.0.17a"/>
        <vers num="5.0.18"/>
        <vers num="5.0.19"/>
        <vers num="5.0.20"/>
        <vers num="5.1.13"/>
        <vers num="5.1.14"/>
        <vers num="5.1.17"/>
        <vers num="5.1.18"/>
        <vers num="5.1.20"/>
        <vers num="5.1.21"/>
        <vers num="5.1.25"/>
        <vers num="5.2"/>
        <vers num="5.2.1"/>
        <vers num="5.2.2" edition="beta"/>
        <vers num="5.2.3" edition="rc1"/>
        <vers num="5.2.4" edition="rc2"/>
        <vers num="5.2.5" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1487" seq="2008-1487" published="2008-03-24" modified="2011-07-25" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in LinPHA before 1.3.3 allow remote attackers to inject arbitrary web script or HTML via (1) ftp/index.php, (2) viewer.php, (3) functions/other.php, (4) include/left_menu.class.php, and (5) plugins/stats/stats_view.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://linpha.cvs.sourceforge.net/linpha/linpha/ChangeLog?view=markup">http://linpha.cvs.sourceforge.net/linpha/linpha/ChangeLog?view=markup</ref>
      <ref source="CONFIRM" url="http://linpha.sourceforge.net/wiki/index.php/Release_Notes#Version_1.3.3">http://linpha.sourceforge.net/wiki/index.php/Release_Notes#Version_1.3.3</ref>
    </refs>
    <vuln_soft>
      <prod name="linpha" vendor="linpha">
        <vers num="1.0"/>
        <vers num="1.1.0"/>
        <vers num="1.1.1"/>
        <vers num="1.2.0"/>
        <vers num="1.3.0"/>
        <vers num="1.3.1"/>
        <vers num="1.3.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1488" seq="2008-1488" published="2008-03-24" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in apc.c in Alternative PHP Cache (APC) 3.0.11 through 3.0.16 allows remote attackers to execute arbitrary code via a long filename.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://papasian.org/~dannyp/apcsmash.php.txt">http://papasian.org/~dannyp/apcsmash.php.txt</ref>
      <ref source="CONFIRM" url="http://pecl.php.net/bugs/bug.php?id=13415">http://pecl.php.net/bugs/bug.php?id=13415</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200804-07.xml">GLSA-200804-07</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:082">MDVSA-2008:082</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28457">28457</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41420">apc-apcsearchpaths-bo(41420)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00548.html">FEDORA-2008-6344</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00582.html">FEDORA-2008-6401</ref>
    </refs>
    <vuln_soft>
      <prod name="alternative_php_cache" vendor="pecl-php">
        <vers num="3.0.11"/>
        <vers num="3.0.12"/>
        <vers num="3.0.12p1"/>
        <vers num="3.0.12p2"/>
        <vers num="3.0.13"/>
        <vers num="3.0.14"/>
        <vers num="3.0.15"/>
        <vers num="3.0.16"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1489" seq="2008-1489" published="2008-03-24" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Integer overflow in the MP4_ReadBox_rdrf function in libmp4.c for VLC 0.8.6e allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted MP4 RDRF box that triggers a heap-based buffer overflow, a different vulnerability than CVE-2008-0984.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200804-25.xml">GLSA-200804-25</ref>
      <ref source="CONFIRM" url="http://trac.videolan.org/vlc/changeset/09572892df7e72c0d4e598c0b5e076cf330d8b0a">http://trac.videolan.org/vlc/changeset/09572892df7e72c0d4e598c0b5e076cf330d8b0a</ref>
      <ref source="CONFIRM" url="http://wiki.videolan.org/Changelog/0.8.6f">http://wiki.videolan.org/Changelog/0.8.6f</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1543">DSA-1543</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28433">28433</ref>
      <ref source="CONFIRM" url="http://www.videolan.org/security/sa0803.php">http://www.videolan.org/security/sa0803.php</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0985">ADV-2008-0985</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41412">vlcmediaplayer-mp4readbox-rdrf-bo(41412)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14841">oval:org.mitre.oval:def:14841</ref>
    </refs>
    <vuln_soft>
      <prod name="vlc" vendor="videolan">
        <vers num="0.8.6e"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1490" seq="2008-1490" published="2008-03-25" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in a certain Aurigma ActiveX control in ImageUploader4.ocx 4.1.36.0, as used with Piczo (aka Pizco) and possibly other online services, allows remote attackers to execute arbitrary code via unspecified vectors, possibly involving a long Action property, a different CLSID than CVE-2008-0659.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=120605071403813&amp;w=2">20080320 Pizco vulnerable to buffer overflow in activex</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28354">28354</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40152">aurigma-imageuploader41-bo(40152)</ref>
    </refs>
    <vuln_soft>
      <prod name="image_uploader_activex_control" vendor="aurigma">
        <vers num="4.1.36.0"/>
      </prod>
      <prod name="imageuploader4" vendor="piczo">
        <vers num="4.1.36.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1491" seq="2008-1491" published="2008-03-25" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the DPC Proxy server (DpcProxy.exe) in ASUS Remote Console (aka ARC or ASMB3) 2.0.0.19 and 2.0.0.24 allows remote attackers to execute arbitrary code via a long string to TCP port 623.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/asuxdpc-adv.txt">http://aluigi.altervista.org/adv/asuxdpc-adv.txt</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3771">3771</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489966/100/0/threaded">20080321 Buffer-overflow in ASUS Remote Console 2.0.0.24</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28394">28394</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0982/references">ADV-2008-0982</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41358">asus-asmb3-dpcproxy-bo(41358)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5694">5694</ref>
    </refs>
    <vuln_soft>
      <prod name="remote_console" vendor="asus">
        <vers num="2.0.0.19"/>
        <vers num="2.0.0.24"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1492" seq="2008-1492" published="2008-03-25" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple directory traversal vulnerabilities in CoronaMatrix phpAddressBook 2.11 allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the skin parameter to (1) index.php and (2) install.php.  NOTE: it was later reported that vector 1 is also present in 2.0.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://0x90.com.ar/Advisory/20080321.txt">http://0x90.com.ar/Advisory/20080321.txt</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3772">3772</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489971/100/0/threaded">20080322 phpAddressBook v2.11 Multiple Local File Inclusion Vulnerabilities</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491525/100/0/threaded">20080501 php-addressbook v2.0 Multiple Remote Vulnerabilities (LFI/XSS)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28397">28397</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41394">phpaddressbook-skin-directory-traversal(41394)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5288">5288</ref>
    </refs>
    <vuln_soft>
      <prod name="phpaddressbook" vendor="coronamatrix">
        <vers num="2.11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1493" seq="2008-1493" published="2008-03-25" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in login.php in Cuteflow Bin 1.5.0 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the language parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490055/100/0/threaded">20080325 Cuteflow Bin v1.5.0 Local File Inclusion Vuln</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28419">28419</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41392">cuteflowbin-login-file-include(41392)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5296">5296</ref>
    </refs>
    <vuln_soft>
      <prod name="cuteflow_bin" vendor="cuteflow-bin">
        <vers num="1.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1494" seq="2008-1494" published="2008-03-25" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in inc/module/online.php in Easy-Clanpage 2.2 allows remote attackers to execute arbitrary SQL commands via the id parameter in a user details action, a different vector than CVE-2008-1425.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3773">3773</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489888/100/0/threaded">20080320 Easy-Clanpage 2.2 (id) Remote SQL Injection Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28329">28329</ref>
    </refs>
    <vuln_soft>
      <prod name="easy-clanpage" vendor="easy-clanpage">
        <vers num="2.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1495" seq="2008-1495" published="2008-03-25" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unrestricted file upload vulnerability in administrer/produits.php in PEEL, possibly 3.x and earlier, allows remote authenticated administrators to upload and execute arbitrary PHP files via a modified content type in an ajout action, as demonstrated by (1) image/gif and (2) application/pdf.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://realn.free.fr/releases/70207">http://realn.free.fr/releases/70207</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28346">28346</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41354">peel-produits-file-upload(41354)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5281">5281</ref>
    </refs>
    <vuln_soft>
      <prod name="peel" vendor="peel">
        <vers num="1.0b"/>
        <vers num="2.6"/>
        <vers num="2.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1496" seq="2008-1496" published="2008-03-25" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in PEEL, possibly 3.x and earlier, allow remote attackers to execute arbitrary SQL commands via the (1) email parameter to (a) membre.php, and the (2) timestamp parameter to (b) the details action in achat/historique_commandes.php and (c) the facture action in factures/facture_html.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://realn.free.fr/releases/70207">http://realn.free.fr/releases/70207</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28346">28346</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41341">peel-timestamp-sql-injection(41341)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41353">peel-membre-sql-injection(41353)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5281">5281</ref>
    </refs>
    <vuln_soft>
      <prod name="peel" vendor="peel">
        <vers num="1.0b"/>
        <vers num="2.6"/>
        <vers num="2.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1497" seq="2008-1497" published="2008-03-25" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.0" CVSS_base_score="9.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the IMAP service in NetWin SurgeMail 38k4-4 and earlier allows remote authenticated users to execute arbitrary code via long arguments to the LSUB command.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3774">3774</ref>
      <ref source="MISC" url="http://www.infigo.hr/en/in_focus/advisories/INFIGO-2008-03-07">http://www.infigo.hr/en/in_focus/advisories/INFIGO-2008-03-07</ref>
      <ref source="MISC" url="http://www.netwinsite.com/surgemail/help/updates.htm" adv="1">http://www.netwinsite.com/surgemail/help/updates.htm</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489959/100/0/threaded">20080321 [INFIGO-2008-03-07]: Surgemail 38k4 IMAP server remote stack overflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28377">28377</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41402">surgemail-imap-lsub-bo(41402)</ref>
    </refs>
    <vuln_soft>
      <prod name="surgemail" vendor="netwin">
        <vers num="1.8g3"/>
        <vers num="1.9b2"/>
        <vers num="2.0a2"/>
        <vers num="2.0c"/>
        <vers num="2.0e"/>
        <vers num="2.0g2"/>
        <vers num="2.1c7"/>
        <vers num="2.2a6"/>
        <vers num="2.2c10"/>
        <vers num="2.2g2"/>
        <vers num="2.2g3"/>
        <vers num="3.0a"/>
        <vers num="3.0c2"/>
        <vers num="3.2e"/>
        <vers num="3.5a"/>
        <vers num="3.5b3"/>
        <vers num="3.6d"/>
        <vers num="3.6f3"/>
        <vers num="3.6f5"/>
        <vers num="3.6f7"/>
        <vers num="3.7b"/>
        <vers num="3.7b3"/>
        <vers num="3.7b5"/>
        <vers num="3.7b6"/>
        <vers num="3.7b7"/>
        <vers num="3.7b8"/>
        <vers num="3.8a"/>
        <vers num="3.8b"/>
        <vers num="3.8d"/>
        <vers num="3.8f"/>
        <vers num="3.8f2"/>
        <vers num="3.8f3"/>
        <vers num="3.8i"/>
        <vers num="3.8i2"/>
        <vers num="3.8i3"/>
        <vers num="3.8k"/>
        <vers num="3.8k2"/>
        <vers num="3.8k3"/>
        <vers num="3.8m"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1498" seq="2008-1498" published="2008-03-25" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="9.0" CVSS_base_score="9.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the IMAP service in NetWin Surgemail 3.8k4-4 and earlier allows remote authenticated users to execute arbitrary code via a long first argument to the LIST command.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.netwinsite.com/surgemail/help/updates.htm">http://www.netwinsite.com/surgemail/help/updates.htm</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28260">28260</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0901/references">ADV-2008-0901</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5259">5259</ref>
    </refs>
    <vuln_soft>
      <prod name="surgemail" vendor="netwin">
        <vers num="3.8k4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1499" seq="2008-1499" published="2008-03-25" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in frontend/x/manpage.html in cPanel 11.18.3 and 11.21.0-BETA allows remote attackers to inject arbitrary web script or HTML via the query string.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3775">3775</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489963/100/0/threaded">20080321 XSS in cPanel 11.x</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28403">28403</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41374">cpanel-manpage-xss(41374)</ref>
    </refs>
    <vuln_soft>
      <prod name="cpanel" vendor="cpanel">
        <vers num="11.18.3"/>
        <vers num="11.21" edition="beta"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1500" seq="2008-1500" published="2008-03-25" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php in TinyPortal 0.8.6 and 1.0.3 allows remote attackers to inject arbitrary web script or HTML via the PHPSESSID parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28402">28402</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41376">tinyportal-index-xss(41376)</ref>
    </refs>
    <vuln_soft>
      <prod name="tinyportal" vendor="tinyportal">
        <vers num="0.8.6"/>
        <vers num="1.0.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1501" seq="2008-1501" published="2008-03-25" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The send_user_mode function in s_user.c in (1) Undernet ircu 2.10.12.12 and earlier, (2) snircd 1.3.4 and earlier, and unspecified other ircu derivatives allows remote attackers to cause a denial of service (daemon crash) via a malformed MODE command.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://hg.quakenet.org/snircd/rev/2da2b881d9f5">http://hg.quakenet.org/snircd/rev/2da2b881d9f5</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2008-March/060906.html">20080324 ircu/snircd remote crash vulnerability</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3779">3779</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489990/100/0/threaded">20080324 ircu/snircd remote crash vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28413">28413</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019687">1019687</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019688">1019688</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0977">ADV-2008-0977</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0978">ADV-2008-0978</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41397">snircd-sendusermode-dos(41397)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41401">undernet-ircu-sendusermode-dos(41401)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5306">5306</ref>
    </refs>
    <vuln_soft>
      <prod name="ircu" vendor="ircu">
        <vers num="2.10.12.12" prev="1"/>
      </prod>
      <prod name="snircd" vendor="quakenet">
        <vers num="1.3.4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1502" seq="2008-1502" published="2008-03-25" modified="2018-10-03" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The _bad_protocol_once function in phpgwapi/inc/class.kses.inc.php in KSES, as used in eGroupWare before 1.4.003, Moodle before 1.8.5, and other products, allows remote attackers to bypass HTML filtering and conduct cross-site scripting (XSS) attacks via a string containing crafted URL protocols.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.moodle.org/en/Release_Notes#Moodle_1.8.5" adv="1" patch="1">http://docs.moodle.org/en/Release_Notes#Moodle_1.8.5</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00006.html">SUSE-SR:2008:015</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1691" patch="1">DSA-1691</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2009/dsa-1871">DSA-1871</ref>
      <ref source="CONFIRM" url="http://www.egroupware.org/changelog">http://www.egroupware.org/changelog</ref>
      <ref source="MISC" url="http://www.egroupware.org/viewvc/branches/1.4/phpgwapi/inc/class.kses.inc.php?r1=23625&amp;r2=25110&amp;pathrev=25110">http://www.egroupware.org/viewvc/branches/1.4/phpgwapi/inc/class.kses.inc.php?r1=23625&amp;r2=25110&amp;pathrev=25110</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200805-04.xml">GLSA-200805-04</ref>
      <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/07/08/14">[oss-security] 20080708 Re: CVE request: moodle xss in &lt; 1.8.5</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28424" patch="1">28424</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0989/references" adv="1">ADV-2008-0989</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41435">egroupware-badprotocolonce-security-bypass(41435)</ref>
      <ref source="UBUNTU" url="https://usn.ubuntu.com/658-1/">USN-658-1</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00331.html">FEDORA-2008-6226</ref>
    </refs>
    <vuln_soft>
      <prod name="egroupware" vendor="egroupware">
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.3"/>
        <vers num="1.0.6"/>
        <vers num="1.2.106-2"/>
        <vers num="1.4.001"/>
        <vers num="1.4.002" prev="1"/>
      </prod>
      <prod name="moodle" vendor="moodle">
        <vers num="1.1.1"/>
        <vers num="1.2"/>
        <vers num="1.2.1"/>
        <vers num="1.3"/>
        <vers num="1.3.1"/>
        <vers num="1.3.2"/>
        <vers num="1.3.3"/>
        <vers num="1.3.4"/>
        <vers num="1.4.1"/>
        <vers num="1.4.2"/>
        <vers num="1.4.3"/>
        <vers num="1.4.4"/>
        <vers num="1.4.5"/>
        <vers num="1.5" edition="beta"/>
        <vers num="1.5.1"/>
        <vers num="1.5.2"/>
        <vers num="1.5.3"/>
        <vers num="1.6"/>
        <vers num="1.6.1"/>
        <vers num="1.6.2"/>
        <vers num="1.6.3"/>
        <vers num="1.6.4"/>
        <vers num="1.6.5"/>
        <vers num="1.6.6"/>
        <vers num="1.6.7"/>
        <vers num="1.7"/>
        <vers num="1.7.1"/>
        <vers num="1.7.2"/>
        <vers num="1.7.3"/>
        <vers num="1.7.4"/>
        <vers num="1.7.5"/>
        <vers num="1.7.6"/>
        <vers num="1.8"/>
        <vers num="1.8.1"/>
        <vers num="1.8.2"/>
        <vers num="1.8.3"/>
        <vers num="1.8.4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1503" seq="2008-1503" published="2008-03-25" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the web management interface in F5 BIG-IP 9.4.3 allows remote attackers to inject arbitrary web script or HTML via (1) the name of a node object, or the (2) sysContact or (3) sysLocation SNMP configuration field, aka "Audit Log XSS." NOTE: these issues might be resultant from cross-site request forgery (CSRF) vulnerabilities.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3778">3778</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489991/100/0/threaded">20080323 F5 BIG-IP Web Management Audit Log XSS</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28416">28416</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41440">f5bigip-auditlog-xss(41440)</ref>
    </refs>
    <vuln_soft>
      <prod name="tmos" vendor="f5">
        <vers num="9.4.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1504" seq="2008-1504" published="2008-03-25" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in setup.php3 in phpHeaven phpMyChat 0.14.5 allows remote attackers to inject arbitrary web script or HTML via the Lang parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28399">28399</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41381">phpmychat-setup-xss(41381)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpmychat" vendor="phpheaven">
        <vers num="0.14.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1505" seq="2008-1505" published="2008-03-25" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in the SSTREAMTV custompages (com_custompages) 1.1 and earlier component for Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the cpage parameter to index.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28409">28409</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41396">custompages-index-file-include(41396)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5294">5294</ref>
    </refs>
    <vuln_soft>
      <prod name="custompages" vendor="sstreamtv">
        <vers num="1.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1506" seq="2008-1506" published="2008-03-25" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">PEEL, possibly 3.x and earlier, allows remote attackers to obtain configuration information via a direct request to phpinfo.php, which calls the phpinfo function.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://realn.free.fr/releases/70207">http://realn.free.fr/releases/70207</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41494">peel-phpinfo-information-disclosure(41494)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5281">5281</ref>
    </refs>
    <vuln_soft>
      <prod name="peel" vendor="peel">
        <vers num="1.0b"/>
        <vers num="2.6"/>
        <vers num="2.7"/>
        <vers num="3.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1507" seq="2008-1507" published="2008-03-25" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PEEL, possibly 3.x and earlier, has (1) a default info@peel.fr account with password admin, and (2) a default contact@peel.fr account with password cinema, which allows remote attackers to gain administrative access.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://realn.free.fr/releases/70207">http://realn.free.fr/releases/70207</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41493">peel-default-password(41493)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5281">5281</ref>
    </refs>
    <vuln_soft>
      <prod name="peel" vendor="peel">
        <vers num="1.0b"/>
        <vers num="2.6"/>
        <vers num="2.7"/>
        <vers num="3.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1508" seq="2008-1508" published="2008-03-25" modified="2019-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in EfesTech E-Kont?r and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3776">3776</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489989/100/0/threaded">20080323 EfesTech E-Kont&amp;ouml;r (id) Remote SQL INJECTION</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28412">28412</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41419">ekontor-id-sql-injection(41419)</ref>
    </refs>
    <vuln_soft>
      <prod name="e-kontor" vendor="efestech">
        <vers num="-"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1509" seq="2008-1509" published="2008-03-25" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in XLPortal 2.2.4 and earlier allows remote attackers to execute arbitrary SQL commands via the query parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28408">28408</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41379">xlportal-index-sql-injection(41379)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5293">5293</ref>
    </refs>
    <vuln_soft>
      <prod name="xlportal" vendor="xlportal">
        <vers num="2.2.4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1510" seq="2008-1510" published="2008-03-25" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in system/workplace/admin/accounts/users_list.jsp in Alkacon OpenCMS 7.0.3 allows remote attackers to inject arbitrary web script or HTML via the (1) searchfilter or (2) listSearchFilter parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3777">3777</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489984/100/0/threaded">20080323 Alkacon OpenCms users_list.jsp searchfilter XSS</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28411">28411</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41390">opencms-userslist-xss(41390)</ref>
    </refs>
    <vuln_soft>
      <prod name="opencms" vendor="alkacon">
        <vers num="7.0.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1511" seq="2008-1511" published="2008-03-25" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple PHP remote file inclusion vulnerabilities in ooComments 1.0 allow remote attackers to execute arbitrary PHP code via a URL in the PathToComment parameter for (1) classes/class_admin.php and (2) classes/class_comments.php.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28401">28401</ref>
      <ref source="MISC" url="http://www.securityfocus.com/bid/28401/exploit">http://www.securityfocus.com/bid/28401/exploit</ref>
    </refs>
    <vuln_soft>
      <prod name="oocomments" vendor="oocomments">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1512" seq="2008-1512" published="2008-03-25" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in admin/admin_xs.php in eXtreme Styles module (XS-Mod) 2.3.1 and 2.4.0 for phpBB allows remote attackers to include and execute arbitrary files via a .. (dot dot) in the phpEx parameter. NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28432">28432</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41404">xs-adminxs-file-include(41404)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5301">5301</ref>
    </refs>
    <vuln_soft>
      <prod name="module_xs" vendor="phpbb">
        <vers num="2.3.1"/>
        <vers num="2.4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1513" seq="2008-1513" published="2008-03-25" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in Danneo CMS 0.5.1 and earlier, when the Referers statistics option is enabled, allows remote attackers to execute arbitrary SQL commands via the HTTP Referer header.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41153">cmsdanneo-index-sql-injection(41153)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5239">5239</ref>
    </refs>
    <vuln_soft>
      <prod name="cms" vendor="danneo">
        <vers num="0.5.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1514" seq="2008-1514" published="2008-03-25" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.9" CVSS_base_score="4.9" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">arch/s390/kernel/ptrace.c in Linux kernel 2.6.9, and other versions before 2.6.27-rc6, on s390 platforms allows local users to cause a denial of service (kernel panic) via the user-area-padding test from the ptrace testsuite in 31-bit mode, which triggers an invalid dereference.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=3d6e48f43340343d97839eadb1ab7b6a3ea98797" patch="1">http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=3d6e48f43340343d97839eadb1ab7b6a3ea98797</ref>
      <ref source="CONFIRM" url="http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.26.6" adv="1">http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.26.6</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00007.html">SUSE-SA:2008:051</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2008-0972.html">RHSA-2008:0972</ref>
      <ref source="MISC" url="http://sourceware.org/systemtap/wiki/utrace/tests">http://sourceware.org/systemtap/wiki/utrace/tests</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1653" patch="1">DSA-1653</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1655" patch="1">DSA-1655</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/31177" patch="1">31177</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=438147">https://bugzilla.redhat.com/show_bug.cgi?id=438147</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41501">linux-kernel-ptrace-dos(41501)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9555">oval:org.mitre.oval:def:9555</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.6.2"/>
        <vers num="2.6.9"/>
        <vers num="2.6.10"/>
        <vers num="2.6.11"/>
        <vers num="2.6.11.1"/>
        <vers num="2.6.11.2"/>
        <vers num="2.6.11.3"/>
        <vers num="2.6.11.4"/>
        <vers num="2.6.11.5"/>
        <vers num="2.6.11.6"/>
        <vers num="2.6.11.7"/>
        <vers num="2.6.11.8"/>
        <vers num="2.6.11.9"/>
        <vers num="2.6.11.10"/>
        <vers num="2.6.11.11"/>
        <vers num="2.6.11.12"/>
        <vers num="2.6.12"/>
        <vers num="2.6.12.1"/>
        <vers num="2.6.12.2"/>
        <vers num="2.6.12.3"/>
        <vers num="2.6.12.4"/>
        <vers num="2.6.12.5"/>
        <vers num="2.6.12.6"/>
        <vers num="2.6.13"/>
        <vers num="2.6.13.1"/>
        <vers num="2.6.13.2"/>
        <vers num="2.6.13.3"/>
        <vers num="2.6.13.4"/>
        <vers num="2.6.13.5"/>
        <vers num="2.6.14"/>
        <vers num="2.6.14.1"/>
        <vers num="2.6.14.2"/>
        <vers num="2.6.14.3"/>
        <vers num="2.6.14.4"/>
        <vers num="2.6.14.5"/>
        <vers num="2.6.14.6"/>
        <vers num="2.6.14.7"/>
        <vers num="2.6.15"/>
        <vers num="2.6.15.1"/>
        <vers num="2.6.15.2"/>
        <vers num="2.6.15.3"/>
        <vers num="2.6.15.4"/>
        <vers num="2.6.15.5"/>
        <vers num="2.6.15.6"/>
        <vers num="2.6.15.7"/>
        <vers num="2.6.16"/>
        <vers num="2.6.16.1"/>
        <vers num="2.6.16.2"/>
        <vers num="2.6.16.3"/>
        <vers num="2.6.16.4"/>
        <vers num="2.6.16.5"/>
        <vers num="2.6.16.6"/>
        <vers num="2.6.16.7"/>
        <vers num="2.6.16.8"/>
        <vers num="2.6.16.9"/>
        <vers num="2.6.16.10"/>
        <vers num="2.6.16.11"/>
        <vers num="2.6.16.12"/>
        <vers num="2.6.16.13"/>
        <vers num="2.6.16.14"/>
        <vers num="2.6.16.15"/>
        <vers num="2.6.16.16"/>
        <vers num="2.6.16.17"/>
        <vers num="2.6.16.18"/>
        <vers num="2.6.16.19"/>
        <vers num="2.6.16.20"/>
        <vers num="2.6.16.21"/>
        <vers num="2.6.16.22"/>
        <vers num="2.6.16.23"/>
        <vers num="2.6.16.24"/>
        <vers num="2.6.16.25"/>
        <vers num="2.6.16.26"/>
        <vers num="2.6.16.27"/>
        <vers num="2.6.16.28"/>
        <vers num="2.6.16.29"/>
        <vers num="2.6.16.30"/>
        <vers num="2.6.16.31"/>
        <vers num="2.6.16.32"/>
        <vers num="2.6.16.33"/>
        <vers num="2.6.16.34"/>
        <vers num="2.6.16.35"/>
        <vers num="2.6.16.36"/>
        <vers num="2.6.16.37"/>
        <vers num="2.6.16.38"/>
        <vers num="2.6.16.39"/>
        <vers num="2.6.16.40"/>
        <vers num="2.6.16.41"/>
        <vers num="2.6.16.42"/>
        <vers num="2.6.16.43"/>
        <vers num="2.6.16.44"/>
        <vers num="2.6.16.45"/>
        <vers num="2.6.16.46"/>
        <vers num="2.6.16.47"/>
        <vers num="2.6.16.48"/>
        <vers num="2.6.16.49"/>
        <vers num="2.6.16.50"/>
        <vers num="2.6.16.51"/>
        <vers num="2.6.16.52"/>
        <vers num="2.6.16.53"/>
        <vers num="2.6.16.54"/>
        <vers num="2.6.16.55"/>
        <vers num="2.6.16.56"/>
        <vers num="2.6.16.57"/>
        <vers num="2.6.16.58"/>
        <vers num="2.6.16.59"/>
        <vers num="2.6.16.60"/>
        <vers num="2.6.16.61"/>
        <vers num="2.6.16.62"/>
        <vers num="2.6.17"/>
        <vers num="2.6.17.1"/>
        <vers num="2.6.17.2"/>
        <vers num="2.6.17.3"/>
        <vers num="2.6.17.4"/>
        <vers num="2.6.17.5"/>
        <vers num="2.6.17.6"/>
        <vers num="2.6.17.7"/>
        <vers num="2.6.17.8"/>
        <vers num="2.6.17.9"/>
        <vers num="2.6.17.10"/>
        <vers num="2.6.17.11"/>
        <vers num="2.6.17.12"/>
        <vers num="2.6.17.13"/>
        <vers num="2.6.17.14"/>
        <vers num="2.6.18" edition="rc1"/>
        <vers num="2.6.18" edition="rc2"/>
        <vers num="2.6.18" edition="rc3"/>
        <vers num="2.6.18" edition="rc4"/>
        <vers num="2.6.18" edition="rc5"/>
        <vers num="2.6.18" edition="rc6"/>
        <vers num="2.6.18" edition="rc7"/>
        <vers num="2.6.18.1"/>
        <vers num="2.6.18.2"/>
        <vers num="2.6.18.3"/>
        <vers num="2.6.18.4"/>
        <vers num="2.6.18.5"/>
        <vers num="2.6.18.6"/>
        <vers num="2.6.18.7"/>
        <vers num="2.6.18.8"/>
        <vers num="2.6.19"/>
        <vers num="2.6.19.1"/>
        <vers num="2.6.19.2"/>
        <vers num="2.6.19.3"/>
        <vers num="2.6.19.4"/>
        <vers num="2.6.19.5"/>
        <vers num="2.6.19.6"/>
        <vers num="2.6.19.7"/>
        <vers num="2.6.20"/>
        <vers num="2.6.20.1"/>
        <vers num="2.6.20.2"/>
        <vers num="2.6.20.3"/>
        <vers num="2.6.20.4"/>
        <vers num="2.6.20.5"/>
        <vers num="2.6.20.6"/>
        <vers num="2.6.20.7"/>
        <vers num="2.6.20.8"/>
        <vers num="2.6.20.9"/>
        <vers num="2.6.20.10"/>
        <vers num="2.6.20.11"/>
        <vers num="2.6.20.12"/>
        <vers num="2.6.20.13"/>
        <vers num="2.6.20.14"/>
        <vers num="2.6.20.15"/>
        <vers num="2.6.20.16"/>
        <vers num="2.6.20.17"/>
        <vers num="2.6.20.18"/>
        <vers num="2.6.20.19"/>
        <vers num="2.6.20.20"/>
        <vers num="2.6.20.21"/>
        <vers num="2.6.21"/>
        <vers num="2.6.21.1"/>
        <vers num="2.6.21.2"/>
        <vers num="2.6.21.3"/>
        <vers num="2.6.21.4"/>
        <vers num="2.6.21.5"/>
        <vers num="2.6.21.6"/>
        <vers num="2.6.21.7"/>
        <vers num="2.6.22"/>
        <vers num="2.6.22.1"/>
        <vers num="2.6.22.2"/>
        <vers num="2.6.22.3"/>
        <vers num="2.6.22.4"/>
        <vers num="2.6.22.5"/>
        <vers num="2.6.22.6"/>
        <vers num="2.6.22.7"/>
        <vers num="2.6.22.8"/>
        <vers num="2.6.22.9"/>
        <vers num="2.6.22.10"/>
        <vers num="2.6.22.11"/>
        <vers num="2.6.22.12"/>
        <vers num="2.6.22.13"/>
        <vers num="2.6.22.14"/>
        <vers num="2.6.22.15"/>
        <vers num="2.6.22.16"/>
        <vers num="2.6.22.17"/>
        <vers num="2.6.22.18"/>
        <vers num="2.6.22.19"/>
        <vers num="2.6.22.20"/>
        <vers num="2.6.22.21"/>
        <vers num="2.6.22.22"/>
        <vers num="2.6.23" edition="rc1"/>
        <vers num="2.6.23" edition="rc2"/>
        <vers num="2.6.23.1"/>
        <vers num="2.6.23.2"/>
        <vers num="2.6.23.3"/>
        <vers num="2.6.23.4"/>
        <vers num="2.6.23.5"/>
        <vers num="2.6.23.6"/>
        <vers num="2.6.23.7"/>
        <vers num="2.6.23.8"/>
        <vers num="2.6.23.9"/>
        <vers num="2.6.23.10"/>
        <vers num="2.6.23.11"/>
        <vers num="2.6.23.12"/>
        <vers num="2.6.23.13"/>
        <vers num="2.6.23.14"/>
        <vers num="2.6.23.15"/>
        <vers num="2.6.23.16"/>
        <vers num="2.6.23.17"/>
        <vers num="2.6.24" edition="rc1"/>
        <vers num="2.6.24" edition="rc2"/>
        <vers num="2.6.24" edition="rc3"/>
        <vers num="2.6.24" edition="rc4"/>
        <vers num="2.6.24" edition="rc5"/>
        <vers num="2.6.24.1"/>
        <vers num="2.6.24.2"/>
        <vers num="2.6.24.3"/>
        <vers num="2.6.24.4"/>
        <vers num="2.6.24.5"/>
        <vers num="2.6.24.6"/>
        <vers num="2.6.24.7"/>
        <vers num="2.6.25"/>
        <vers num="2.6.25.1"/>
        <vers num="2.6.25.2"/>
        <vers num="2.6.25.3"/>
        <vers num="2.6.25.4"/>
        <vers num="2.6.25.5"/>
        <vers num="2.6.25.6"/>
        <vers num="2.6.25.7"/>
        <vers num="2.6.25.8"/>
        <vers num="2.6.25.9"/>
        <vers num="2.6.25.10"/>
        <vers num="2.6.25.11"/>
        <vers num="2.6.25.12"/>
        <vers num="2.6.25.13"/>
        <vers num="2.6.25.14"/>
        <vers num="2.6.25.15"/>
        <vers num="2.6.25.16"/>
        <vers num="2.6.25.17"/>
        <vers num="2.6.25.18"/>
        <vers num="2.6.25.19"/>
        <vers num="2.6.25.20"/>
        <vers num="2.6.26" edition="rc4"/>
        <vers num="2.6.26.1"/>
        <vers num="2.6.26.2"/>
        <vers num="2.6.26.3"/>
        <vers num="2.6.26.4"/>
        <vers num="2.6.26.5"/>
        <vers num="2.6.26.6"/>
        <vers num="2.6.26.7"/>
        <vers num="2.6.26.8"/>
        <vers num="2.6.27" prev="1" edition="rc1"/>
        <vers num="2.6.27" prev="1" edition="rc2"/>
        <vers num="2.6.27" prev="1" edition="rc3"/>
        <vers num="2.6.27" prev="1" edition="rc4"/>
        <vers num="2.6.27" prev="1" edition="rc5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1515" seq="2008-1515" published="2008-04-01" modified="2018-10-31" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">The SOAP interface in OTRS 2.1.x before 2.1.8 and 2.2.x before 2.2.6 allows remote attackers to "read and modify objects" via SOAP requests, related to "Missing security checks."</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00005.html" adv="1">SUSE-SR:2008:008</ref>
      <ref source="CONFIRM" url="http://otrs.org/advisory/OSA-2008-01-en/" adv="1">http://otrs.org/advisory/OSA-2008-01-en/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28647" adv="1">28647</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41577" adv="1">otrs-soapinterface-weak-security(41577)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00284.html" adv="1">FEDORA-2008-3100</ref>
    </refs>
    <vuln_soft>
      <prod name="otrs" vendor="otrs">
        <vers num="2.1.0" edition="beta1"/>
        <vers num="2.1.0" edition="beta2"/>
        <vers num="2.1.1"/>
        <vers num="2.1.2"/>
        <vers num="2.1.3"/>
        <vers num="2.1.4"/>
        <vers num="2.1.5"/>
        <vers num="2.1.6"/>
        <vers num="2.1.7"/>
        <vers num="2.2.0" edition="beta1"/>
        <vers num="2.2.0" edition="beta2"/>
        <vers num="2.2.0" edition="beta3"/>
        <vers num="2.2.0" edition="beta4"/>
        <vers num="2.2.0" edition="rc1"/>
        <vers num="2.2.1"/>
        <vers num="2.2.2"/>
        <vers num="2.2.3"/>
        <vers num="2.2.4"/>
        <vers num="2.2.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1517" seq="2008-1517" published="2009-05-13" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Array index error in the xnu (Mach) kernel in Apple Mac OS X 10.5 before 10.5.7 allows local users to gain privileges or cause a denial of service (system shutdown) via unspecified vectors related to workqueues.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=797">20090514 Apple Mac OS X xnu Kernel workqueue_additem/workqueue_removeitem Index Validation Vulnerability</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" adv="1" patch="1">APPLE-SA-2009-05-12</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3549" adv="1" patch="1">http://support.apple.com/kb/HT3549</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1022213">1022213</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA09-133A.html">TA09-133A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/1297">ADV-2009-1297</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/50489">macos-kernel-workqueue-code-execution(50489)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.5"/>
        <vers num="10.5.0"/>
        <vers num="10.5.1"/>
        <vers num="10.5.2"/>
        <vers num="10.5.3"/>
        <vers num="10.5.4"/>
        <vers num="10.5.5"/>
        <vers num="10.5.6"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.5"/>
        <vers num="10.5.0"/>
        <vers num="10.5.1"/>
        <vers num="10.5.2"/>
        <vers num="10.5.3"/>
        <vers num="10.5.4"/>
        <vers num="10.5.5"/>
        <vers num="10.5.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1518" seq="2008-1518" published="2008-06-05" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in kl1.sys in Kaspersky Anti-Virus 6.0 and 7.0 and Internet Security 6.0 and 7.0 allows local users to gain privileges via an IOCTL 0x800520e8 call.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=704">20080604 Kaspersky Internet Security IOCTL Stack Based Buffer Overflow Vulnerability</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020195">1020195</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020196">1020196</ref>
      <ref source="CONFIRM" url="http://www.kaspersky.com/technews?id=203038727">http://www.kaspersky.com/technews?id=203038727</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1739">ADV-2008-1739</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42849">kaspersky-internetsecurity-kl1-bo(42849)</ref>
    </refs>
    <vuln_soft>
      <prod name="kaspersky_anti-virus" vendor="kaspersky_lab">
        <vers num="6.0"/>
        <vers num="7.0"/>
      </prod>
      <prod name="kaspersky_internet_security" vendor="kaspersky_lab">
        <vers num="6.0"/>
        <vers num="7.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1521" seq="2008-1521" published="2008-03-26" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">ZyXEL Prestige routers, including P-660 and P-661 models with firmware 3.40(AGD.2) through 3.40(AHQ.3), allow remote authenticated users to gain privileges by accessing administrative URIs, as demonstrated by rpSysAdmin.html.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.gnucitizen.org/projects/router-hacking-challenge/">http://www.gnucitizen.org/projects/router-hacking-challenge/</ref>
      <ref source="MISC" url="http://www.procheckup.com/Hacking_ZyXEL_Gateways.pdf">http://www.procheckup.com/Hacking_ZyXEL_Gateways.pdf</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489009/100/0/threaded">20080301 The Router Hacking Challenge is Over!</ref>
    </refs>
    <vuln_soft>
      <prod name="prestige_660" vendor="zyxel">
        <vers num="h-d1"/>
        <vers num="h-d3"/>
      </prod>
      <prod name="prestige_661" vendor="zyxel">
        <vers num="hw-d1"/>
      </prod>
      <prod name="zynos" vendor="zyxel">
        <vers num="3.40" edition="agd.2"/>
        <vers num="3.40" edition="agl.3"/>
        <vers num="3.40" edition="ahq.0"/>
        <vers num="3.40" edition="ahq.3"/>
        <vers num="3.40" edition="ahz.0"/>
        <vers num="3.40" edition="atm.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1522" seq="2008-1522" published="2008-03-26" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">ZyXEL Prestige routers, including P-660 and P-661 models with firmware 3.40(AGD.2) through 3.40(AHQ.3), have (1) "user" as their default password for the "user" account and (2) "1234" as their default password for the "admin" account, which makes it easier for remote attackers to obtain access.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.gnucitizen.org/projects/router-hacking-challenge/">http://www.gnucitizen.org/projects/router-hacking-challenge/</ref>
      <ref source="MISC" url="http://www.procheckup.com/Hacking_ZyXEL_Gateways.pdf">http://www.procheckup.com/Hacking_ZyXEL_Gateways.pdf</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489009/100/0/threaded">20080301 The Router Hacking Challenge is Over!</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41508">zyxelprestige-default-password(41508)</ref>
    </refs>
    <vuln_soft>
      <prod name="prestige_660" vendor="zyxel">
        <vers num="h-d1"/>
        <vers num="h-d3"/>
      </prod>
      <prod name="prestige_661" vendor="zyxel">
        <vers num="hw-d1"/>
      </prod>
      <prod name="zynos" vendor="zyxel">
        <vers num="3.40" edition="agd.2"/>
        <vers num="3.40" edition="agl.3"/>
        <vers num="3.40" edition="ahq.0"/>
        <vers num="3.40" edition="ahq.3"/>
        <vers num="3.40" edition="ahz.0"/>
        <vers num="3.40" edition="atm.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1523" seq="2008-1523" published="2008-03-26" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">ZyXEL Prestige routers, including P-660, P-661, and P-662 models with firmware 3.40(AGD.2) through 3.40(AHQ.3), allow remote authenticated users to obtain ISP and Dynamic DNS credentials by sending a direct request for (1) WAN.html, (2) wzPPPOE.html, and (3) rpDyDNS.html, and then reading the HTML source.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.gnucitizen.org/projects/router-hacking-challenge/">http://www.gnucitizen.org/projects/router-hacking-challenge/</ref>
      <ref source="MISC" url="http://www.procheckup.com/Hacking_ZyXEL_Gateways.pdf">http://www.procheckup.com/Hacking_ZyXEL_Gateways.pdf</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489009/100/0/threaded">20080301 The Router Hacking Challenge is Over!</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41509">zyxelprestige-multiple-info-disclosure(41509)</ref>
    </refs>
    <vuln_soft>
      <prod name="prestige_660" vendor="zyxel">
        <vers num="h-d1"/>
        <vers num="h-d3"/>
      </prod>
      <prod name="prestige_661" vendor="zyxel">
        <vers num="hw-d1"/>
      </prod>
      <prod name="zynos" vendor="zyxel">
        <vers num="3.40" edition="agd.2"/>
        <vers num="3.40" edition="agl.3"/>
        <vers num="3.40" edition="ahq.0"/>
        <vers num="3.40" edition="ahq.3"/>
        <vers num="3.40" edition="ahz.0"/>
        <vers num="3.40" edition="atm.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1524" seq="2008-1524" published="2008-03-26" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The SNMP service on ZyXEL Prestige routers, including P-660 and P-661 models with firmware 3.40(AGD.2) through 3.40(AHQ.3), has "public" as its default community for both (1) read and (2) write operations, which allows remote attackers to perform administrative actions via SNMP, as demonstrated by reading the Dynamic DNS service password or inserting an XSS sequence into the system.sysName.0 variable, which is displayed on the System Status page.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.gnucitizen.org/projects/router-hacking-challenge/">http://www.gnucitizen.org/projects/router-hacking-challenge/</ref>
      <ref source="MISC" url="http://www.procheckup.com/Hacking_ZyXEL_Gateways.pdf">http://www.procheckup.com/Hacking_ZyXEL_Gateways.pdf</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489009/100/0/threaded">20080301 The Router Hacking Challenge is Over!</ref>
    </refs>
    <vuln_soft>
      <prod name="prestige_660" vendor="zyxel">
        <vers num="h-d1"/>
        <vers num="h-d3"/>
      </prod>
      <prod name="prestige_661" vendor="zyxel">
        <vers num="hw-d1"/>
      </prod>
      <prod name="zynos" vendor="zyxel">
        <vers num="3.40" edition="agd.2"/>
        <vers num="3.40" edition="agl.3"/>
        <vers num="3.40" edition="ahq.0"/>
        <vers num="3.40" edition="ahq.3"/>
        <vers num="3.40" edition="ahz.0"/>
        <vers num="3.40" edition="atm.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1525" seq="2008-1525" published="2008-03-26" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The default SNMP configuration on ZyXEL Prestige routers, including P-660 and P-661 models with firmware 3.40(AGD.2) through 3.40(AHQ.3), has a Trusted Host value of 0.0.0.0, which allows remote attackers to send SNMP requests from any source IP address.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.gnucitizen.org/projects/router-hacking-challenge/">http://www.gnucitizen.org/projects/router-hacking-challenge/</ref>
      <ref source="MISC" url="http://www.procheckup.com/Hacking_ZyXEL_Gateways.pdf">http://www.procheckup.com/Hacking_ZyXEL_Gateways.pdf</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489009/100/0/threaded">20080301 The Router Hacking Challenge is Over!</ref>
    </refs>
    <vuln_soft>
      <prod name="prestige_660" vendor="zyxel">
        <vers num="h-d1"/>
        <vers num="h-d3"/>
      </prod>
      <prod name="prestige_661" vendor="zyxel">
        <vers num="hw-d1"/>
      </prod>
      <prod name="zynos" vendor="zyxel">
        <vers num="3.40" edition="agd.2"/>
        <vers num="3.40" edition="agl.3"/>
        <vers num="3.40" edition="ahq.0"/>
        <vers num="3.40" edition="ahq.3"/>
        <vers num="3.40" edition="ahz.0"/>
        <vers num="3.40" edition="atm.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1526" seq="2008-1526" published="2008-03-26" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">ZyXEL Prestige routers, including P-660, P-661, and P-662 models with firmware 3.40(PE9) and 3.40(AGD.2) through 3.40(AHQ.3), do not use a salt when calculating an MD5 password hash, which makes it easier for attackers to crack passwords.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.gnucitizen.org/projects/router-hacking-challenge/">http://www.gnucitizen.org/projects/router-hacking-challenge/</ref>
      <ref source="MISC" url="http://www.procheckup.com/Hacking_ZyXEL_Gateways.pdf">http://www.procheckup.com/Hacking_ZyXEL_Gateways.pdf</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489009/100/0/threaded">20080301 The Router Hacking Challenge is Over!</ref>
    </refs>
    <vuln_soft>
      <prod name="prestige_660" vendor="zyxel">
        <vers num="h-d1"/>
        <vers num="h-d3"/>
      </prod>
      <prod name="prestige_661" vendor="zyxel">
        <vers num="hw-d1"/>
      </prod>
      <prod name="zynos" vendor="zyxel">
        <vers num="3.40" edition="agd.2"/>
        <vers num="3.40" edition="agl.3"/>
        <vers num="3.40" edition="ahq.0"/>
        <vers num="3.40" edition="ahq.3"/>
        <vers num="3.40" edition="ahz.0"/>
        <vers num="3.40" edition="atm.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1527" seq="2008-1527" published="2008-03-26" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">ZyXEL Prestige routers, including P-660, P-661, and P-662 models with firmware 3.40(PE9) and 3.40(AGD.2) through 3.40(AHQ.3), support authentication over HTTP via a hash string in the hiddenPassword field, which allows remote attackers to obtain access via a replay attack.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.gnucitizen.org/projects/router-hacking-challenge/">http://www.gnucitizen.org/projects/router-hacking-challenge/</ref>
      <ref source="MISC" url="http://www.procheckup.com/Hacking_ZyXEL_Gateways.pdf">http://www.procheckup.com/Hacking_ZyXEL_Gateways.pdf</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489009/100/0/threaded">20080301 The Router Hacking Challenge is Over!</ref>
    </refs>
    <vuln_soft>
      <prod name="prestige_660" vendor="zyxel">
        <vers num="h-d1"/>
        <vers num="h-d3"/>
      </prod>
      <prod name="prestige_661" vendor="zyxel">
        <vers num="hw-d1"/>
      </prod>
      <prod name="zynos" vendor="zyxel">
        <vers num="3.40" edition="agd.2"/>
        <vers num="3.40" edition="agl.3"/>
        <vers num="3.40" edition="ahq.0"/>
        <vers num="3.40" edition="ahq.3"/>
        <vers num="3.40" edition="ahz.0"/>
        <vers num="3.40" edition="atm.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1528" seq="2008-1528" published="2008-03-26" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.0" CVSS_base_score="4.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">ZyXEL Prestige routers, including P-660, P-661, and P-662 models with firmware 3.40(AGD.2) through 3.40(AHQ.3), allow remote authenticated users to obtain authentication data by making direct HTTP requests and then reading the HTML source, as demonstrated by a request for (1) RemMagSNMP.html, which discloses SNMP communities; or (2) WLAN.html, which discloses WEP keys.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.gnucitizen.org/projects/router-hacking-challenge/">http://www.gnucitizen.org/projects/router-hacking-challenge/</ref>
      <ref source="MISC" url="http://www.procheckup.com/Hacking_ZyXEL_Gateways.pdf">http://www.procheckup.com/Hacking_ZyXEL_Gateways.pdf</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489009/100/0/threaded">20080301 The Router Hacking Challenge is Over!</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41511">zyxelprestige-snmp-wep-info-disclosure(41511)</ref>
    </refs>
    <vuln_soft>
      <prod name="prestige_660" vendor="zyxel">
        <vers num="h-d1"/>
        <vers num="h-d3"/>
      </prod>
      <prod name="prestige_661" vendor="zyxel">
        <vers num="hw-d1"/>
      </prod>
      <prod name="zynos" vendor="zyxel">
        <vers num="3.40" edition="agd.2"/>
        <vers num="3.40" edition="agl.3"/>
        <vers num="3.40" edition="ahq.0"/>
        <vers num="3.40" edition="ahq.3"/>
        <vers num="3.40" edition="ahz.0"/>
        <vers num="3.40" edition="atm.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1529" seq="2008-1529" published="2008-03-26" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">ZyXEL Prestige routers have a minimum password length for the admin account that is too small, which makes it easier for remote attackers to guess passwords via brute force methods.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.gnucitizen.org/projects/router-hacking-challenge/">http://www.gnucitizen.org/projects/router-hacking-challenge/</ref>
      <ref source="MISC" url="http://www.procheckup.com/Hacking_ZyXEL_Gateways.pdf">http://www.procheckup.com/Hacking_ZyXEL_Gateways.pdf</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489009/100/0/threaded">20080301 The Router Hacking Challenge is Over!</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41513">zyxelprestige-password-weak-security(41513)</ref>
    </refs>
    <vuln_soft>
      <prod name="prestige_660" vendor="zyxel">
        <vers num="h-d1"/>
        <vers num="h-d3"/>
      </prod>
      <prod name="prestige_661" vendor="zyxel">
        <vers num="hw-d1"/>
      </prod>
      <prod name="zynos" vendor="zyxel">
        <vers num="3.40" edition="agd.2"/>
        <vers num="3.40" edition="agl.3"/>
        <vers num="3.40" edition="ahq.0"/>
        <vers num="3.40" edition="ahq.3"/>
        <vers num="3.40" edition="ahz.0"/>
        <vers num="3.40" edition="atm.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1530" seq="2008-1530" published="2008-03-27" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">GnuPG (gpg) 1.4.8 and 2.0.8 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted duplicate keys that are imported from key servers, which triggers "memory corruption around deduplication of user IDs."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MLIST" url="http://lists.gnupg.org/pipermail/gnupg-announce/2008q1/000272.html">[Announce] 20080326 GnuPG 1.4.9 released</ref>
      <ref source="MISC" url="http://www.ocert.org/advisories/ocert-2008-1.html">http://www.ocert.org/advisories/ocert-2008-1.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28487">28487</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1056/references">ADV-2008-1056</ref>
      <ref source="CONFIRM" url="https://bugs.g10code.com/gnupg/issue894">https://bugs.g10code.com/gnupg/issue894</ref>
      <ref source="CONFIRM" url="https://bugs.gentoo.org/show_bug.cgi?id=214990">https://bugs.gentoo.org/show_bug.cgi?id=214990</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41547">gnupg-keys-code-execution(41547)</ref>
    </refs>
    <vuln_soft>
      <prod name="gnupg" vendor="gnupg">
        <vers num="1.4.8"/>
        <vers num="2.0.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1531" seq="2008-1531" published="2008-03-27" modified="2018-10-31" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The connection_state_machine function (connections.c) in lighttpd 1.4.19 and earlier, and 1.5.x before 1.5.0, allows remote attackers to cause a denial of service (active SSL connection loss) by triggering an SSL error, such as disconnecting before a download has finished, which causes all active SSL connections to be lost.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html" adv="1">SUSE-SR:2008:011</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200804-08.xml" adv="1">GLSA-200804-08</ref>
      <ref source="CONFIRM" url="http://trac.lighttpd.net/trac/changeset/2136" adv="1">http://trac.lighttpd.net/trac/changeset/2136</ref>
      <ref source="CONFIRM" url="http://trac.lighttpd.net/trac/changeset/2139" adv="1">http://trac.lighttpd.net/trac/changeset/2139</ref>
      <ref source="CONFIRM" url="http://trac.lighttpd.net/trac/changeset/2140" adv="1">http://trac.lighttpd.net/trac/changeset/2140</ref>
      <ref source="MISC" url="http://trac.lighttpd.net/trac/ticket/285#comment:18" adv="1">http://trac.lighttpd.net/trac/ticket/285#comment:18</ref>
      <ref source="MISC" url="http://trac.lighttpd.net/trac/ticket/285#comment:21" adv="1">http://trac.lighttpd.net/trac/ticket/285#comment:21</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0132" adv="1">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0132</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1540" adv="1">DSA-1540</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490323/100/0/threaded" adv="1">20080331 rPSA-2008-0132-1 lighttpd</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28489" adv="1">28489</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1063/references" adv="1">ADV-2008-1063</ref>
      <ref source="CONFIRM" url="https://bugs.gentoo.org/show_bug.cgi?id=214892" adv="1">https://bugs.gentoo.org/show_bug.cgi?id=214892</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41545" adv="1">lighttpd-sslerror-dos(41545)</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2407">https://issues.rpath.com/browse/RPL-2407</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00562.html" adv="1">FEDORA-2008-3343</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00587.html" adv="1">FEDORA-2008-3376</ref>
    </refs>
    <vuln_soft>
      <prod name="lighttpd" vendor="lighttpd">
        <vers num="1.4.19" prev="1"/>
      </prod>
      <prod name="debian_linux" vendor="debian">
        <vers num="4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1532" seq="2008-1532" published="2008-03-27" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Perlbal before 1.70, when buffered upload is enabled, allows remote attackers to cause a denial of service (crash) via a zero-byte chunked upload.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.gentoo.org/show_bug.cgi?id=214784">http://bugs.gentoo.org/show_bug.cgi?id=214784</ref>
      <ref source="CONFIRM" url="http://search.cpan.org/src/BRADFITZ/Perlbal-1.70/CHANGES">http://search.cpan.org/src/BRADFITZ/Perlbal-1.70/CHANGES</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28491">28491</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1045/references">ADV-2008-1045</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=439054">https://bugzilla.redhat.com/show_bug.cgi?id=439054</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41538">perlbal-clientproxy-dos(41538)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00665.html">FEDORA-2008-2778</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00672.html">FEDORA-2008-2788</ref>
    </refs>
    <vuln_soft>
      <prod name="perlbal" vendor="perlbal">
        <vers num="1.60" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1533" seq="2008-1533" published="2008-03-27" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the XML-RPC Blogger API plugin in Joomla! 1.5 allows remote attackers to perform unauthorized article operations on articles via unknown vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.joomla.org/content/view/4560/1/" patch="1">http://www.joomla.org/content/view/4560/1/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27719" patch="1">27719</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41563">joomla-xmlrpc-data-manipulation(41563)</ref>
    </refs>
    <vuln_soft>
      <prod name="joomla" vendor="joomla">
        <vers num="1.5" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1534" seq="2008-1534" published="2008-03-28" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple directory traversal vulnerabilities in PowerPHPBoard 1.00b allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the (1) settings[footer] parameter to footer.inc.php and the (2) settings[header] parameter to header.inc.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3782">3782</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490011/100/0/threaded">20080324 [DSECRG-08-021] Multiple LFI in PowerPHPBoard 1.00b</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28421">28421</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0992/references">ADV-2008-0992</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41403">powerphpboard-footerheader-file-include(41403)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5303">5303</ref>
    </refs>
    <vuln_soft>
      <prod name="powerphpboard" vendor="powerscripts">
        <vers num="1.00b"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1535" seq="2008-1535" published="2008-03-28" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the Matti Kiviharju rekry (aka com_rekry or rekry!Joom) 1.0.0 component for Joomla! allows remote attackers to execute arbitrary SQL commands via the op_id parameter in a view action to index.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28422">28422</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41385">rekry!joom-index-sql-injection(41385)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5297">5297</ref>
    </refs>
    <vuln_soft>
      <prod name="rekry_component" vendor="matti_kiviharju">
        <vers num="1.0.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1536" seq="2008-1536" published="2008-03-28" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php in Pictures Pro (aka Tim Grissett) Photo Cart 4.1 allows remote attackers to inject arbitrary web script or HTML via the amessage parameter.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.picturespro.com/community/forums/photo_cart/index.php?see=viewTopic&amp;topic=296795080324075103" patch="1">http://www.picturespro.com/community/forums/photo_cart/index.php?see=viewTopic&amp;topic=296795080324075103</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28430" patch="1">28430</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41409">photocart-index-xss(41409)</ref>
    </refs>
    <vuln_soft>
      <prod name="picturespro_photo_cart" vendor="picturespro">
        <vers num="4.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1537" seq="2008-1537" published="2008-03-28" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in pb_inc/admincenter/index.php in PowerScripts PowerBook 1.21 allows remote attackers to include and execute arbitrary local files via a ..  (dot dot) in the page parameter.  NOTE: in some environments, this can be leveraged for remote file inclusion by using a UNC share pathname or an ftp, ftps, or ssh2.sftp URL.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3783">3783</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490008/100/0/threaded">20080324 [DSECRG-08-019] LFI in PowerBook 1.21</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28418">28418</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41393">powerbook-index-file-include(41393)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5302">5302</ref>
    </refs>
    <vuln_soft>
      <prod name="powerbook" vendor="powerscripts">
        <vers num="1.21"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1538" seq="2008-1538" published="2008-03-28" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in searchAction.do in ManageEngine EventLog Analyzer 5 allows remote attackers to inject arbitrary web script or HTML via the searchText parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41408">eventloganalyzer-searchaction-xss(41408)</ref>
    </refs>
    <vuln_soft>
      <prod name="eventlog_analyzer" vendor="manageengine">
        <vers num="5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1539" seq="2008-1539" published="2008-03-28" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in includes/dynamic_titles.php in PHP-Nuke Platinum 7.6.b.5 allows remote attackers to execute arbitrary SQL commands via the p parameter to modules.php for the Forums module.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28410">28410</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41387">platinum-modules-sql-injection(41387)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5295">5295</ref>
    </refs>
    <vuln_soft>
      <prod name="php_nuke_platinum" vendor="futurenuke">
        <vers num="7.6.b.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1540" seq="2008-1540" published="2008-03-28" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the Datsogallery (com_datsogallery) 1.3.1 module for Joomla! and Mambo allows remote attackers to execute arbitrary SQL commands via the id parameter in a detail action to index.php.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28361">28361</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41348">datsogallery-index-sql-injection(41348)</ref>
    </refs>
    <vuln_soft>
      <prod name="datsogallery" vendor="joomla">
        <vers num="1.3.1"/>
      </prod>
      <prod name="datsogallery" vendor="mambo">
        <vers num="1.3.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1541" seq="2008-1541" published="2008-03-28" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in cgi-bin/his-webshop.pl in HIS Webshop 2.50 allows remote attackers to read arbitrary files via a .. (dot dot) in the t parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3784">3784</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490016/100/0/threaded">20080324 HIS-webshop is vulnerable against Directory-Traversal (www.shoppark.de)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28425">28425</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0991/references">ADV-2008-0991</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41407">hiswebshop-hiswebshop-directory-traversal(41407)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5304">5304</ref>
    </refs>
    <vuln_soft>
      <prod name="webshop" vendor="his">
        <vers num="2.50"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1542" seq="2008-1542" published="2008-03-28" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Airspan Base Station Distribution Unit (BSDU) has "topsecret" as its password for the root account, which allows remote attackers to obtain administrative access via a telnet login, a different vulnerability than CVE-2008-1262.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://airspan4wimax.googlepages.com/">http://airspan4wimax.googlepages.com/</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/446403">VU#446403</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41437">micromax-default-password(41437)</ref>
    </refs>
    <vuln_soft>
      <prod name="base_station_distribution_unit" vendor="airspan">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1543" seq="2008-1543" published="2008-03-28" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The Advanced User Interface Pages in the ProST Web Management component on the Airspan WiMAX ProST have a certain default User ID and password, which makes it easier for remote attackers to obtain partial administrative access, a different vulnerability than CVE-2008-1262.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.sharemethods.net/nepal/servlet/open?keeppath=false&amp;aid=29820">http://www.sharemethods.net/nepal/servlet/open?keeppath=false&amp;aid=29820</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41567">wimaxprost-interface-default-password(41567)</ref>
    </refs>
    <vuln_soft>
      <prod name="prost_web_management" vendor="airspan">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1544" seq="2008-1544" published="2008-03-28" modified="2019-02-26" severity="High" CVSS_version="2.0" CVSS_score="7.1" CVSS_base_score="7.1" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:N/A:N)">
    <desc>
      <descript source="cve">The setRequestHeader method of the XMLHttpRequest object in Microsoft Internet Explorer 5.01, 6, and 7 does not block dangerous HTTP request headers when certain 8-bit character sequences are appended to a header name, which allows remote attackers to (1) conduct HTTP request splitting and HTTP request smuggling attacks via an incorrect Content-Length header, (2) access arbitrary virtual hosts via a modified Host header, (3) bypass referrer restrictions via an incorrect Referer header, and (4) bypass the same-origin policy and obtain sensitive information via a crafted request header.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=121380194923597&amp;w=2">HPSBST02344</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3785">3785</ref>
      <ref source="MISC" url="http://www.mindedsecurity.com/MSA02240108.html">http://www.mindedsecurity.com/MSA02240108.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489954/100/0/threaded">20080321 [MSA02240108] IE7 allows overwriting of several headers leading to Http request Splitting and smuggling.</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28379" patch="1">28379</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020226">1020226</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-162B.html">TA08-162B</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0980" adv="1">ADV-2008-0980</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1778" adv="1">ADV-2008-1778</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-031">MS08-031</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5291">oval:org.mitre.oval:def:5291</ref>
    </refs>
    <vuln_soft>
      <prod name="internet_explorer" vendor="microsoft">
        <vers num="5.01" edition="sp4"/>
        <vers num="6" edition="sp1"/>
        <vers num="7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1545" seq="2008-1545" published="2008-03-28" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The setRequestHeader method of the XMLHttpRequest object in Microsoft Internet Explorer 7 does not restrict the dangerous Transfer-Encoding HTTP request header, which allows remote attackers to conduct HTTP request splitting and HTTP request smuggling attacks via a POST containing a "Transfer-Encoding: chunked" header and a request body with an incorrect chunk size.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3786">3786</ref>
      <ref source="MISC" url="http://www.mindedsecurity.com/MSA01240108.html">http://www.mindedsecurity.com/MSA01240108.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489960/100/0/threaded">20080321 [MSA01240108] IE7 Transfer-Encoding: chunked allows Request Splitting/Smuggling.</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0980">ADV-2008-0980</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42804">ie-setrequestheader-chunk-security-bypass(42804)</ref>
    </refs>
    <vuln_soft>
      <prod name="ie" vendor="microsoft">
        <vers num="7.0"/>
        <vers num="7.0.5730.11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1546" seq="2008-1546" published="2008-03-28" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">servlet/MIMEReceiveServlet in the web controller for Mitsubishi Electric GB-50 and GB-50A air-conditioning control systems allows remote attackers to cause a denial of service (air-conditioning outage) via an XML document containing a setRequest command.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3794">3794</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/483862/2008-03-21/threaded">20071117 security contact for mitsubishi electric?</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489970/100/0/threaded">20080322 hacking the mitsubishi GB-50A</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28406">28406</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41503">mitsubishielectric-gb50a-unath-access(41503)</ref>
    </refs>
    <vuln_soft>
      <prod name="gb" vendor="mitsubishi_electric">
        <vers num="50"/>
        <vers num="50a"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1547" seq="2008-1547" published="2008-10-20" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Open redirect vulnerability in exchweb/bin/redir.asp in Microsoft Outlook Web Access (OWA) for Exchange Server 2003 SP2 (aka build 6.5.7638) allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the URL parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/4441">4441</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/497374/100/0/threaded">20081015 MS OWA 2003 Redirection Vulnerability</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/497390/100/0/threaded">20081015 Re: MS OWA 2003 Redirection Vulnerability</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/497433/100/0/threaded">20081015 Re: Re: MS OWA 2003 Redirection Vulnerability</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/497500/100/0/threaded">20081017 Re: MS OWA 2003 Redirection Vulnerability - [MSRC 7368br]</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/497534/100/0/threaded">20081019 Re: MS OWA 2003 Redirection Vulnerability - [MSRC7368br]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/31765">31765</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/46061">owa-redir-phishing(46061)</ref>
    </refs>
    <vuln_soft>
      <prod name="exchange_server" vendor="microsoft">
        <vers num="2003" edition="sp2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1548" seq="2008-1548" published="2008-03-31" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in Aeries Browser Interface (ABI) 3.8.3.14 in Eagle Software Aries Student Information System allow remote attackers to inject arbitrary web script or HTML via the (1) UserName parameter to loginproc.asp and the (2) usr parameter to Login.asp.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3787">3787</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490033/100/0/threaded">20080325 aeries browser interface(ABI) 3.8.3.14 Remote SQL Injection</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28436">28436</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41430">abi-loginproc-login-xss(41430)</ref>
    </refs>
    <vuln_soft>
      <prod name="aeries_student_information_system" vendor="aeries">
        <vers num="3.8.3.14"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1549" seq="2008-1549" published="2008-03-31" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in Aeries Browser Interface (ABI) 3.8.3.14 in Eagle Software Aries Student Information System allow remote attackers to execute arbitrary SQL commands via the (1) GrdBk parameter to GradebookOptions.asp and the (2) SchlCode variable to loginproc.asp, a different vector than CVE-2008-0942.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3787">3787</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490033/100/0/threaded">20080325 aeries browser interface(ABI) 3.8.3.14 Remote SQL Injection</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28436">28436</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41429">abi-gradebookoptions-loginproc-sql-injection(41429)</ref>
    </refs>
    <vuln_soft>
      <prod name="aeries_student_information_system" vendor="aeries">
        <vers num="3.8.3.14"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1550" seq="2008-1550" published="2008-03-31" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in index.php in CubeCart 4.2.1 allow remote attackers to inject arbitrary web script or HTML via (1) the _a parameter in a searchStr action and the (2) Submit parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://holisticinfosec.org/content/view/51/45/">http://holisticinfosec.org/content/view/51/45/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28452">28452</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41559">cubecart-indexphp-xss(41559)</ref>
    </refs>
    <vuln_soft>
      <prod name="cubecart" vendor="cubecart">
        <vers num="4.2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1551" seq="2008-1551" published="2008-03-31" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in viewcat.php in the Photo 3.02 module for RunCMS allows remote attackers to execute arbitrary SQL commands via the cid parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28395">28395</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41378">photo-viewcat-sql-injection(41378)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5290">5290</ref>
    </refs>
    <vuln_soft>
      <prod name="photo_module" vendor="runcms">
        <vers num="3.02"/>
      </prod>
      <prod name="runcms" vendor="runcms">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1552" seq="2008-1552" published="2008-03-31" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The silc_pkcs1_decode function in the silccrypt library (silcpkcs1.c) in Secure Internet Live Conferencing (SILC) Toolkit before 1.1.7, SILC Client before 1.1.4, and SILC Server before 1.1.2 allows remote attackers to execute arbitrary code via a crafted PKCS#1 message, which triggers an integer underflow, signedness error, and a buffer overflow.  NOTE: the researcher describes this as an integer overflow, but CVE uses the "underflow" term in cases of wraparound from unsigned subtraction.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00005.html">SUSE-SR:2008:008</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200804-27.xml">GLSA-200804-27</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3795">3795</ref>
      <ref source="CONFIRM" url="http://silcnet.org/general/news/?item=client_20080320_1" patch="1">http://silcnet.org/general/news/?item=client_20080320_1</ref>
      <ref source="CONFIRM" url="http://silcnet.org/general/news/?item=server_20080320_1" patch="1">http://silcnet.org/general/news/?item=server_20080320_1</ref>
      <ref source="CONFIRM" url="http://silcnet.org/general/news/?item=toolkit_20080320_1" patch="1">http://silcnet.org/general/news/?item=toolkit_20080320_1</ref>
      <ref source="MISC" url="http://www.coresecurity.com/?action=item&amp;id=2206">http://www.coresecurity.com/?action=item&amp;id=2206</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:158">MDVSA-2008:158</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490069/100/0/threaded">20080325 CORE-2007-1212: SILC pkcs_decode buffer overflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28373" patch="1">28373</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019690">1019690</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0974/references">ADV-2008-0974</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41474">silc-silcpkcs1decode-bo(41474)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00513.html">FEDORA-2008-2616</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00538.html">FEDORA-2008-2641</ref>
    </refs>
    <vuln_soft>
      <prod name="silc" vendor="silc">
        <vers num=""/>
      </prod>
      <prod name="silc_client" vendor="silc">
        <vers num="1.1.3" prev="1"/>
      </prod>
      <prod name="silc_server" vendor="silc">
        <vers num="1.1.2" prev="1"/>
      </prod>
      <prod name="silc_toolkit" vendor="silc">
        <vers num="1.1.6" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1553" seq="2008-1553" published="2008-03-31" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in mod.php in TopperMod 1.0 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the to parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28449">28449</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41442">toppermod-mod-file-include(41442)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5312">5312</ref>
    </refs>
    <vuln_soft>
      <prod name="toppermod" vendor="topper">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1554" seq="2008-1554" published="2008-03-31" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in account/index.php in TopperMod 2.0, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via a non-alphanumeric first character the localita parameter, which bypasses a protection mechanism.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490163/100/0/threaded">20080327 TopperMod 2.0 Remote SQL Injection Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28447">28447</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41441">toppermod-mod-sql-injection(41441)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5311">5311</ref>
    </refs>
    <vuln_soft>
      <prod name="toppermod" vendor="topper">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1555" seq="2008-1555" published="2008-03-31" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in system/_b/contentFiles/gbincluder.php in BolinOS 4.6.1 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the _bFileToInclude parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3788">3788</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490058/100/0/threaded">20080325 [DSECRG-08-022] Multiple Security Vulnerabilities in Bolinos 4.6.1</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28445">28445</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41431">bolinos-gbincluder-file-include(41431)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5309">5309</ref>
    </refs>
    <vuln_soft>
      <prod name="bolinos" vendor="bolinos">
        <vers num="4.6.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1556" seq="2008-1556" published="2008-03-31" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in BolinOS 4.6.1 allow remote attackers to inject arbitrary web script or HTML via the (1) url parameter to (a) system/actionspages/_b/contentFiles/gBImageViewer.php, (2) ForEditor parameter to (b) system/actionspages/_b/contentFiles/gBselectorContents.php, (3) the PATH_INFO to (c) gBLoginPage.php and (d) gBPassword.php in system/actionspages/_b/contentFiles/, (4) formlogin parameter to system/actionspages/_b/contentFiles/gBLoginPage.php, and the (5) bolini_searchengine46Search parameter to (e) help/index.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3788">3788</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490058/100/0/threaded">20080325 [DSECRG-08-022] Multiple Security Vulnerabilities in Bolinos 4.6.1</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28445">28445</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41432">bolinos-multiple-xss(41432)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5309">5309</ref>
    </refs>
    <vuln_soft>
      <prod name="bolinos" vendor="bolinos">
        <vers num="4.6.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1557" seq="2008-1557" published="2008-03-31" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">BolinOS 4.6.1 allows remote attackers to obtain sensitive information via a direct request to system/actionspages/_b/contentFiles/gBphpInfo.php, which calls the phpinfo function.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3788">3788</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490058/100/0/threaded">20080325 [DSECRG-08-022] Multiple Security Vulnerabilities in Bolinos 4.6.1</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41434">bolinos-gbphpinfo-information-disclosure(41434)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5309">5309</ref>
    </refs>
    <vuln_soft>
      <prod name="bolinos" vendor="bolinos">
        <vers num="4.6.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1558" seq="2008-1558" published="2008-03-31" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Uncontrolled array index in the sdpplin_parse function in stream/realrtsp/sdpplin.c in MPlayer 1.0 rc2 allows remote attackers to overwrite memory and execute arbitrary code via a large streamid SDP parameter.  NOTE: this issue has been referred to as an integer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200805-22.xml">GLSA-200805-22</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1552">DSA-1552</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:196">MDVSA-2008:196</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28851">28851</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0997/references">ADV-2008-0997</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41490">mplayer-sdpplin-overflow(41490)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5307">5307</ref>
    </refs>
    <vuln_soft>
      <prod name="mplayer" vendor="mplayer">
        <vers num="1.0_rc2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1559" seq="2008-1559" published="2008-03-31" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the Bernard Gilly AlphaContent (com_alphacontent) 2.5.8 component for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a view action to index.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28443">28443</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41428">alphacontent-index-sql-injection(41428)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5310">5310</ref>
    </refs>
    <vuln_soft>
      <prod name="com_alphacontent" vendor="bernard_gilly">
        <vers num="2.5.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1560" seq="2008-1560" published="2008-03-31" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in Digiappz DigiDomain 2.2 allow remote attackers to inject arbitrary web script or HTML via the (1) domain parameter to lookup_result.asp, and the (2) word1 and (3) word2 parameters to suggest_result.asp.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3789">3789</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490157/100/0/threaded">20080327 Multiple XSS in DigiDomain</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28475">28475</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41500">digidomain-multiple-xss(41500)</ref>
    </refs>
    <vuln_soft>
      <prod name="digidomain" vendor="digiappz">
        <vers num="2.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1561" seq="2008-1561" published="2008-03-31" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Multiple unspecified vulnerabilities in Wireshark (formerly Ethereal) 0.99.5 through 0.99.8 allow remote attackers to cause a denial of service (application crash) via a malformed packet to the (1) X.509sat or (2) Roofnet dissectors.  NOTE: Vector 2 might also lead to a hang.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00005.html">SUSE-SR:2008:008</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2008-392.htm">http://support.avaya.com/elmodocs2/security/ASA-2008-392.htm</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0138">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0138</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200805-05.xml">GLSA-200805-05</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:091">MDVSA-2008:091</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0890.html">RHSA-2008:0890</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490487/100/0/threaded">20080404 rPSA-2008-0138-1 tshark wireshark</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28485">28485</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019728">1019728</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1007/references">ADV-2008-1007</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2773">ADV-2008-2773</ref>
      <ref source="CONFIRM" url="http://www.wireshark.org/security/wnpa-sec-2008-02.html">http://www.wireshark.org/security/wnpa-sec-2008-02.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41514">wireshark-x509sat-dissector-dos(41514)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41515">wireshark-roofnet-dissector-dos(41515)</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2418">https://issues.rpath.com/browse/RPL-2418</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15089">oval:org.mitre.oval:def:15089</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9315">oval:org.mitre.oval:def:9315</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00140.html">FEDORA-2008-2941</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00228.html">FEDORA-2008-3040</ref>
    </refs>
    <vuln_soft>
      <prod name="wireshark" vendor="wireshark">
        <vers num="0.99.2"/>
        <vers num="0.99.3"/>
        <vers num="0.99.4"/>
        <vers num="0.99.5"/>
        <vers num="0.99.6"/>
        <vers num="0.99.7"/>
        <vers num="0.99.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1562" seq="2008-1562" published="2008-03-31" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The LDAP dissector in Wireshark (formerly Ethereal) 0.99.2 through 0.99.8 allows remote attackers to cause a denial of service (application crash) via a malformed packet, a different vulnerability than CVE-2006-5740.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00005.html">SUSE-SR:2008:008</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2008-392.htm">http://support.avaya.com/elmodocs2/security/ASA-2008-392.htm</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0138">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0138</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200805-05.xml">GLSA-200805-05</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:091">MDVSA-2008:091</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0890.html">RHSA-2008:0890</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490487/100/0/threaded">20080404 rPSA-2008-0138-1 tshark wireshark</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28485">28485</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019728">1019728</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1007/references">ADV-2008-1007</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2773">ADV-2008-2773</ref>
      <ref source="CONFIRM" url="http://www.wireshark.org/security/wnpa-sec-2008-02.html">http://www.wireshark.org/security/wnpa-sec-2008-02.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41516">wireshark-ldap-dissector-dos(41516)</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2418">https://issues.rpath.com/browse/RPL-2418</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14549">oval:org.mitre.oval:def:14549</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9318">oval:org.mitre.oval:def:9318</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00140.html">FEDORA-2008-2941</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00228.html">FEDORA-2008-3040</ref>
    </refs>
    <vuln_soft>
      <prod name="wireshark" vendor="wireshark">
        <vers num="0.99.2"/>
        <vers num="0.99.3"/>
        <vers num="0.99.4"/>
        <vers num="0.99.5"/>
        <vers num="0.99.6"/>
        <vers num="0.99.7"/>
        <vers num="0.99.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1563" seq="2008-1563" published="2008-03-31" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The "decode as" feature in packet-bssap.c in the SCCP dissector in Wireshark (formerly Ethereal) 0.99.6 through 0.99.8 allows remote attackers to cause a denial of service (application crash) via a malformed packet.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00005.html">SUSE-SR:2008:008</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2008-392.htm">http://support.avaya.com/elmodocs2/security/ASA-2008-392.htm</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0138">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0138</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200805-05.xml">GLSA-200805-05</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:091">MDVSA-2008:091</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0890.html">RHSA-2008:0890</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490487/100/0/threaded">20080404 rPSA-2008-0138-1 tshark wireshark</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28485">28485</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019728">1019728</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1007/references">ADV-2008-1007</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2773">ADV-2008-2773</ref>
      <ref source="CONFIRM" url="http://www.wireshark.org/security/wnpa-sec-2008-02.html">http://www.wireshark.org/security/wnpa-sec-2008-02.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41517">wireshark-sccp-dissector-dos(41517)</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2418">https://issues.rpath.com/browse/RPL-2418</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10238">oval:org.mitre.oval:def:10238</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15074">oval:org.mitre.oval:def:15074</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00140.html">FEDORA-2008-2941</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00228.html">FEDORA-2008-3040</ref>
    </refs>
    <vuln_soft>
      <prod name="wireshark" vendor="wireshark">
        <vers num="0.99.2"/>
        <vers num="0.99.3"/>
        <vers num="0.99.4"/>
        <vers num="0.99.5"/>
        <vers num="0.99.6"/>
        <vers num="0.99.7"/>
        <vers num="0.99.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1564" seq="2008-1564" published="2008-03-31" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in Dan Costin File Transfer before 1.2f allows remote attackers to read arbitrary files via a "..\" (dot dot backslash) in the filename.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?group_id=178021&amp;release_id=586923">http://sourceforge.net/project/shownotes.php?group_id=178021&amp;release_id=586923</ref>
      <ref source="MISC" url="http://sourceforge.net/tracker/index.php?func=detail&amp;aid=1829601&amp;group_id=178021&amp;atid=883559">http://sourceforge.net/tracker/index.php?func=detail&amp;aid=1829601&amp;group_id=178021&amp;atid=883559</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28453" patch="1">28453</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41489">filetransfer-file-directory-traversal(41489)</ref>
    </refs>
    <vuln_soft>
      <prod name="file_transfer" vendor="file-transfer">
        <vers num="1.2b"/>
        <vers num="1.2c"/>
        <vers num="1.2d"/>
        <vers num="1.2e"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1565" seq="2008-1565" published="2008-03-31" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in forum/irc/irc.php in the PJIRC 0.5 module for phpBB allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the phpEx parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3790">3790</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490070/100/0/threaded">20080325 phpBB PJIRC mod LFI</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28446">28446</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41456">pjirc-irc-file-include(41456)</ref>
    </refs>
    <vuln_soft>
      <prod name="pjirc" vendor="hotscripts">
        <vers num="0.5"/>
      </prod>
      <prod name="pjirc_module" vendor="phpbb">
        <vers num="0.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1566" seq="2008-1566" published="2008-03-31" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Search.do in ManageEngine Applications Manager 8.x allows remote attackers to inject arbitrary web script or HTML via the query parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28488">28488</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41505">applicationsmanager-search-xss(41505)</ref>
    </refs>
    <vuln_soft>
      <prod name="applications_manager" vendor="manageengine">
        <vers num="8.1"/>
        <vers num="8.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1567" seq="2008-1567" published="2008-03-31" modified="2017-08-07" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">phpMyAdmin before 2.11.5.1 stores the MySQL (1) username and (2) password, and the (3) Blowfish secret key, in cleartext in a Session file under /tmp, which allows local users to obtain sensitive information.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html">SUSE-SR:2008:026</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html">SUSE-SR:2009:003</ref>
      <ref source="MISC" url="http://sourceforge.net/tracker/index.php?func=detail&amp;aid=1909711&amp;group_id=23067&amp;atid=377408">http://sourceforge.net/tracker/index.php?func=detail&amp;aid=1909711&amp;group_id=23067&amp;atid=377408</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1557" patch="1">DSA-1557</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:131">MDVSA-2008:131</ref>
      <ref source="CONFIRM" url="http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2008-2" adv="1" patch="1">http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2008-2</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28560" patch="1">28560</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1037/references" adv="1">ADV-2008-1037</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41541">phpmyadmin-sessiondata-info-disclosure(41541)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00031.html">FEDORA-2008-2825</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00080.html">FEDORA-2008-2874</ref>
    </refs>
    <vuln_soft>
      <prod name="phpmyadmin" vendor="phpmyadmin">
        <vers num="2.10.0.0"/>
        <vers num="2.10.0.1"/>
        <vers num="2.10.0.2"/>
        <vers num="2.10.1.0"/>
        <vers num="2.10.2.0"/>
        <vers num="2.10.3.0"/>
        <vers num="2.11.0.0"/>
        <vers num="2.11.1.0"/>
        <vers num="2.11.1.1"/>
        <vers num="2.11.1.2"/>
        <vers num="2.11.2.0"/>
        <vers num="2.11.2.1"/>
        <vers num="2.11.2.2"/>
        <vers num="2.11.3.0"/>
        <vers num="2.11.4.0"/>
        <vers num="2.11.5.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1568" seq="2008-1568" published="2008-03-31" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">comix 3.6.4 allows attackers to execute arbitrary commands via a filename containing shell metacharacters that are not properly sanitized when executing the rar, unrar, or jpegtran programs.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=462840">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=462840</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200804-29.xml">GLSA-200804-29</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28547">28547</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41554">comix-filename-command-execution(41554)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00171.html">FEDORA-2008-2981</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00183.html">FEDORA-2008-2993</ref>
    </refs>
    <vuln_soft>
      <prod name="comix" vendor="comix">
        <vers num="3.6.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1569" seq="2008-1569" published="2008-03-31" modified="2017-08-07" severity="Low" CVSS_version="2.0" CVSS_score="3.3" CVSS_base_score="3.3" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:N/I:P/A:P)">
    <desc>
      <descript source="cve">policyd-weight 0.1.14 beta-16 and earlier allows local users to modify or delete arbitrary files via a symlink attack on temporary files that are used when creating a socket.</descript>
    </desc>
    <loss_types>
      <avail/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200804-11.xml">GLSA-200804-11</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1531">DSA-1531</ref>
      <ref source="CONFIRM" url="http://www.policyd-weight.org/">http://www.policyd-weight.org/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28480" patch="1">28480</ref>
      <ref source="CONFIRM" url="https://bugs.gentoo.org/show_bug.cgi?id=214403">https://bugs.gentoo.org/show_bug.cgi?id=214403</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41565">policydweight-sockets-symlink(41565)</ref>
    </refs>
    <vuln_soft>
      <prod name="policyd-weight" vendor="policyd-weight">
        <vers num="0.1.14" prev="1" edition="beta16"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1570" seq="2008-1570" published="2008-03-31" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.9" CVSS_base_score="6.9" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Race condition in the create_lockpath function in policyd-weight 0.1.14 beta-16 allows local users to modify or delete arbitrary files by creating the LOCKPATH directory, then modifying it after the symbolic link check occurs.  NOTE: this is due to an incomplete fix for CVE-2008-1569.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200804-11.xml">GLSA-200804-11</ref>
      <ref source="CONFIRM" url="https://bugs.gentoo.org/show_bug.cgi?id=214403">https://bugs.gentoo.org/show_bug.cgi?id=214403</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41570">policydweight-createlockpath-race-condition(41570)</ref>
    </refs>
    <vuln_soft>
      <prod name="policyd-weight" vendor="policyd-weight">
        <vers num="0.1.14_beta-14"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1571" seq="2008-1571" published="2008-06-02" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in the embedded web server in Image Capture in Apple Mac OS X before 10.5 allows remote attackers to read arbitrary files via directory traversal sequences in the URI.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//May/msg00001.html">APPLE-SA-2008-05-28</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020141" patch="1">1020141</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29412">29412</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29501">29501</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-150A.html">TA08-150A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1697">ADV-2008-1697</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42718">macosx-imagecapture-directory-traversal(42718)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.4.11"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.4.11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1572" seq="2008-1572" published="2008-06-02" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Image Capture in Apple Mac OS X before 10.5 does not properly use temporary files, which allows local users to overwrite arbitrary files, and display images that are being resized by this application.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//May/msg00001.html">APPLE-SA-2008-05-28</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020141">1020141</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29412">29412</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29521">29521</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-150A.html">TA08-150A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1697" adv="1">ADV-2008-1697</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42719">macosx-imagecapture-symlink(42719)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.4.11"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.4.11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1573" seq="2008-1573" published="2008-06-02" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.1" CVSS_base_score="7.1" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:N/A:N)">
    <desc>
      <descript source="cve">The BMP and GIF image decoding engine in ImageIO in Apple Mac OS X before 10.5.3 allows remote attackers to obtain sensitive information (memory contents) via a crafted (1) BMP or (2) GIF image, which causes an out-of-bounds read.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//Jun/msg00001.html">APPLE-SA-2008-06-19</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//May/msg00001.html">APPLE-SA-2008-05-28</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020144" patch="1">1020144</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29412">29412</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29513">29513</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-150A.html">TA08-150A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1697" adv="1">ADV-2008-1697</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1882/references" adv="1">ADV-2008-1882</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42721">macosx-imageio-information-disclosure(42721)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.4.11"/>
        <vers num="10.5"/>
        <vers num="10.5.1"/>
        <vers num="10.5.2" prev="1"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.4.11"/>
        <vers num="10.5"/>
        <vers num="10.5.1"/>
        <vers num="10.5.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1574" seq="2008-1574" published="2008-06-02" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Integer overflow in ImageIO in Apple Mac OS X before 10.5.3 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted JPEG2000 image that triggers a heap-based buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//May/msg00001.html" patch="1">APPLE-SA-2008-05-28</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020144">1020144</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29412">29412</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29514">29514</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-150A.html" patch="1">TA08-150A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1697" adv="1">ADV-2008-1697</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42722">macosx-imageio-jpeg2000-bo(42722)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.4.11"/>
        <vers num="10.5"/>
        <vers num="10.5.1"/>
        <vers num="10.5.2"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.4.11"/>
        <vers num="10.5"/>
        <vers num="10.5.1"/>
        <vers num="10.5.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1575" seq="2008-1575" published="2008-06-02" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Apple Type Services (ATS) server in Apple Mac OS X 10.5 before 10.5.3 allows user-assisted remote attackers to execute arbitrary code via a crafted embedded font in a PDF document, related to memory corruption that occurs during printing.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//May/msg00001.html" patch="1">APPLE-SA-2008-05-28</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020133">1020133</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29412">29412</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29492">29492</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-150A.html" patch="1">TA08-150A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1697" adv="1">ADV-2008-1697</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42707">macosx-ats-code-execution(42707)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.5"/>
        <vers num="10.5.1"/>
        <vers num="10.5.2"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.5"/>
        <vers num="10.5.1"/>
        <vers num="10.5.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1576" seq="2008-1576" published="2008-06-02" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Mail in Apple Mac OS X before 10.5, when an IPv6 SMTP server is used, does not properly initialize memory, which might allow remote attackers to execute arbitrary code or cause a denial of service (application crash), or obtain sensitive information (memory contents) in opportunistic circumstances, by sending an e-mail message.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//May/msg00001.html">APPLE-SA-2008-05-28</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020140" patch="1">1020140</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29412">29412</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29500">29500</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-150A.html">TA08-150A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1697" adv="1">ADV-2008-1697</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42723">macosx-mail-code-execution(42723)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.0"/>
        <vers num="10.1"/>
        <vers num="10.2"/>
        <vers num="10.3"/>
        <vers num="10.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1577" seq="2008-1577" published="2008-06-02" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Pixlet codec in Apple Pixlet Video in Apple Mac OS X before 10.5.3 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted movie file, related to "multiple memory corruption issues."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//May/msg00001.html" adv="1" patch="1">APPLE-SA-2008-05-28</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020132">1020132</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29412">29412</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29489">29489</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-150A.html" patch="1">TA08-150A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1697" adv="1">ADV-2008-1697</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42706">macosx-pixlet-code-execution(42706)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.4.11"/>
        <vers num="10.5"/>
        <vers num="10.5.1"/>
        <vers num="10.5.2"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.4.11"/>
        <vers num="10.5"/>
        <vers num="10.5.1"/>
        <vers num="10.5.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1578" seq="2008-1578" published="2008-06-02" modified="2017-08-07" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The sso_util program in Single Sign-On in Apple Mac OS X before 10.5.3 places passwords on the command line, which allows local users to obtain sensitive information by listing the process.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//May/msg00001.html" patch="1">APPLE-SA-2008-05-28</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020142">1020142</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29412">29412</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29520">29520</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-150A.html" patch="1">TA08-150A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1697" adv="1">ADV-2008-1697</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42725">macosx-ssoutil-information-disclosure(42725)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.4.11"/>
        <vers num="10.5"/>
        <vers num="10.5.1"/>
        <vers num="10.5.2"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.4.11"/>
        <vers num="10.5"/>
        <vers num="10.5.1"/>
        <vers num="10.5.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1579" seq="2008-1579" published="2008-06-02" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Wiki Server in Apple Mac OS X 10.5 before 10.5.3 allows remote attackers to obtain sensitive information (user names) by reading the error message produced upon access to a nonexistent blog.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//May/msg00001.html">APPLE-SA-2008-05-28</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020143" patch="1">1020143</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29412">29412</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-150A.html">TA08-150A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1697" adv="1">ADV-2008-1697</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42727">macosx-wikiserver-information-disclosure(42727)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.4.11"/>
        <vers num="10.5"/>
        <vers num="10.5.1"/>
        <vers num="10.5.2"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.4.11"/>
        <vers num="10.5"/>
        <vers num="10.5.1"/>
        <vers num="10.5.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1580" seq="2008-1580" published="2008-06-02" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">CFNetwork in Safari in Apple Mac OS X before 10.5.3 automatically sends an SSL client certificate in response to a web server's certificate request, which allows remote web sites to obtain sensitive information (Subject data) from personally identifiable certificates, and use arbitrary certificates to track user activities across domains, a related issue to CVE-2007-4879.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//May/msg00001.html" patch="1">APPLE-SA-2008-05-28</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020134">1020134</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29412">29412</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29493">29493</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-150A.html" patch="1">TA08-150A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1697">ADV-2008-1697</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42708">macosx-cfnetwork-info-disclosure(42708)</ref>
    </refs>
    <vuln_soft>
      <prod name="safari" vendor="apple">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1581" seq="2008-1581" published="2008-06-10" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in Apple QuickTime before 7.5 on Windows allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted packed scanlines in PixData structures in a PICT image.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Jun/msg00000.html" patch="1">APPLE-SA-2008-06-09</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT1991">http://support.apple.com/kb/HT1991</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493225/100/0/threaded">20080610 Secunia Research: Apple QuickTime PICT Image Parsing Buffer Overflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29619">29619</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29649">29649</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020213">1020213</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-162C.html">TA08-162C</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1776/references">ADV-2008-1776</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42943">quicktime-pixdata-bo(42943)</ref>
    </refs>
    <vuln_soft>
      <prod name="quicktime" vendor="apple">
        <vers num="7.4.5" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1582" seq="2008-1582" published="2008-06-10" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Apple QuickTime before 7.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted AAC-encoded file that triggers memory corruption.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Jun/msg00000.html" patch="1">APPLE-SA-2008-06-09</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT1991">http://support.apple.com/kb/HT1991</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29619">29619</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29654">29654</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020214">1020214</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-162C.html">TA08-162C</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1776/references">ADV-2008-1776</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42944">quicktime-aacencoded-code-execution(42944)</ref>
    </refs>
    <vuln_soft>
      <prod name="quicktime" vendor="apple">
        <vers num="7.4.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1583" seq="2008-1583" published="2008-06-10" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in Apple QuickTime before 7.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PICT image, a different vulnerability than CVE-2008-1581.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Jun/msg00000.html" patch="1">APPLE-SA-2008-06-09</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT1991">http://support.apple.com/kb/HT1991</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29619">29619</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29648">29648</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020215">1020215</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-162C.html">TA08-162C</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1776/references">ADV-2008-1776</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42945">apple-quicktime-pict-image-bo(42945)</ref>
    </refs>
    <vuln_soft>
      <prod name="quicktime" vendor="apple">
        <vers num="7.4.5" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1584" seq="2008-1584" published="2008-06-10" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in Indeo.qtx in Apple QuickTime before 7.5 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via crafted Indeo video codec content in a movie file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Jun/msg00000.html" patch="1">APPLE-SA-2008-06-09</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT1991">http://support.apple.com/kb/HT1991</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493247/100/0/threaded">20080610 ZDI-08-037: Apple QuickTime Indeo Video Buffer Overflow Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29619">29619</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29652">29652</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020216">1020216</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-162C.html">TA08-162C</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1776/references">ADV-2008-1776</ref>
      <ref source="MISC" url="http://www.zerodayinitiative.com/advisories/ZDI-08-037/">http://www.zerodayinitiative.com/advisories/ZDI-08-037/</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42947">quicktime-indeo-video-bo(42947)</ref>
    </refs>
    <vuln_soft>
      <prod name="quicktime" vendor="apple">
        <vers num="7.4.5" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1585" seq="2008-1585" published="2008-06-10" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Apple QuickTime before 7.5 uses the url.dll!FileProtocolHandler handler for unrecognized URIs in qt:next attributes within SMIL text in video files, which sends these URIs to explorer.exe and thereby allows remote attackers to execute arbitrary programs, as originally demonstrated by crafted file: URLs.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//Jul/msg00000.html">APPLE-SA-2008-07-10</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Jun/msg00000.html" patch="1">APPLE-SA-2008-06-09</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT1991">http://support.apple.com/kb/HT1991</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/132419">VU#132419</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493248/100/0/threaded">20080610 ZDI-08-038: QuickTime SMIL qtnext Redirect File Execution</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29619">29619</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29650">29650</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020217">1020217</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-162C.html">TA08-162C</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1776/references">ADV-2008-1776</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2064/references">ADV-2008-2064</ref>
      <ref source="MISC" url="http://www.zerodayinitiative.com/advisories/ZDI-08-038/">http://www.zerodayinitiative.com/advisories/ZDI-08-038/</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42948">quicktime-quicktime-content-code-execution(42948)</ref>
    </refs>
    <vuln_soft>
      <prod name="quicktime" vendor="apple">
        <vers num="7.4.5" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1586" seq="2008-1586" published="2008-11-25" modified="2011-03-07" severity="High" CVSS_version="2.0" CVSS_score="7.1" CVSS_base_score="7.1" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">ImageIO in Apple iPhone OS 1.0 through 2.1 and iPhone OS for iPod touch 1.1 through 2.1 allow remote attackers to cause a denial of service (memory consumption and device reset) via a crafted TIFF image.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Nov/msg00002.html" adv="1">APPLE-SA-2008-11-20</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html">SUSE-SR:2009:004</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3318" adv="1">http://support.apple.com/kb/HT3318</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/32394">32394</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1021270">1021270</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/3232">ADV-2008-3232</ref>
    </refs>
    <vuln_soft>
      <prod name="iphone_os" vendor="apple">
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.1"/>
        <vers num="1.1.1"/>
        <vers num="1.1.2"/>
        <vers num="1.1.3"/>
        <vers num="1.1.4"/>
        <vers num="1.1.5"/>
        <vers num="2.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1588" seq="2008-1588" published="2008-07-14" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Safari on Apple iPhone before 2.0 and iPod touch before 2.0 allows remote attackers to spoof the address bar via Unicode ideographic spaces in the URL.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//Jul/msg00001.html">APPLE-SA-2008-07-11</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html">APPLE-SA-2009-06-08-1</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3613">http://support.apple.com/kb/HT3613</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30186">30186</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2094/references">ADV-2008-2094</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/1522">ADV-2009-1522</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43732">ipod-iphone-addressbar-spoofing(43732)</ref>
    </refs>
    <vuln_soft>
      <prod name="safari" vendor="apple">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1589" seq="2008-1589" published="2008-07-14" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Safari on Apple iPhone before 2.0 and iPod touch before 2.0 misinterprets a menu button press as user confirmation for visiting a web site with a (1) self-signed or (2) invalid certificate, which makes it easier for remote attackers to spoof web sites.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="JVN" url="http://jvn.jp/en/jp/JVN88676089/index.html">JVN#88676089</ref>
      <ref source="JVNDB" url="http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000039.html">JVNDB-2008-000039</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//Jul/msg00001.html">APPLE-SA-2008-07-11</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30186">30186</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2094/references">ADV-2008-2094</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43734">ipod-iphone-certificate-info-disclosure(43734)</ref>
    </refs>
    <vuln_soft>
      <prod name="safari" vendor="apple">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1590" seq="2008-1590" published="2008-07-14" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">JavaScriptCore in WebKit on Apple iPhone before 2.0 and iPod touch before 2.0 does not properly perform runtime garbage collection, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors that trigger memory corruption, a different vulnerability than CVE-2008-2317.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//Jul/msg00001.html">APPLE-SA-2008-07-11</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30186">30186</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2094/references">ADV-2008-2094</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43738">ipod-iphone-garbage-code-execution(43738)</ref>
    </refs>
    <vuln_soft>
      <prod name="javascriptcore" vendor="webkit">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1591" seq="2008-1591" published="2008-03-31" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The pnVarPrepForStore function in PostNuke 0.764 and earlier skips input sanitization when magic_quotes_runtime is enabled, which allows remote attackers to conduct SQL injection attacks and execute arbitrary SQL commands via input associated with server variables, as demonstrated by the CLIENT_IP HTTP header (HTTP_CLIENT_IP variable).</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28407">28407</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41375">postnuke-index-script-sql-injection(41375)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5292">5292</ref>
    </refs>
    <vuln_soft>
      <prod name="postnuke" vendor="postnuke">
        <vers num="0.764" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1592" seq="2008-1592" published="2008-03-31" modified="2011-03-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">MQSeries 5.1 in IBM WebSphere MQ 5.1 through 5.3.1 on the HP NonStop and Tandem NSK platforms does not require mqm group membership for execution of administrative tasks, which allows local users to bypass intended access restrictions via the runmqsc program, related to "Pathway panels."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019610">1019610</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28235">28235</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0869">ADV-2008-0869</ref>
      <ref source="CONFIRM" url="http://www-1.ibm.com/support/docview.wss?uid=swg21297035" patch="1">http://www-1.ibm.com/support/docview.wss?uid=swg21297035</ref>
    </refs>
    <vuln_soft>
      <prod name="websphere_mq" vendor="ibm">
        <vers num="5.1"/>
        <vers num="5.3"/>
        <vers num="5.3.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1593" seq="2008-1593" published="2008-03-31" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The checkpoint and restart feature in the kernel in IBM AIX 5.2, 5.3, and 6.1 does not properly protect kernel memory, which allows local users to read and modify portions of memory and gain privileges via unspecified vectors involving a restart of a 64-bit process, probably related to the as_getadsp64 function.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019606">1019606</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ11820">IZ11820</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ12794">IZ12794</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ16992">IZ16992</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ17111">IZ17111</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28467" patch="1">28467</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0865">ADV-2008-0865</ref>
      <ref source="CONFIRM" url="http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4153">http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4153</ref>
      <ref source="CONFIRM" url="http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4154">http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4154</ref>
      <ref source="CONFIRM" url="http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4155">http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4155</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4595">oval:org.mitre.oval:def:4595</ref>
    </refs>
    <vuln_soft>
      <prod name="aix" vendor="ibm">
        <vers num="5.2"/>
        <vers num="5.3"/>
        <vers num="6.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1594" seq="2008-1594" published="2008-03-31" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.9" CVSS_base_score="4.9" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">The kernel in IBM AIX 5.2 and 5.3 does not properly handle resizing JFS2 filesystems on concurrent volume groups spread across multiple nodes, which allows local users of one node to cause a denial of service (remote node crash) by using chfs or lreducelv to reduce a filesystem's size.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019606">1019606</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ04946">IZ04946</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ04953">IZ04953</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ05246">IZ05246</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28467" patch="1">28467</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0865">ADV-2008-0865</ref>
      <ref source="CONFIRM" url="http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4153">http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4153</ref>
      <ref source="CONFIRM" url="http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4154">http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4154</ref>
      <ref source="CONFIRM" url="http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4155">http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4155</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5434">oval:org.mitre.oval:def:5434</ref>
    </refs>
    <vuln_soft>
      <prod name="aix" vendor="ibm">
        <vers num="5.2"/>
        <vers num="5.3"/>
        <vers num="6.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1595" seq="2008-1595" published="2008-03-31" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.9" CVSS_base_score="4.9" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:N/A:N)">
    <desc>
      <descript source="cve">The proc filesystem in the kernel in IBM AIX 5.2 and 5.3 does not properly enforce directory permissions when a file executing from a directory has weaker permissions than the directory itself, which allows local users to obtain sensitive information.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019606">1019606</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ06022">IZ06022</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ06505">IZ06505</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ06663">IZ06663</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28467" patch="1">28467</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0865">ADV-2008-0865</ref>
      <ref source="CONFIRM" url="http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4153">http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4153</ref>
      <ref source="CONFIRM" url="http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4154">http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4154</ref>
      <ref source="CONFIRM" url="http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4155">http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4155</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5321">oval:org.mitre.oval:def:5321</ref>
    </refs>
    <vuln_soft>
      <prod name="aix" vendor="ibm">
        <vers num="5.2"/>
        <vers num="5.3"/>
        <vers num="6.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1596" seq="2008-1596" published="2008-03-31" modified="2011-03-07" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Trusted Execution in IBM AIX 6.1 uses an incorrect pathname argument in a call to the trustchk_block_write function, which might allow local users to modify trusted files, related to missing checks in the TSD_FILES_LOCK policy for modifications performed via hard links, a different vulnerability than CVE-2007-6680.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019606">1019606</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ13418">IZ13418</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28467" patch="1">28467</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0865">ADV-2008-0865</ref>
      <ref source="CONFIRM" url="http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4153">http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4153</ref>
      <ref source="CONFIRM" url="http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4154">http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4154</ref>
      <ref source="CONFIRM" url="http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4155">http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4155</ref>
    </refs>
    <vuln_soft>
      <prod name="aix" vendor="ibm">
        <vers num="5.2"/>
        <vers num="5.3"/>
        <vers num="6.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1597" seq="2008-1597" published="2008-03-31" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.9" CVSS_base_score="4.9" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">The WPAR system call implementation in the kernel in IBM AIX 6.1 allows local users to cause a denial of service via unknown calls that trigger "undefined behavior."</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019606">1019606</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ13346" patch="1">IZ13346</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ13392" patch="1">IZ13392</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28467">28467</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0865">ADV-2008-0865</ref>
      <ref source="CONFIRM" url="http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4153" patch="1">http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4153</ref>
      <ref source="CONFIRM" url="http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4154" patch="1">http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4154</ref>
      <ref source="CONFIRM" url="http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4155" patch="1">http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4155</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6198">oval:org.mitre.oval:def:6198</ref>
    </refs>
    <vuln_soft>
      <prod name="aix" vendor="ibm">
        <vers num="6.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1598" seq="2008-1598" published="2008-03-31" modified="2011-03-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.7" CVSS_base_score="4.7" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:C/I:N/A:N)">
    <desc>
      <descript source="cve">The kernel in IBM AIX 6.1 allows local users with ProbeVue privileges to read arbitrary kernel memory and obtain sensitive information via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019606">1019606</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ09545" adv="1" patch="1">IZ09545</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28467" patch="1">28467</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0865">ADV-2008-0865</ref>
      <ref source="CONFIRM" url="http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4153">http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4153</ref>
      <ref source="CONFIRM" url="http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4154" adv="1" patch="1">http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4154</ref>
      <ref source="CONFIRM" url="http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4155" patch="1">http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4155</ref>
    </refs>
    <vuln_soft>
      <prod name="aix" vendor="ibm">
        <vers num="6.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1599" seq="2008-1599" published="2008-03-31" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The nddstat programs on IBM AIX 5.2, 5.3, and 6.1 do not properly handle environment variables, which allows local users to gain privileges by invoking (1) atmstat, (2) entstat, (3) fddistat, (4) hdlcstat, or (5) tokstat.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019604">1019604</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ16975" patch="1">IZ16975</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ16991" patch="1">IZ16991</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ17058" patch="1">IZ17058</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ17059" patch="1">IZ17059</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0865">ADV-2008-0865</ref>
      <ref source="CONFIRM" url="http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4156">http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4156</ref>
      <ref source="CONFIRM" url="http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4157">http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4157</ref>
      <ref source="CONFIRM" url="http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4158">http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4158</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5468">oval:org.mitre.oval:def:5468</ref>
    </refs>
    <vuln_soft>
      <prod name="aix" vendor="ibm">
        <vers num="5.2"/>
        <vers num="5.3"/>
        <vers num="6.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1600" seq="2008-1600" published="2008-03-31" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The lsmcode program on IBM AIX 5.2, 5.3, and 6.1 does not properly handle environment variables, which allows local users to gain privileges, a different vulnerability than CVE-2004-1329.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019603">1019603</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ15057">IZ15057</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ15100">IZ15100</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ15276" patch="1">IZ15276</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ15277">IZ15277</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0865">ADV-2008-0865</ref>
      <ref source="CONFIRM" url="http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4159">http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4159</ref>
      <ref source="CONFIRM" url="http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4160">http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4160</ref>
      <ref source="CONFIRM" url="http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4161">http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4161</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5566">oval:org.mitre.oval:def:5566</ref>
    </refs>
    <vuln_soft>
      <prod name="aix" vendor="ibm">
        <vers num="5.2"/>
        <vers num="5.3"/>
        <vers num="6.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1601" seq="2008-1601" published="2008-03-31" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the reboot program on IBM AIX 5.2 and 5.3 allows local users in the shutdown group to gain privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019602">1019602</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ15479">IZ15479</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ15480">IZ15480</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0865">ADV-2008-0865</ref>
      <ref source="CONFIRM" url="http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4162">http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4162</ref>
      <ref source="CONFIRM" url="http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4163">http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4163</ref>
      <ref source="CONFIRM" url="http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4164">http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4164</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5497">oval:org.mitre.oval:def:5497</ref>
    </refs>
    <vuln_soft>
      <prod name="aix" vendor="ibm">
        <vers num="5.2"/>
        <vers num="5.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1602" seq="2008-1602" published="2008-04-06" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in Orbit downloader 2.6.3 and 2.6.4 allows remote attackers to execute arbitrary code via a long download URL, which is not properly handled during Unicode conversion for a balloon notification after a download has failed.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3798">3798</ref>
      <ref source="MISC" url="http://www.coresecurity.com/?action=item&amp;id=2211" patch="1">http://www.coresecurity.com/?action=item&amp;id=2211</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490458/100/0/threaded">20080403 CORE-2008-0314 - Orbit Downloader "Download failed" buffer overflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28541" patch="1">28541</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1101">ADV-2008-1101</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41649">orbitdownloader-url-bo(41649)</ref>
    </refs>
    <vuln_soft>
      <prod name="orbit_downloader" vendor="orbit_downloader">
        <vers num="2.6.3"/>
        <vers num="2.6.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1603" seq="2008-1603" published="2008-04-01" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in GNB DesignForm before 3.9 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors in the email form.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="JVN" url="http://jvn.jp/jp/JVN%2358803701/index.html">JVN#58803701</ref>
      <ref source="CONFIRM" url="http://www.gnbnet.com/cgi/readme/designform.html">http://www.gnbnet.com/cgi/readme/designform.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28471">28471</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41495">gnbdesignform-email-xss(41495)</ref>
    </refs>
    <vuln_soft>
      <prod name="designform" vendor="gnb">
        <vers num="3.8" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1604" seq="2008-1604" published="2008-04-01" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in PerlMailer before 3.02 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://cgi.din.or.jp/~hideyuki/cgi-bin/diary-s/perldiary-s.cgi">http://cgi.din.or.jp/~hideyuki/cgi-bin/diary-s/perldiary-s.cgi</ref>
      <ref source="JVN" url="http://jvn.jp/jp/JVN%2376669770/index.html">JVN#76669770</ref>
      <ref source="JVNDB" url="http://jvndb.jvn.jp/contents/ja/2008/JVNDB-2008-000019.html">JVNDB-2008-000019</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28472">28472</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41491">perlmailer-unspecified-xss(41491)</ref>
    </refs>
    <vuln_soft>
      <prod name="perlmailer" vendor="perlmailer">
        <vers num="3.01" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1605" seq="2008-1605" published="2008-04-01" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The (1) ltmmCaptureCtrl Class, (2) ltmmConvertCtrl Class, and (3) ltmmPlayCtrl Class ActiveX controls (ltmm15.dll 15.1.0.17 and earlier) in LEADTOOLS Multimedia Toolkit 15 allow attackers to overwrite arbitrary files via the SaveSettingsToFile method.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28442">28442</ref>
      <ref source="MISC" url="http://www.shinnai.altervista.org/index.php?mod=02_Forum&amp;group=Security&amp;argument=Remote_performed_exploits&amp;topic=1206434746.ff.php&amp;page=last">http://www.shinnai.altervista.org/index.php?mod=02_Forum&amp;group=Security&amp;argument=Remote_performed_exploits&amp;topic=1206434746.ff.php&amp;page=last</ref>
      <ref source="MISC" url="http://www.shinnai.altervista.org/xplits/TXT_lyyELAFI8pOPu2p7N6cq.html">http://www.shinnai.altervista.org/xplits/TXT_lyyELAFI8pOPu2p7N6cq.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41467">leadtools-multimedia-file-overwrite(41467)</ref>
    </refs>
    <vuln_soft>
      <prod name="multimedia_toolkit" vendor="leadtools">
        <vers num="15"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1606" seq="2008-1606" published="2008-04-01" modified="2018-08-13" severity="Medium" CVSS_version="2.0" CVSS_score="6.0" CVSS_base_score="6.0" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="6.8" CVSS_vector="(AV:N/AC:M/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple directory traversal vulnerabilities in Elastic Path (EP) 4.1 and 4.1.1 allow remote attackers to (1) download arbitrary files via a .. (dot dot) in the file parameter to manager/getImportFileRedirect.jsp, (2) upload arbitrary files via a "..\" (dot dot backslash) in the file parameter to importData.jsp, and (3) list directory contents via a .. (dot dot) in the dir parameter to manager/fileManager.jsp.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://developer.elasticpath.com/entry!default.jspa?categoryID=4&amp;externalID=1334">http://developer.elasticpath.com/entry!default.jspa?categoryID=4&amp;externalID=1334</ref>
      <ref source="MISC" url="http://weblog.nomejortu.com/?p=37">http://weblog.nomejortu.com/?p=37</ref>
      <ref source="MISC" url="http://www.mwrinfosecurity.com/publications/mwri_elastic-path-arbitrary-file-system-access_2008-02-22.pdf">http://www.mwrinfosecurity.com/publications/mwri_elastic-path-arbitrary-file-system-access_2008-02-22.pdf</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28352">28352</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41356">elasticpath-multiple-directory-traversal(41356)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41364">elasticpath-pathdir-directory-traversal(41364)</ref>
    </refs>
    <vuln_soft>
      <prod name="elastic_path" vendor="elastic_path">
        <vers num="4.1"/>
        <vers num="4.1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1607" seq="2008-1607" published="2008-04-01" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in haberoku.php in Serbay Arslanhan Bomba Haber 2.0 allows remote attackers to execute arbitrary SQL commands via the haber parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28435">28435</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41422">bombahaber-haberoku-sql-injection(41422)</ref>
    </refs>
    <vuln_soft>
      <prod name="bomba_haber" vendor="serby_arslanhan">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1608" seq="2008-1608" published="2008-04-01" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in postview.php in Clever Copy 3.0 allows remote attackers to execute arbitrary SQL commands via the ID parameter, a different vector than CVE-2008-0363 and CVE-2006-0583.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28437">28437</ref>
      <ref source="MISC" url="http://www.securityfocus.com/bid/28437/exploit">http://www.securityfocus.com/bid/28437/exploit</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41450">clevercopy-postview-sql-injection(41450)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5502">5502</ref>
    </refs>
    <vuln_soft>
      <prod name="clever_copy" vendor="clever_copy">
        <vers num="3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1609" seq="2008-1609" published="2008-04-01" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple PHP remote file inclusion vulnerabilities in just another flat file (JAF) CMS 4.0 RC2 allow remote attackers to execute arbitrary PHP code via a URL in the (1) website parameter to (a) forum.php, (b) headlines.php, and (c) main.php in forum/, and (2) main_dir parameter to forum/forum.php.  NOTE: other main_dir vectors are already covered by CVE-2006-7127.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490162/100/0/threaded">20080327 JAF-CMS 4.0 RC2 Multiple Remote File Inclusion Vulnerabilities</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490183/100/0/threaded">20080327 Re: JAF-CMS 4.0 RC2 Multiple Remote File Inclusion Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28476">28476</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41753">jafcms-multiple-file-include(41753)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/2474/">2474</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5317">5317</ref>
    </refs>
    <vuln_soft>
      <prod name="jaf_cms" vendor="jaf_cms">
        <vers num="4.0_rc2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1610" seq="2008-1610" published="2008-04-01" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in TallSoft Quick TFTP Server Pro 2.1 allows remote attackers to cause a denial of service or execute arbitrary code via a long mode field in a read or write request.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.offensive-security.com/0day/quick-tftp-poc.py.txt">http://www.offensive-security.com/0day/quick-tftp-poc.py.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28459">28459</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41499">quicktftp-modefields-bo(41499)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5315">5315</ref>
    </refs>
    <vuln_soft>
      <prod name="tftp_server_pro" vendor="tallsoft_quick">
        <vers num="2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1611" seq="2008-1611" published="2008-04-01" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in TFTP Server SP 1.4 for Windows allows remote attackers to cause a denial of service or execute arbitrary code via a long filename in a read or write request.</descript>
      <descript source="nvd">Information regarding how the service runs as system: http://www.tftp-server.com/</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.offensive-security.com/0day/sourceforge-tftpd.py.txt">http://www.offensive-security.com/0day/sourceforge-tftpd.py.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28462">28462</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41496">tftpserver-filename-bo(41496)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5314">5314</ref>
    </refs>
    <vuln_soft>
      <prod name="winagents_tftp_server" vendor="tftp-server">
        <vers num="sp_1.4" edition=":windows"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1612" seq="2008-1612" published="2008-04-01" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The arrayShrink function (lib/Array.c) in Squid 2.6.STABLE17 allows attackers to cause a denial of service (process exit) via unknown vectors that cause an array to shrink to 0 entries, which triggers an assert error.  NOTE: this issue is due to an incorrect fix for CVE-2007-6239.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html">SUSE-SR:2008:011</ref>
      <ref source="MLIST" url="http://marc.info/?l=squid-announce&amp;m=120614453813157&amp;w=2">[squid-announce[ 20080322 Advisory Squid-2007:2 updated</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200903-38.xml">GLSA-200903-38</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1646">DSA-1646</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:134">MDVSA-2008:134</ref>
      <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/04/01/5">[oss-security] 20080401 CVE id request: squid</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0214.html">RHSA-2008:0214</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28693">28693</ref>
      <ref source="CONFIRM" url="http://www.squid-cache.org/Advisories/SQUID-2007_2.txt" patch="1">http://www.squid-cache.org/Advisories/SQUID-2007_2.txt</ref>
      <ref source="MISC" url="http://www.squid-cache.org/Versions/v2/2.6/changesets/11882.patch">http://www.squid-cache.org/Versions/v2/2.6/changesets/11882.patch</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-601-1">USN-601-1</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41586">squid-arrayshrink-dos(41586)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11376">oval:org.mitre.oval:def:11376</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00560.html">FEDORA-2008-2740</ref>
    </refs>
    <vuln_soft>
      <prod name="squid" vendor="squid">
        <vers num="2.6.stable17"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1613" seq="2008-1613" published="2008-04-22" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in ioRD.asp in RedDot CMS 7.5 Build 7.5.0.48, and possibly other versions including 6.5 and 7.0, allows remote attackers to execute arbitrary SQL commands via the LngId parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.irmplc.com/index.php/167-Advisory-026">http://www.irmplc.com/index.php/167-Advisory-026</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491139/100/0/threaded">20080421 IRM Security Advisory : RedDot CMS SQL injection vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28872">28872</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41924">reddot-iord-sql-injection(41924)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5482">5482</ref>
    </refs>
    <vuln_soft>
      <prod name="cms" vendor="reddot">
        <vers num="6.5"/>
        <vers num="7.0"/>
        <vers num="7.5" edition="build_7.5.0.48"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1614" seq="2008-1614" published="2008-04-02" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.1" CVSS_vector="(AV:L/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">suPHP before 0.6.3 allows local users to gain privileges via (1) a race condition that involves multiple symlink changes to point a file owned by a different user, or (2) a symlink to the directory of a different user, which is used to determine privileges.</descript>
      <descript source="nvd">Addition information can be found at:

http://secunia.com/advisories/29615/

</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MLIST" url="http://lists.marsching.biz/pipermail/suphp/2008-March/001750.html">[suPHP] 20080330 SECURITY ISSUE: Immediate update advised</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1550">DSA-1550</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28568">28568</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1073/references">ADV-2008-1073</ref>
      <ref source="MISC" url="https://bugzilla.redhat.com/show_bug.cgi?id=439687">https://bugzilla.redhat.com/show_bug.cgi?id=439687</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41582">suphp-files-privilege-escalation(41582)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00014.html">FEDORA-2008-2815</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00075.html">FEDORA-2008-2868</ref>
    </refs>
    <vuln_soft>
      <prod name="suphp" vendor="sebastian_marsching">
        <vers num="0.6.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1615" seq="2008-1615" published="2008-05-07" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.9" CVSS_base_score="4.9" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Linux kernel 2.6.18, and possibly other versions, when running on AMD64 architectures, allows local users to cause a denial of service (crash) via certain ptrace calls.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html">SUSE-SA:2008:030</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00000.html">SUSE-SA:2008:031</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00002.html">SUSE-SA:2008:032</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00007.html">SUSE-SA:2008:035</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00012.html">SUSE-SA:2008:038</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1588">DSA-1588</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:167">MDVSA-2008:167</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:174">MDVSA-2008:174</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0237.html">RHSA-2008:0237</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0275.html">RHSA-2008:0275</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0585.html">RHSA-2008:0585</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29086">29086</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020047">1020047</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-625-1">USN-625-1</ref>
      <ref source="MISC" url="https://bugzilla.redhat.com/show_bug.cgi?id=431430">https://bugzilla.redhat.com/show_bug.cgi?id=431430</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42278">linux-kernel-processtrace-dos(42278)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9563">oval:org.mitre.oval:def:9563</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00357.html">FEDORA-2008-4043</ref>
    </refs>
    <vuln_soft>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="as_4"/>
        <vers num="es_4"/>
        <vers num="ws_4"/>
      </prod>
      <prod name="enterprise_linux_desktop" vendor="redhat">
        <vers num="4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1617" seq="2008-1617" published="2008-04-08" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Double free vulnerability in Web TransferCtrl Class 8,2,1,4 (iManFile.cab), as used in WorkSite Web 8.2 before SP1 P2, allows remote attackers to execute arbitrary code via JavaScript that sets the Server property to a string, then sets the string to null.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.mwrinfosecurity.com/publications/mwri_interwoven-worksite-activex-control-remote-code-execution_2008-03-10.pdf">http://www.mwrinfosecurity.com/publications/mwri_interwoven-worksite-activex-control-remote-code-execution_2008-03-10.pdf</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28628">28628</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1134/references">ADV-2008-1134</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41699">worksite-webtransferctrl-code-execution(41699)</ref>
    </refs>
    <vuln_soft>
      <prod name="worksite_web" vendor="interwoven">
        <vers num="8.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1618" seq="2008-1618" published="2008-04-07" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The PPTP VPN service in Watchguard Firebox before 10, when performing the MS-CHAPv2 authentication handshake, generates different error codes depending on whether the username is valid or invalid, which allows remote attackers to enumerate valid usernames.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.mwrinfosecurity.com/publications/mwri_watchguard-firebox-pptp-vpn-user-enumeration-advisory_2008-04-04.pdf" patch="1">http://www.mwrinfosecurity.com/publications/mwri_watchguard-firebox-pptp-vpn-user-enumeration-advisory_2008-04-04.pdf</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28619">28619</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019796">1019796</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1152/references" adv="1">ADV-2008-1152</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41683">firebox-pptpvpn-mschapv2-info-disclosure(41683)</ref>
    </refs>
    <vuln_soft>
      <prod name="firebox_pptp_vpn" vendor="watchguard">
        <vers num="4.9"/>
        <vers num="5.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1619" seq="2008-1619" published="2008-04-02" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The ssm_i emulation in Xen 5.1 on IA64 architectures allows attackers to cause a denial of service (dom0 panic) via certain traffic, as demonstrated using an FTP stress test tool.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0233.html">RHSA-2008:0233</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29085">29085</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=437770" patch="1">https://bugzilla.redhat.com/show_bug.cgi?id=437770</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41633">xen-ssmiemulation-dos(41633)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10226">oval:org.mitre.oval:def:10226</ref>
    </refs>
    <vuln_soft>
      <prod name="xen" vendor="xensource_inc">
        <vers num="5.1" edition=":ia64"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1620" seq="2008-1620" published="2008-04-02" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in 2X TFTP service (TFTPd.exe) 3.2.0.0 and earlier in 2X ThinClientServer 5.0_sp1-r3497 and earlier allows remote attackers to read or overwrite arbitrary files via a ... (dot dot dot) in the filename.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/thindirtrav-adv.txt">http://aluigi.altervista.org/adv/thindirtrav-adv.txt</ref>
      <ref source="MISC" url="http://aluigi.org/testz/tftpx.zip" patch="1">http://aluigi.org/testz/tftpx.zip</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490324/100/0/threaded">20080331 Directory traversal in 2X ThinClientServer v5.0_sp1-r3497</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28504">28504</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1040/references">ADV-2008-1040</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41528">2xthinclient-tftpd-directory-traversal(41528)</ref>
    </refs>
    <vuln_soft>
      <prod name="thinclientserver" vendor="2x">
        <vers num="3.2.0.0" prev="1"/>
        <vers num="5.0" prev="1" edition="sp1_r3497"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1621" seq="2008-1621" published="2008-04-02" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in GeeCarts allow remote attackers to inject arbitrary web script or HTML via the id parameter to (1) show.php, (2) search.php, and (3) view.php.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28470">28470</ref>
      <ref source="MISC" url="http://www.securityfocus.com/bid/28470/exploit">http://www.securityfocus.com/bid/28470/exploit</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41506">geecarts-id-xss(41506)</ref>
    </refs>
    <vuln_soft>
      <prod name="geecarts" vendor="geertsen_holdings_inc">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1622" seq="2008-1622" published="2008-04-02" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple PHP remote file inclusion vulnerabilities in GeeCarts allow remote attackers to execute arbitrary PHP code via a URL in the id parameter to (1) show.php, (2) search.php, and (3) view.php.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28470">28470</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41507">geecarts-id-file-include(41507)</ref>
    </refs>
    <vuln_soft>
      <prod name="geecarts" vendor="geertsen_holdings_inc">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1623" seq="2008-1623" published="2008-04-02" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in admin_view_image.php in Smoothflash allows remote attackers to execute arbitrary SQL commands via the cid parameter.</descript>
      <descript source="nvd">Additional information can be found at:

http://www.securityfocus.com/bid/28503</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28503">28503</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41526">smoothflash-adminviewimage-sql-injection(41526)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5322">5322</ref>
    </refs>
    <vuln_soft>
      <prod name="smoothflash" vendor="lotus_web_studios_inc">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1624" seq="2008-1624" published="2008-04-02" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in v2demo/page.php in Jshop Server 1.x through 2.x allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the xPage parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28501">28501</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41524">jshop-page-file-include(41524)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5325">5325</ref>
    </refs>
    <vuln_soft>
      <prod name="jshop_server" vendor="whorl_ltd">
        <vers num="1"/>
        <vers num="2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1625" seq="2008-1625" published="2008-04-02" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.1" CVSS_vector="(AV:L/AC:L/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">aavmker4.sys in avast! Home and Professional 4.7 for Windows does not properly validate input to IOCTL 0xb2d60030, which allows local users to gain privileges via certain IOCTL requests.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.avast.com/eng/avast-4-home_pro-revision-history.html">http://www.avast.com/eng/avast-4-home_pro-revision-history.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490321/100/0/threaded">20080330 [TKADV2008-002] avast! 4.7 aavmker4.sys Kernel Memory Corruption</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28502">28502</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019732">1019732</ref>
      <ref source="MISC" url="http://www.trapkit.de/advisories/TKADV2008-002.txt">http://www.trapkit.de/advisories/TKADV2008-002.txt</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1034/references">ADV-2008-1034</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41527">avast-aavmker4-privilege-escalation(41527)</ref>
    </refs>
    <vuln_soft>
      <prod name="avast_antivirus_home" vendor="avast">
        <vers num="4.7.827" edition=":windows"/>
        <vers num="4.7.844" edition=":windows"/>
        <vers num="4.7.869" edition=":windows"/>
        <vers num="4.7.1043" edition=":windows"/>
        <vers num="4.7.1098" edition=":windows"/>
      </prod>
      <prod name="avast_antivirus_professional" vendor="avast">
        <vers num="4.7.827" edition=":windows"/>
        <vers num="4.7.844" edition=":windows"/>
        <vers num="4.7.1043" edition=":windows"/>
        <vers num="4.7.1098" edition=":windows"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1626" seq="2008-1626" published="2008-04-02" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in eggBlog before 4.0.1 allows remote attackers to execute arbitrary SQL commands via an unspecified cookie. NOTE: this might overlap CVE-2008-0159.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://eggblog.net/news.php?id=39" patch="1">http://eggblog.net/news.php?id=39</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/showfiles.php?group_id=155425&amp;package_id=173141&amp;release_id=587701" patch="1">http://sourceforge.net/project/showfiles.php?group_id=155425&amp;package_id=173141&amp;release_id=587701</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28497" patch="1">28497</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41512">eggblog-unspecified-sql-injection(41512)</ref>
    </refs>
    <vuln_soft>
      <prod name="eggblog" vendor="eggblog">
        <vers num="4.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1627" seq="2008-1627" published="2008-04-02" modified="2017-08-07" severity="Low" CVSS_version="2.0" CVSS_score="3.5" CVSS_base_score="3.5" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="6.8" CVSS_vector="(AV:N/AC:M/Au:S/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">CDS Invenio 0.92.1 and earlier allows remote authenticated users to delete email notification alerts of arbitrary users via a modified internal UID.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://cdsware.cern.ch/invenio/news.html" patch="1">http://cdsware.cern.ch/invenio/news.html</ref>
      <ref source="CONFIRM" url="http://cdsware.cern.ch/lists/project-cdsware-announce/archive/msg00021.shtml" patch="1">http://cdsware.cern.ch/lists/project-cdsware-announce/archive/msg00021.shtml</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28514">28514</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41546">cdsinvenio-alert-weak-security(41546)</ref>
    </refs>
    <vuln_soft>
      <prod name="invenio" vendor="cds_software_consortium">
        <vers num="0.92.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1628" seq="2008-1628" published="2008-04-02" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.1" CVSS_base_score="4.1" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="2.7" CVSS_vector="(AV:L/AC:M/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the audit_log_user_command function in lib/audit_logging.c in Linux Audit before 1.7 might allow remote attackers to execute arbitrary code via a long command argument. NOTE: some of these details are obtained from third party information.</descript>
      <descript source="nvd">Additional information can be found at:

http://www.securityfocus.com/bid/28524/info

http://www.frsirt.com/english/advisories/2008/1052</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html">SUSE-SR:2008:010</ref>
      <ref source="CONFIRM" url="http://people.redhat.com/sgrubb/audit/ChangeLog">http://people.redhat.com/sgrubb/audit/ChangeLog</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200807-14.xml">GLSA-200807-14</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:083">MDVSA-2008:083</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28524">28524</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019824">1019824</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1052/references">ADV-2008-1052</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41576">linuxaudit-auditlogusercommand-bo(41576)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00200.html">FEDORA-2008-3012</ref>
      <ref source="MLIST" url="https://www.redhat.com/archives/linux-audit/2008-March/msg00138.html">[linux-audit] 20080330 audit 1.7 released</ref>
    </refs>
    <vuln_soft>
      <prod name="audit" vendor="linux">
        <vers num="1.6.9" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1629" seq="2008-1629" published="2008-04-02" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in PHPkrm before 1.5.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.</descript>
      <descript source="nvd">Additional information can be found at:

http://www.securityfocus.com/bid/28510</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://freshmeat.net/projects/phpkrm/?branch_id=58803&amp;release_id=274667" patch="1">http://freshmeat.net/projects/phpkrm/?branch_id=58803&amp;release_id=274667</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28510">28510</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41548">phpkrm-unspecified-xss(41548)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpkrm" vendor="pau_rodriguez">
        <vers num="1.4.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1630" seq="2008-1630" published="2008-04-02" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in CuteFlow 1.5.0 and 2.10.0 allow remote attackers to inject arbitrary web script or HTML via the language parameter to (1) page/showcirculation.php; and (2) edittemplate_step2.php, (3) showfields.php, (4) showuser.php, (5) editmailinglist_step1.php, and (6) showtemplates.php in pages/.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3792">3792</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490305/100/0/threaded">20080329 CuteFlow Version 1.5.0 Multiple Remote Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28500">28500</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41537">cuteflow-language-xss(41537)</ref>
    </refs>
    <vuln_soft>
      <prod name="cuteflow" vendor="emedia_office_gmbh">
        <vers num="1.5.0"/>
        <vers num="2.10.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1631" seq="2008-1631" published="2008-04-02" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in login.php in CuteFlow 1.5.0 and 2.10.0 allows remote attackers to execute arbitrary SQL commands via the UserId parameter, related to the login form field in index.php.</descript>
      <descript source="nvd">Additional information can be found at:

http://www.securityfocus.com/bid/28500/info</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3792">3792</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490305/100/0/threaded">20080329 CuteFlow Version 1.5.0 Multiple Remote Vulnerabilities</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41544">cuteflow-login-sql-injection(41544)</ref>
    </refs>
    <vuln_soft>
      <prod name="cuteflow" vendor="emedia_office_gmbh">
        <vers num="1.5.0"/>
        <vers num="2.10.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1632" seq="2008-1632" published="2008-04-02" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in CuteFlow 2.10.0 allow remote authenticated users to execute arbitrary SQL commands via the (1) listid parameter to pages/editmailinglist_step1.php, the (2) userid parameter to pages/edituser.php, the (3) fieldid parameter to pages/editfield.php, and the (4) templateid to pages/edittemplate_step1.php.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
      <descript source="nvd">Addtional information can be found at:
http://xforce.iss.net/xforce/xfdb/41537</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41536">cuteflow-multiple-sql-injection(41536)</ref>
    </refs>
    <vuln_soft>
      <prod name="cuteflow" vendor="emedia_office_gmbh">
        <vers num="2.10.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1633" seq="2008-1633" published="2008-04-02" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Mondo Rescue before 2.2.5 has unknown impact and attack vectors, related to the use of (1) /tmp and (2) MINDI_CACHE.</descript>
      <descript source="nvd">Additional information can be found at:

http://www.securityfocus.com/bid/28522</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.mondorescue.org/news.shtml" patch="1">http://www.mondorescue.org/news.shtml</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28522">28522</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41530">mondo-rescue-unspecified(41530)</ref>
    </refs>
    <vuln_soft>
      <prod name="rescue" vendor="mondo">
        <vers num="2.2.4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1634" seq="2008-1634" published="2008-04-02" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php in JV2 Folder Gallery 3.1 allows remote attackers to inject arbitrary web script or HTML via the image parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28508">28508</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41569">jv2foldergallery-index-xss(41569)</ref>
    </refs>
    <vuln_soft>
      <prod name="folder_gallery" vendor="jv2">
        <vers num="3.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1635" seq="2008-1635" published="2008-04-02" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in view_private.php in Keep It Simple Guest Book (KISGB) 5.0.0 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the tmp_theme parameter.  NOTE: 5.1.1 is also reportedly affected.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28513">28513</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41525">kisgb-viewprivate-file-include(41525)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5324">5324</ref>
    </refs>
    <vuln_soft>
      <prod name="keep_it_simple_guest_book" vendor="raven_php_scripts">
        <vers num="5.1.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1636" seq="2008-1636" published="2008-04-02" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php in JV2 Quick Gallery 1.1 allows remote attackers to inject arbitrary web script or HTML via the f parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28511">28511</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41568">jv2quickgallery-index-xss(41568)</ref>
    </refs>
    <vuln_soft>
      <prod name="quick_gallery" vendor="jv2">
        <vers num="1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1637" seq="2008-1637" published="2008-04-02" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PowerDNS Recursor before 3.1.5 uses insufficient randomness to calculate (1) TRXID values and (2) UDP source port numbers, which makes it easier for remote attackers to poison a DNS cache, related to (a) algorithmic deficiencies in rand and random functions in external libraries, (b) use of a 32-bit seed value, and (c) choice of the time of day as the sole seeding information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://doc.powerdns.com/changelog.html">http://doc.powerdns.com/changelog.html</ref>
      <ref source="CONFIRM" url="http://doc.powerdns.com/powerdns-advisory-2008-01.html" patch="1">http://doc.powerdns.com/powerdns-advisory-2008-01.html</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00001.html">SUSE-SR:2008:012</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200804-22.xml">GLSA-200804-22</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1544">DSA-1544</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490330/100/0/threaded">20080331 Paper by Amit Klein (Trusteer): "PowerDNS Recursor DNS Cache Poisoning [pharming]"</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28517">28517</ref>
      <ref source="MISC" url="http://www.trusteer.com/docs/PowerDNS_recursor_DNS_Cache_Poisoning.pdf">http://www.trusteer.com/docs/PowerDNS_recursor_DNS_Cache_Poisoning.pdf</ref>
      <ref source="MISC" url="http://www.trusteer.com/docs/powerdnsrecursor.html">http://www.trusteer.com/docs/powerdnsrecursor.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1046/references">ADV-2008-1046</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41534">powerdns-dnscache-weak-security(41534)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00198.html">FEDORA-2008-3010</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00224.html">FEDORA-2008-3036</ref>
    </refs>
    <vuln_soft>
      <prod name="recursor" vendor="powerdns">
        <vers num="3.1.4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1638" seq="2008-1638" published="2008-04-02" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.1" CVSS_vector="(AV:L/AC:L/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Nik Sharpener Pro, possibly 2.0, uses world-writable permissions for plug-in files, which allows local users to gain privileges by replacing a plug-in with a Trojan horse.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/124289">VU#124289</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27707">27707</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41535">niksharpenerpro-plugin-insecure-permissions(41535)</ref>
    </refs>
    <vuln_soft>
      <prod name="nik_sharpener_pro" vendor="nik_software_inc">
        <vers num="2.0" edition=":inkjet"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1639" seq="2008-1639" published="2008-04-02" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in Neat weblog 0.2 allows remote attackers to execute arbitrary SQL commands via the articleId parameter in a show action, probably related to the showArticle function in lib/lib_article.include.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28534">28534</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1053/references">ADV-2008-1053</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41555">neatweblog-index-sql-injection(41555)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5331">5331</ref>
    </refs>
    <vuln_soft>
      <prod name="neat-web" vendor="neat_web">
        <vers num="0.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1640" seq="2008-1640" published="2008-04-02" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in jgs_treffen.php in the JGS-XA JGS-Treffen 2.0.2 and earlier addon for Woltlab Burning Board (wBB) allows remote attackers to execute arbitrary SQL commands via the view_id parameter in an ansicht action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28530">28530</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1054/references">ADV-2008-1054</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41556">jgstreffen-jgstreffen-sql-injection(41556)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5329">5329</ref>
    </refs>
    <vuln_soft>
      <prod name="jgs_treffen" vendor="jgs-xa">
        <vers num="2.0.1"/>
        <vers num="2.0.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1641" seq="2008-1641" published="2008-04-02" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in default.asp in EfesTECH Video 5.0 allows remote attackers to execute arbitrary SQL commands via the catID parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3791">3791</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490309/100/0/threaded">20080329 Efestech Video v5,0 (id) Remote Sql Injection</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28532">28532</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41550">efestechvideo-default-sql-injection(41550)</ref>
    </refs>
    <vuln_soft>
      <prod name="video" vendor="efestech">
        <vers num="5.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1642" seq="2008-1642" published="2008-04-02" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in index.php in Sava's GuestBook 2.0 allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the action parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28536">28536</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41596">savasguestbook-index-file-include(41596)</ref>
    </refs>
    <vuln_soft>
      <prod name="savas_guestbook" vendor="savas_place">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1643" seq="2008-1643" published="2008-04-02" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in the PXE TFTP Service (PXEMTFTP.exe) in LANDesk Management Suite (LDMS) 8.7 SP5 and earlier and 8.8 allows remote attackers to read arbitrary files via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://community.landesk.com/support/docs/DOC-2659">http://community.landesk.com/support/docs/DOC-2659</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28535">28535</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019748">1019748</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1051/references">ADV-2008-1051</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41562">landesk-pxetftp-directory-traversal(41562)</ref>
    </refs>
    <vuln_soft>
      <prod name="landesk_management_suite" vendor="landesk_software">
        <vers num="8.7" prev="1" edition="sp1"/>
        <vers num="8.7" prev="1" edition="sp2"/>
        <vers num="8.7" prev="1" edition="sp3"/>
        <vers num="8.7" prev="1" edition="sp4"/>
        <vers num="8.7" prev="1" edition="sp5"/>
        <vers num="8.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1644" seq="2008-1644" published="2008-04-02" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in viewlinks.php in Sava's Link Manager 2.0 allows remote attackers to execute arbitrary SQL commands via the category parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28538">28538</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41594">savaslinkmanager-category-sql-injection(41594)</ref>
    </refs>
    <vuln_soft>
      <prod name="savas_link_manager" vendor="savas_place">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1645" seq="2008-1645" published="2008-04-02" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in body.php in phpSpamManager (phpSM) 0.53 beta allows remote attackers to read arbitrary local files via a .. (dot dot) in the filename parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28529">28529</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1055/references">ADV-2008-1055</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41575">phpspammanager-body-file-include(41575)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5328">5328</ref>
    </refs>
    <vuln_soft>
      <prod name="php_spammanager" vendor="guillaume_meister">
        <vers num="0.53" edition="beta"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1646" seq="2008-1646" published="2008-04-02" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in wp-download.php in the WP-Download 1.2 plugin for WordPress allows remote attackers to execute arbitrary SQL commands via the dl_id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28516">28516</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41552">wpdownload-wpdownload-sql-injection(41552)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5326">5326</ref>
    </refs>
    <vuln_soft>
      <prod name="wp-download" vendor="arnos_toolbox">
        <vers num="1.2"/>
      </prod>
      <prod name="wp_download" vendor="wordpress">
        <vers num="1.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1647" seq="2008-1647" published="2008-04-02" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The ChilkatHttp.ChilkatHttp.1 and ChilkatHttp.ChilkatHttpRequest.1 ActiveX controls in ChilkatHttp.dll 2.4.0.0, 2.3.0.0, and earlier in ChilkatHttp ActiveX expose the unsafe SaveLastError method, which allows remote attackers to overwrite arbitrary files.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28546">28546</ref>
      <ref source="MISC" url="http://www.shinnai.altervista.org/index.php?mod=02_Forum&amp;group=Security&amp;argument=Remote_performed_exploits&amp;topic=1207033569.ff.php">http://www.shinnai.altervista.org/index.php?mod=02_Forum&amp;group=Security&amp;argument=Remote_performed_exploits&amp;topic=1207033569.ff.php</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1050/references">ADV-2008-1050</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/45988">chilkathttp-activex-file-overwrite(45988)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5338">5338</ref>
    </refs>
    <vuln_soft>
      <prod name="chilkathttp_activex" vendor="chilkat_software">
        <vers num="2.3.0.0" prev="1"/>
        <vers num="2.4.0.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1648" seq="2008-1648" published="2008-04-02" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Sympa before 5.4 allows remote attackers to cause a denial of service (daemon crash) via an e-mail message with a malformed value of the Content-Type header and unspecified other headers.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourcesup.cru.fr/tracker/?func=detail&amp;group_id=23&amp;aid=3702&amp;atid=167">http://sourcesup.cru.fr/tracker/?func=detail&amp;group_id=23&amp;aid=3702&amp;atid=167</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1600">DSA-1600</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:133">MDVSA-2008:133</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28539">28539</ref>
      <ref source="CONFIRM" url="http://www.sympa.org/distribution/latest-stable/NEWS">http://www.sympa.org/distribution/latest-stable/NEWS</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1080/references">ADV-2008-1080</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41561">sympa-mimeentityhead-dos(41561)</ref>
    </refs>
    <vuln_soft>
      <prod name="sympa" vendor="sympa">
        <vers num="0.001"/>
        <vers num="0.002"/>
        <vers num="0.003"/>
        <vers num="0.004"/>
        <vers num="0.005"/>
        <vers num="0.006"/>
        <vers num="0.007"/>
        <vers num="0.008"/>
        <vers num="0.009"/>
        <vers num="0.010"/>
        <vers num="0.011"/>
        <vers num="1.2.0"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2"/>
        <vers num="1.3.0"/>
        <vers num="1.3.1"/>
        <vers num="1.3.1-2"/>
        <vers num="1.3.2"/>
        <vers num="1.3.3"/>
        <vers num="1.3.4"/>
        <vers num="1.3.4-1"/>
        <vers num="1.4.0"/>
        <vers num="1.4.2"/>
        <vers num="1.4.2-1"/>
        <vers num="1.5"/>
        <vers num="2.2.1b"/>
        <vers num="2.2.2b"/>
        <vers num="2.2.3b"/>
        <vers num="2.2.4"/>
        <vers num="2.2.5"/>
        <vers num="2.2.6"/>
        <vers num="2.2.7"/>
        <vers num="2.2b"/>
        <vers num="2.3.0"/>
        <vers num="2.3.1"/>
        <vers num="2.3.2"/>
        <vers num="2.3.3"/>
        <vers num="2.3.4"/>
        <vers num="2.3beta"/>
        <vers num="2.4"/>
        <vers num="2.5"/>
        <vers num="2.5.1"/>
        <vers num="2.5.2"/>
        <vers num="2.5.3b"/>
        <vers num="2.5.4b"/>
        <vers num="2.6"/>
        <vers num="2.6.1"/>
        <vers num="2.7"/>
        <vers num="2.7.1"/>
        <vers num="2.7.2"/>
        <vers num="2.7.3"/>
        <vers num="2.7a"/>
        <vers num="2.7b.1"/>
        <vers num="2.7b.2"/>
        <vers num="2.7b.3"/>
        <vers num="3.0"/>
        <vers num="3.0a"/>
        <vers num="3.0a.1"/>
        <vers num="3.0b.4"/>
        <vers num="3.0b.8"/>
        <vers num="3.0b.9"/>
        <vers num="3.1"/>
        <vers num="3.1.1"/>
        <vers num="3.1b.7"/>
        <vers num="3.1b.8"/>
        <vers num="3.1b.9"/>
        <vers num="3.1b.10"/>
        <vers num="3.1b.12"/>
        <vers num="3.1b.13"/>
        <vers num="3.2"/>
        <vers num="3.2.1"/>
        <vers num="3.2.2a"/>
        <vers num="3.3"/>
        <vers num="3.3.1"/>
        <vers num="3.3.3"/>
        <vers num="3.3.4b.3"/>
        <vers num="3.3.4b.4"/>
        <vers num="3.3.4b.5"/>
        <vers num="3.3.4b.6"/>
        <vers num="3.3.4b.7"/>
        <vers num="3.3.4b.8"/>
        <vers num="3.3.4b.9"/>
        <vers num="3.3.5"/>
        <vers num="3.3.6b.2"/>
        <vers num="3.3.6b.3"/>
        <vers num="3.3.6b.4"/>
        <vers num="3.3.6b.5"/>
        <vers num="3.3.6b.6"/>
        <vers num="3.3a-vhost.10"/>
        <vers num="3.3b.3"/>
        <vers num="3.3b.4"/>
        <vers num="3.4"/>
        <vers num="4.0"/>
        <vers num="4.0.a1"/>
        <vers num="4.0.a3"/>
        <vers num="4.0.a4"/>
        <vers num="4.0.a5"/>
        <vers num="4.0.a6"/>
        <vers num="4.0.a7"/>
        <vers num="4.0.a8"/>
        <vers num="4.0.a9"/>
        <vers num="4.0.b1"/>
        <vers num="4.0.b2"/>
        <vers num="4.0.b3"/>
        <vers num="4.1"/>
        <vers num="4.2b.1"/>
        <vers num="4.2b.3"/>
        <vers num="5.0"/>
        <vers num="5.0a"/>
        <vers num="5.0a.1"/>
        <vers num="5.0b"/>
        <vers num="5.0b.1"/>
        <vers num="5.1"/>
        <vers num="5.1.2"/>
        <vers num="5.2"/>
        <vers num="5.2b"/>
        <vers num="5.2b2"/>
        <vers num="5.3"/>
        <vers num="5.3.2"/>
        <vers num="5.3a.8"/>
        <vers num="5.3a.9"/>
        <vers num="5.3a.10"/>
        <vers num="5.3b.1"/>
        <vers num="5.3b.3"/>
        <vers num="5.3b.4"/>
        <vers num="5.3b.5"/>
        <vers num="5.4a.2"/>
        <vers num="5.4a.4"/>
        <vers num="5.4b.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1649" seq="2008-1649" published="2008-04-02" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in staticpages/easypublish/index.php in EasyNews 4.0 allows remote attackers to inject arbitrary web script or HTML via the read parameter in an edp_pupublish action.</descript>
      <descript source="nvd">Additional information may be found at:

http://www.securityfocus.com/bid/28542</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3793">3793</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490338/100/0/threaded">20080401 EasyNews-40tr Multiple Remote Vulnerabilities (SQL Injection Exploit/XSS/LFI)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28542">28542</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41593">easynews-index-xss(41593)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5333">5333</ref>
    </refs>
    <vuln_soft>
      <prod name="easynews" vendor="myiosoft">
        <vers num="4.0tr"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1650" seq="2008-1650" published="2008-04-02" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in dynamicpages/index.php in EasyNews 4.0 allows remote attackers to execute arbitrary SQL commands via the read parameter in an edp_Help_Internal_News action.</descript>
      <descript source="nvd">Additional information can be found at:

http://www.securityfocus.com/bid/28542</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3793">3793</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490338/100/0/threaded">20080401 EasyNews-40tr Multiple Remote Vulnerabilities (SQL Injection Exploit/XSS/LFI)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28542">28542</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41590">easynews-index-sql-injection(41590)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5333">5333</ref>
    </refs>
    <vuln_soft>
      <prod name="easynews" vendor="myiosoft">
        <vers num="4.0tr"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1651" seq="2008-1651" published="2008-04-02" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in admin/login.php in EasyNews 4.0 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the lang parameter.</descript>
      <descript source="nvd">Additional information can be found at:

http://www.securityfocus.com/bid/28542</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3793">3793</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490338/100/0/threaded">20080401 EasyNews-40tr Multiple Remote Vulnerabilities (SQL Injection Exploit/XSS/LFI)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28542">28542</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41589">easynews-login-file-include(41589)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5333">5333</ref>
    </refs>
    <vuln_soft>
      <prod name="easynews" vendor="myiosoft">
        <vers num="4.0tr"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1652" seq="2008-1652" published="2008-04-02" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in the _serve_request_multiple function in lib/Perlbal/ClientHTTPBase.pm in Perlbal before 1.70, when concat get is enabled, allows remote attackers to read arbitrary files in a parent directory via a directory traversal sequence in an unspecified parameter.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://search.cpan.org/src/BRADFITZ/Perlbal-1.70/CHANGES">http://search.cpan.org/src/BRADFITZ/Perlbal-1.70/CHANGES</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1045/references">ADV-2008-1045</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41540">perlbal-serverequestmultiple-dir-traversal(41540)</ref>
    </refs>
    <vuln_soft>
      <prod name="perlbal" vendor="perlbal">
        <vers num="1.60" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1653" seq="2008-1653" published="2008-04-02" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in index.php in Sava's Link Manager 2.0 allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the q parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28537">28537</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41595">savaslinkmanager-index-file-include(41595)</ref>
    </refs>
    <vuln_soft>
      <prod name="savas_link_manager" vendor="savas_place">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1654" seq="2008-1654" published="2008-04-02" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Interaction error between Adobe Flash and multiple Universal Plug and Play (UPnP) services allow remote attackers to perform Cross-Site Request Forgery (CSRF) style attacks by using the Flash navigateToURL function to send a SOAP message to a UPnP control point, as demonstrated by changing the primary DNS server.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//May/msg00001.html">APPLE-SA-2008-05-28</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00006.html">SUSE-SA:2008:022</ref>
      <ref source="BUGTRAQ" url="http://seclists.org/bugtraq/2008/Jan/0182.html">20080113 Hacking The Interwebs</ref>
      <ref source="FULLDISC" url="http://seclists.org/fulldisclosure/2008/Jan/0204.html">20080113 Hacking The Interwebs</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-238305-1">238305</ref>
      <ref source="CONFIRM" url="http://www.adobe.com/support/security/bulletins/apsb08-11.html">http://www.adobe.com/support/security/bulletins/apsb08-11.html</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200804-21.xml">GLSA-200804-21</ref>
      <ref source="MISC" url="http://www.gnucitizen.org/blog/hacking-the-interwebs/">http://www.gnucitizen.org/blog/hacking-the-interwebs/</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/347812">VU#347812</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0221.html">RHSA-2008:0221</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28696">28696</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019807">1019807</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-100A.html">TA08-100A</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-150A.html">TA08-150A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1697">ADV-2008-1697</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1724/references">ADV-2008-1724</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41718">adobe-flash-navigatetourl-csrf(41718)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11435">oval:org.mitre.oval:def:11435</ref>
    </refs>
    <vuln_soft>
      <prod name="flash_player" vendor="adobe">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1655" seq="2008-1655" published="2008-04-09" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Adobe Flash Player 9.0.115.0 and earlier, and 8.0.39.0 and earlier, makes it easier for remote attackers to conduct DNS rebinding attacks via unknown vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//May/msg00001.html">APPLE-SA-2008-05-28</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00006.html">SUSE-SA:2008:022</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-238305-1">238305</ref>
      <ref source="MISC" url="http://www.adobe.com/devnet/flashplayer/articles/fplayer9_security.html#goal_dns">http://www.adobe.com/devnet/flashplayer/articles/fplayer9_security.html#goal_dns</ref>
      <ref source="CONFIRM" url="http://www.adobe.com/support/security/bulletins/apsb08-11.html">http://www.adobe.com/support/security/bulletins/apsb08-11.html</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200804-21.xml">GLSA-200804-21</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0221.html">RHSA-2008:0221</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28697">28697</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019808">1019808</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-100A.html">TA08-100A</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-150A.html">TA08-150A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1697">ADV-2008-1697</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1724/references">ADV-2008-1724</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41807">adobe-flash-dnsrebinding-security-bypass(41807)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10724">oval:org.mitre.oval:def:10724</ref>
    </refs>
    <vuln_soft>
      <prod name="air" vendor="adobe">
        <vers num="1.0"/>
      </prod>
      <prod name="flash_player" vendor="adobe">
        <vers num="9.0.115.0" prev="1"/>
      </prod>
      <prod name="flex" vendor="adobe">
        <vers num="3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1656" seq="2008-1656" published="2008-04-09" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Adobe ColdFusion 8 and 8.0.1 does not properly implement the public access level for CFC methods, which allows remote attackers to invoke these methods via Flex 2 remoting, a different vulnerability than CVE-2006-4725.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019806">1019806</ref>
      <ref source="CONFIRM" url="http://www.adobe.com/support/security/bulletins/apsb08-12.html" adv="1" patch="1">http://www.adobe.com/support/security/bulletins/apsb08-12.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28698">28698</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1157">ADV-2008-1157</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41720">adobe-coldfusion-cfc-security-bypass(41720)</ref>
    </refs>
    <vuln_soft>
      <prod name="coldfusion" vendor="adobe">
        <vers num="8.0"/>
        <vers num="8.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1657" seq="2008-1657" published="2008-04-02" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">OpenSSH 4.4 up to versions before 4.9 allows remote authenticated users to bypass the sshd_config ForceCommand directive by modifying the .ssh/rc session file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="NETBSD" url="ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-005.txt.asc">NetBSD-SA2008-005</ref>
      <ref source="CONFIRM" url="http://aix.software.ibm.com/aix/efixes/security/ssh_advisory.asc">http://aix.software.ibm.com/aix/efixes/security/ssh_advisory.asc</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html">APPLE-SA-2008-09-15</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00007.html">SUSE-SR:2008:009</ref>
      <ref source="CONFIRM" url="http://support.attachmate.com/techdocs/2374.html">http://support.attachmate.com/techdocs/2374.html</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0139">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0139</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200804-03.xml">GLSA-200804-03</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:098">MDVSA-2008:098</ref>
      <ref source="OPENBSD" url="http://www.openbsd.org/errata43.html#001_openssh" patch="1">[4.3] 001: SECURITY FIX: March 30, 2008</ref>
      <ref source="CONFIRM" url="http://www.openssh.com/txt/release-4.9" adv="1">http://www.openssh.com/txt/release-4.9</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490488/100/0/threaded">20080404 rPSA-2008-0139-1 gnome-ssh-askpass openssh openssh-client openssh-server</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28531" patch="1">28531</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019733">1019733</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-649-1">USN-649-1</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-260A.html">TA08-260A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1035/references" adv="1">ADV-2008-1035</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1624/references" adv="1">ADV-2008-1624</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2396" adv="1">ADV-2008-2396</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2584" adv="1">ADV-2008-2584</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41549">openssh-forcecommand-command-execution(41549)</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2419">https://issues.rpath.com/browse/RPL-2419</ref>
    </refs>
    <vuln_soft>
      <prod name="openssh" vendor="openbsd">
        <vers num="4.4"/>
        <vers num="4.4p1"/>
        <vers num="4.5"/>
        <vers num="4.6"/>
        <vers num="4.7"/>
        <vers num="4.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1658" seq="2008-1658" published="2008-04-11" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Format string vulnerability in the grant helper (polkit-grant-helper.c) in PolicyKit 0.7 and earlier allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via format strings in a password.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.freedesktop.org/show_bug.cgi?id=15295">http://bugs.freedesktop.org/show_bug.cgi?id=15295</ref>
      <ref source="CONFIRM" url="http://gitweb.freedesktop.org/?p=PolicyKit.git;a=commitdiff;h=5bc86a14cc0e356bcf8b5f861674f842869b1be7">http://gitweb.freedesktop.org/?p=PolicyKit.git;a=commitdiff;h=5bc86a14cc0e356bcf8b5f861674f842869b1be7</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:087">MDVSA-2008:087</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28702" patch="1">28702</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1254">ADV-2008-1254</ref>
      <ref source="CONFIRM" url="https://bugs.launchpad.net/ubuntu/+source/policykit/+bug/205037">https://bugs.launchpad.net/ubuntu/+source/policykit/+bug/205037</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41877">policykit-granthelper-format-string(41877)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00176.html">FEDORA-2008-2987</ref>
    </refs>
    <vuln_soft>
      <prod name="policykit" vendor="freedesktop">
        <vers num="0.6"/>
        <vers num="0.7" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1659" seq="2008-1659" published="2008-05-07" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in HP LDAP-UX vB.04.10 through vB.04.15 allows local users to gain privileges via unknown vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01447010">SSRT080053</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29078">29078</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019981">1019981</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1450/references">ADV-2008-1450</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42265">hpux-ldap-unspecified-privilege-escalation(42265)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6037">oval:org.mitre.oval:def:6037</ref>
    </refs>
    <vuln_soft>
      <prod name="ldap-ux" vendor="hp">
        <vers num="b.04.10"/>
        <vers num="b.04.11"/>
        <vers num="b.04.12"/>
        <vers num="b.04.13"/>
        <vers num="b.04.14"/>
        <vers num="b.04.15"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1660" seq="2008-1660" published="2008-05-21" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.3" CVSS_base_score="6.3" CVSS_impact_subscore="9.2" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:C/I:C/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in useradd on HP-UX B.11.11, B.11.23, and B.11.31 allows local users to access arbitrary files and directories via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=121130252706976&amp;w=2">SSRT071454</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020045" patch="1">1020045</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29286">29286</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1570">ADV-2008-1570</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42523">hpux-useradd-security-bypass(42523)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5558">oval:org.mitre.oval:def:5558</ref>
    </refs>
    <vuln_soft>
      <prod name="hp-ux" vendor="hp">
        <vers num="11.11"/>
        <vers num="11.23"/>
        <vers num="11.31"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1661" seq="2008-1661" published="2008-06-04" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in DoubleTake.exe in HP StorageWorks Storage Mirroring (SWSM) before 4.5 SP2 allows remote attackers to execute arbitrary code via a crafted encoded authentication request.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=121250518326713&amp;w=2">SSRT071428</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020157">1020157</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1723">ADV-2008-1723</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42810">hp-storageworks-unspecified-code-execution(42810)</ref>
    </refs>
    <vuln_soft>
      <prod name="storageworks_storage_mirroring" vendor="hp">
        <vers num="4.5" edition="sp1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1662" seq="2008-1662" published="2008-08-01" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the HP System Administration Manager (SAM) on HP-UX B.11.11 and B.11.23, when used to configure NFS, might allow remote attackers to read or modify arbitrary files, related to an "empty systems list."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01367453">SSRT071466</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020580">1020580</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30449">30449</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2258">ADV-2008-2258</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/44119">hp-hpux-sam-weak-security(44119)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5814">oval:org.mitre.oval:def:5814</ref>
    </refs>
    <vuln_soft>
      <prod name="system_administration_manager" vendor="hp">
        <vers num=""/>
      </prod>
      <prod name="hp-ux" vendor="hp">
        <vers num="b.11.11"/>
        <vers num="b.11.23"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1663" seq="2008-1663" published="2008-07-08" modified="2011-03-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in HP System Management Homepage (SMH) 2.1.10 and 2.1.11 on Linux and Windows allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=121492633526894&amp;w=2">HPSBMA02345</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3979">3979</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30029">30029</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020406">1020406</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1990/references">ADV-2008-1990</ref>
    </refs>
    <vuln_soft>
      <prod name="system_management_homepage" vendor="hp">
        <vers num="2.1.10"/>
        <vers num="2.1.11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1664" seq="2008-1664" published="2008-08-08" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in libc on HP HP-UX B.11.23 and B.11.31 allows remote attackers to cause a denial of service via unknown vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=121805712507842&amp;w=2">HPSBUX02355</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020637">1020637</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30581">30581</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2314">ADV-2008-2314</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/44247">hpux-libc-unspecified-dos(44247)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5855">oval:org.mitre.oval:def:5855</ref>
    </refs>
    <vuln_soft>
      <prod name="hp-ux" vendor="hp">
        <vers num="11.23"/>
        <vers num="11.31"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1665" seq="2008-1665" published="2008-07-17" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="9.0" CVSS_base_score="9.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple unspecified vulnerabilities in HP Select Identity (HPSI) Active Directory Bidirectional LDAP Connector 2.20, 2.20.001, 2.20.002, and 2.30 allow remote attackers to execute arbitrary code via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01502023">HPSBMA02346</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30250">30250</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020512">1020512</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2119/references">ADV-2008-2119</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43847">hpselect-adb-unspecified-unauth-access(43847)</ref>
    </refs>
    <vuln_soft>
      <prod name="hpsi_active_directory_bidirectional_ldap_connector" vendor="hp">
        <vers num="2.20"/>
        <vers num="2.20.001"/>
        <vers num="2.20.002"/>
        <vers num="2.30"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1666" seq="2008-1666" published="2008-07-17" modified="2011-03-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in HP Oracle for OpenView (OfO) 8.1.7, 9.1.01, 9.2, 9.2.0, 10g, and 10gR2 has unknown impact and attack vectors, possibly related to the July 2008 Oracle Critical Patch Update.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143">SSRT061201</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2115">ADV-2008-2115</ref>
    </refs>
    <vuln_soft>
      <prod name="oracle_for_openview" vendor="hp">
        <vers num="8.1.7"/>
        <vers num="9.1.01"/>
        <vers num="9.2"/>
        <vers num="9.2.0"/>
        <vers num="10g" edition="r2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1667" seq="2008-1667" published="2008-07-29" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">The Probe Builder Service (aka PBOVISServer.exe) in European Performance Systems (EPS) Probe Builder 2.2 before A.02.20.901, as used in HP OpenView Internet Services (OVIS) on Windows, allows remote attackers to kill arbitrary processes via a process ID number in an unspecified opcode.</descript>
      <descript source="nvd">Vendor website was under construction during the scoring of this vulnerability.  CPE information is not complete due to limited knowledge of Probe Builder version numbers.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=728">20080728 Hewlett-Packard OVIS Probe Builder Arbitrary Process Termination Vulnerability</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=121726629109585&amp;w=2">SSRT080066</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/4054">4054</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30403" patch="1">30403</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020568">1020568</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2227/references">ADV-2008-2227</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2228/references">ADV-2008-2228</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/44041">hp-ovis-pbovisserver-dos(44041)</ref>
    </refs>
    <vuln_soft>
      <prod name="probe_builder" vendor="eps">
        <vers num="2.2"/>
      </prod>
      <prod name="openview_internet_services" vendor="hp">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1668" seq="2008-1668" published="2008-08-13" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">ftpd.c in (1) wu-ftpd 2.4.2 and (2) ftpd in HP HP-UX B.11.11 assigns uid 0 to the FTP client in certain operating-system misconfigurations in which PAM authentication can succeed even though no passwd entry is available for a user, which allows remote attackers to gain privileges, as demonstrated by a login attempt for an LDAP account when nsswitch.conf does not specify LDAP for passwd information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01525562">HPSBUX02356</ref>
      <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/08/20/4">[oss-security] 20080820 FW: CVE-2008-1668 - ftpd 2.4 - unauthorized root access - patch details</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30666">30666</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020682">1020682</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2364" adv="1">ADV-2008-2364</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/44414">hpux-ftpd-security-bypass(44414)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5971">oval:org.mitre.oval:def:5971</ref>
    </refs>
    <vuln_soft>
      <prod name="hp-ux" vendor="hp">
        <vers num="11.11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1669" seq="2008-1669" published="2008-05-07" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="6.9" CVSS_base_score="6.9" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Linux kernel before 2.6.25.2 does not apply a certain protection mechanism for fcntl functionality, which allows local users to (1) execute code in parallel or (2) exploit a race condition to obtain "re-ordered access to the descriptor table."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html">SUSE-SA:2008:030</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00002.html">SUSE-SA:2008:032</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00007.html">SUSE-SA:2008:035</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00012.html">SUSE-SA:2008:038</ref>
      <ref source="MLIST" url="http://lists.vmware.com/pipermail/security-announce/2008/000023.html">[Security-announce] 20080728 VMSA-2008-00011 Updated ESX service console packages for Samba and vmnix</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0162">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0162</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1575">DSA-1575</ref>
      <ref source="CONFIRM" url="http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.36.4">http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.36.4</ref>
      <ref source="CONFIRM" url="http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.2">http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.2</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:104">MDVSA-2008:104</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:105">MDVSA-2008:105</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:167">MDVSA-2008:167</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0211.html">RHSA-2008:0211</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0233.html">RHSA-2008:0233</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0237.html">RHSA-2008:0237</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491740/100/0/threaded">20080507 rPSA-2008-0162-1 kernel</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29076" patch="1">29076</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019974">1019974</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-618-1">USN-618-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1451/references">ADV-2008-1451</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1452/references">ADV-2008-1452</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2222/references">ADV-2008-2222</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42242">linux-kernel-fcntlsetlk-dos(42242)</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2518">https://issues.rpath.com/browse/RPL-2518</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10065">oval:org.mitre.oval:def:10065</ref>
      <ref source="UBUNTU" url="https://usn.ubuntu.com/614-1/">USN-614-1</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00232.html">FEDORA-2008-3873</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00294.html">FEDORA-2008-3949</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00357.html">FEDORA-2008-4043</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.6.0" edition="test1"/>
        <vers num="2.6.0" edition="test10"/>
        <vers num="2.6.0" edition="test11"/>
        <vers num="2.6.0" edition="test2"/>
        <vers num="2.6.0" edition="test3"/>
        <vers num="2.6.0" edition="test4"/>
        <vers num="2.6.0" edition="test5"/>
        <vers num="2.6.0" edition="test6"/>
        <vers num="2.6.0" edition="test7"/>
        <vers num="2.6.0" edition="test8"/>
        <vers num="2.6.0" edition="test9"/>
        <vers num="2.6.1" edition="rc1"/>
        <vers num="2.6.1" edition="rc2"/>
        <vers num="2.6.1" edition="rc3"/>
        <vers num="2.6.2" edition="rc1"/>
        <vers num="2.6.2" edition="rc2"/>
        <vers num="2.6.2" edition="rc3"/>
        <vers num="2.6.3" edition="rc1"/>
        <vers num="2.6.3" edition="rc2"/>
        <vers num="2.6.3" edition="rc3"/>
        <vers num="2.6.3" edition="rc4"/>
        <vers num="2.6.4" edition="rc1"/>
        <vers num="2.6.4" edition="rc2"/>
        <vers num="2.6.4" edition="rc3"/>
        <vers num="2.6.5" edition="rc1"/>
        <vers num="2.6.5" edition="rc2"/>
        <vers num="2.6.5" edition="rc3"/>
        <vers num="2.6.6" edition="rc1"/>
        <vers num="2.6.6" edition="rc2"/>
        <vers num="2.6.6" edition="rc3"/>
        <vers num="2.6.7" edition="rc1"/>
        <vers num="2.6.7" edition="rc2"/>
        <vers num="2.6.7" edition="rc3"/>
        <vers num="2.6.8" edition="rc1"/>
        <vers num="2.6.8" edition="rc2"/>
        <vers num="2.6.8" edition="rc3"/>
        <vers num="2.6.8" edition="rc4"/>
        <vers num="2.6.8.1"/>
        <vers num="2.6.8.1.5"/>
        <vers num="2.6.9" edition="rc1"/>
        <vers num="2.6.9" edition="rc2"/>
        <vers num="2.6.9" edition="rc3"/>
        <vers num="2.6.9" edition="rc4"/>
        <vers num="2.6.10" edition="rc1"/>
        <vers num="2.6.10" edition="rc2"/>
        <vers num="2.6.10" edition="rc3"/>
        <vers num="2.6.11" edition="rc1"/>
        <vers num="2.6.11" edition="rc2"/>
        <vers num="2.6.11" edition="rc3"/>
        <vers num="2.6.11" edition="rc4"/>
        <vers num="2.6.11" edition="rc5"/>
        <vers num="2.6.11.1"/>
        <vers num="2.6.11.2"/>
        <vers num="2.6.11.3"/>
        <vers num="2.6.11.4"/>
        <vers num="2.6.11.5"/>
        <vers num="2.6.11.6"/>
        <vers num="2.6.11.7"/>
        <vers num="2.6.11.8"/>
        <vers num="2.6.11.9"/>
        <vers num="2.6.11.10"/>
        <vers num="2.6.11.11"/>
        <vers num="2.6.11.12"/>
        <vers num="2.6.11_rc1_bk6"/>
        <vers num="2.6.12" edition="rc1"/>
        <vers num="2.6.12" edition="rc2"/>
        <vers num="2.6.12" edition="rc3"/>
        <vers num="2.6.12" edition="rc4"/>
        <vers num="2.6.12" edition="rc5"/>
        <vers num="2.6.12" edition="rc6"/>
        <vers num="2.6.12.1"/>
        <vers num="2.6.12.2"/>
        <vers num="2.6.12.3"/>
        <vers num="2.6.12.4"/>
        <vers num="2.6.12.5"/>
        <vers num="2.6.12.6"/>
        <vers num="2.6.12.12"/>
        <vers num="2.6.12.22"/>
        <vers num="2.6.13" edition="rc1"/>
        <vers num="2.6.13" edition="rc2"/>
        <vers num="2.6.13" edition="rc3"/>
        <vers num="2.6.13" edition="rc4"/>
        <vers num="2.6.13" edition="rc5"/>
        <vers num="2.6.13" edition="rc6"/>
        <vers num="2.6.13" edition="rc7"/>
        <vers num="2.6.13.1"/>
        <vers num="2.6.13.2"/>
        <vers num="2.6.13.3"/>
        <vers num="2.6.13.4"/>
        <vers num="2.6.13.5"/>
        <vers num="2.6.14" edition="rc1"/>
        <vers num="2.6.14" edition="rc2"/>
        <vers num="2.6.14" edition="rc3"/>
        <vers num="2.6.14" edition="rc4"/>
        <vers num="2.6.14" edition="rc5"/>
        <vers num="2.6.14.1"/>
        <vers num="2.6.14.2"/>
        <vers num="2.6.14.3"/>
        <vers num="2.6.14.4"/>
        <vers num="2.6.14.5"/>
        <vers num="2.6.14.6"/>
        <vers num="2.6.14.7"/>
        <vers num="2.6.15" edition="rc1"/>
        <vers num="2.6.15" edition="rc2"/>
        <vers num="2.6.15" edition="rc3"/>
        <vers num="2.6.15" edition="rc4"/>
        <vers num="2.6.15" edition="rc5"/>
        <vers num="2.6.15" edition="rc6"/>
        <vers num="2.6.15" edition="rc7"/>
        <vers num="2.6.15.1"/>
        <vers num="2.6.15.2"/>
        <vers num="2.6.15.3"/>
        <vers num="2.6.15.4"/>
        <vers num="2.6.15.5"/>
        <vers num="2.6.15.6"/>
        <vers num="2.6.15.7"/>
        <vers num="2.6.15.11"/>
        <vers num="2.6.16" edition="rc1"/>
        <vers num="2.6.16" edition="rc2"/>
        <vers num="2.6.16" edition="rc3"/>
        <vers num="2.6.16" edition="rc4"/>
        <vers num="2.6.16" edition="rc5"/>
        <vers num="2.6.16" edition="rc6"/>
        <vers num="2.6.16.1"/>
        <vers num="2.6.16.2"/>
        <vers num="2.6.16.3"/>
        <vers num="2.6.16.4"/>
        <vers num="2.6.16.5"/>
        <vers num="2.6.16.6"/>
        <vers num="2.6.16.7"/>
        <vers num="2.6.16.8"/>
        <vers num="2.6.16.9"/>
        <vers num="2.6.16.10"/>
        <vers num="2.6.16.11"/>
        <vers num="2.6.16.12"/>
        <vers num="2.6.16.13"/>
        <vers num="2.6.16.14"/>
        <vers num="2.6.16.15"/>
        <vers num="2.6.16.16"/>
        <vers num="2.6.16.17"/>
        <vers num="2.6.16.18"/>
        <vers num="2.6.16.19"/>
        <vers num="2.6.16.20"/>
        <vers num="2.6.16.21"/>
        <vers num="2.6.16.22"/>
        <vers num="2.6.16.23"/>
        <vers num="2.6.16.24"/>
        <vers num="2.6.16.25"/>
        <vers num="2.6.16.26"/>
        <vers num="2.6.16.27"/>
        <vers num="2.6.16.28"/>
        <vers num="2.6.16.29"/>
        <vers num="2.6.16.30"/>
        <vers num="2.6.16.31"/>
        <vers num="2.6.16.32"/>
        <vers num="2.6.16.33"/>
        <vers num="2.6.16.34"/>
        <vers num="2.6.16.35"/>
        <vers num="2.6.16.36"/>
        <vers num="2.6.16.37"/>
        <vers num="2.6.16.38"/>
        <vers num="2.6.16.39"/>
        <vers num="2.6.16.40"/>
        <vers num="2.6.16.41"/>
        <vers num="2.6.16.43"/>
        <vers num="2.6.16.44"/>
        <vers num="2.6.16.45"/>
        <vers num="2.6.16.46"/>
        <vers num="2.6.16.47"/>
        <vers num="2.6.16.48"/>
        <vers num="2.6.16.49"/>
        <vers num="2.6.16.50"/>
        <vers num="2.6.16.51"/>
        <vers num="2.6.16.52"/>
        <vers num="2.6.16.53"/>
        <vers num="2.6.16_rc7"/>
        <vers num="2.6.17" edition="rc1"/>
        <vers num="2.6.17" edition="rc2"/>
        <vers num="2.6.17" edition="rc3"/>
        <vers num="2.6.17" edition="rc4"/>
        <vers num="2.6.17" edition="rc5"/>
        <vers num="2.6.17" edition="rc6"/>
        <vers num="2.6.17.1"/>
        <vers num="2.6.17.2"/>
        <vers num="2.6.17.3"/>
        <vers num="2.6.17.4"/>
        <vers num="2.6.17.5"/>
        <vers num="2.6.17.6"/>
        <vers num="2.6.17.7"/>
        <vers num="2.6.17.8"/>
        <vers num="2.6.17.9"/>
        <vers num="2.6.17.10"/>
        <vers num="2.6.17.11"/>
        <vers num="2.6.17.12"/>
        <vers num="2.6.17.13"/>
        <vers num="2.6.17.14"/>
        <vers num="2.6.18" edition="rc1"/>
        <vers num="2.6.18" edition="rc2"/>
        <vers num="2.6.18" edition="rc3"/>
        <vers num="2.6.18" edition="rc4"/>
        <vers num="2.6.18" edition="rc5"/>
        <vers num="2.6.18" edition="rc6"/>
        <vers num="2.6.18" edition="rc7"/>
        <vers num="2.6.18.1"/>
        <vers num="2.6.18.2"/>
        <vers num="2.6.18.3"/>
        <vers num="2.6.18.4"/>
        <vers num="2.6.18.5"/>
        <vers num="2.6.18.6"/>
        <vers num="2.6.18.7"/>
        <vers num="2.6.18.8"/>
        <vers num="2.6.19" edition="rc1"/>
        <vers num="2.6.19" edition="rc2"/>
        <vers num="2.6.19" edition="rc3"/>
        <vers num="2.6.19" edition="rc4"/>
        <vers num="2.6.19.1"/>
        <vers num="2.6.19.2"/>
        <vers num="2.6.19.3"/>
        <vers num="2.6.20" edition="rc2"/>
        <vers num="2.6.20.1"/>
        <vers num="2.6.20.2"/>
        <vers num="2.6.20.3"/>
        <vers num="2.6.20.4"/>
        <vers num="2.6.20.5"/>
        <vers num="2.6.20.6"/>
        <vers num="2.6.20.7"/>
        <vers num="2.6.20.8"/>
        <vers num="2.6.20.9"/>
        <vers num="2.6.20.10"/>
        <vers num="2.6.20.11"/>
        <vers num="2.6.20.12"/>
        <vers num="2.6.20.13"/>
        <vers num="2.6.20.14"/>
        <vers num="2.6.20.15"/>
        <vers num="2.6.21" edition="git1"/>
        <vers num="2.6.21" edition="git2"/>
        <vers num="2.6.21" edition="git3"/>
        <vers num="2.6.21" edition="git4"/>
        <vers num="2.6.21" edition="git5"/>
        <vers num="2.6.21" edition="git6"/>
        <vers num="2.6.21" edition="git7"/>
        <vers num="2.6.21" edition="rc3"/>
        <vers num="2.6.21" edition="rc4"/>
        <vers num="2.6.21" edition="rc5"/>
        <vers num="2.6.21" edition="rc6"/>
        <vers num="2.6.21" edition="rc7"/>
        <vers num="2.6.21.1"/>
        <vers num="2.6.21.2"/>
        <vers num="2.6.21.3"/>
        <vers num="2.6.21.4"/>
        <vers num="2.6.22" edition="rc6"/>
        <vers num="2.6.22.1"/>
        <vers num="2.6.22.3"/>
        <vers num="2.6.22.4"/>
        <vers num="2.6.22.5"/>
        <vers num="2.6.22.6"/>
        <vers num="2.6.22.7"/>
        <vers num="2.6.22.16"/>
        <vers num="2.6.23" edition="rc1"/>
        <vers num="2.6.23" edition="rc2"/>
        <vers num="2.6.23.1"/>
        <vers num="2.6.23.2"/>
        <vers num="2.6.23.3"/>
        <vers num="2.6.23.4"/>
        <vers num="2.6.23.5"/>
        <vers num="2.6.23.6"/>
        <vers num="2.6.23.7"/>
        <vers num="2.6.23.9"/>
        <vers num="2.6.23.14"/>
        <vers num="2.6.24" edition="rc2"/>
        <vers num="2.6.24" edition="rc3"/>
        <vers num="2.6.24.1"/>
        <vers num="2.6.24.2"/>
        <vers num="2.6.24.3"/>
        <vers num="2.6.24.4"/>
        <vers num="2.6.24.5"/>
        <vers num="2.6.25"/>
        <vers num="2.6.25.1"/>
        <vers num="2.6_test9_cvs"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1670" seq="2008-1670" published="2008-04-28" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in the progressive PNG Image loader (decoders/pngloader.cpp) in KHTML in KDE 4.0.x up to 4.0.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted image.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html">SUSE-SR:2008:011</ref>
      <ref source="CONFIRM" url="http://www.kde.org/info/security/advisory-20080426-1.txt">http://www.kde.org/info/security/advisory-20080426-1.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28937" patch="1">28937</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019929">1019929</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1371/references">ADV-2008-1371</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42038">kde-khtml-png-bo(42038)</ref>
    </refs>
    <vuln_soft>
      <prod name="kde" vendor="kde">
        <vers num="4.0.0"/>
        <vers num="4.0.1"/>
        <vers num="4.0.2"/>
        <vers num="4.0.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1671" seq="2008-1671" published="2008-04-28" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">start_kdeinit in KDE 3.5.5 through 3.5.9, when installed setuid root, allows local users to cause a denial of service and possibly execute arbitrary code via "user-influenceable input" (probably command-line arguments) that cause start_kdeinit to send SIGUSR1 signals to other processes.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="ftp://ftp.kde.org/pub/kde/security_patches/post-kde-3.5.5-kinit.diff">ftp://ftp.kde.org/pub/kde/security_patches/post-kde-3.5.5-kinit.diff</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html">SUSE-SR:2008:011</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200804-30.xml">GLSA-200804-30</ref>
      <ref source="CONFIRM" url="http://www.kde.org/info/security/advisory-20080426-2.txt">http://www.kde.org/info/security/advisory-20080426-2.txt</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:097">MDVSA-2008:097</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28938">28938</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019924">1019924</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-608-1">USN-608-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1370/references">ADV-2008-1370</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42039">kde-startkdeinit-privilege-escalation(42039)</ref>
    </refs>
    <vuln_soft>
      <prod name="kde" vendor="kde">
        <vers num="3.5.5"/>
        <vers num="3.5.6"/>
        <vers num="3.5.7"/>
        <vers num="3.5.8"/>
        <vers num="3.5.9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1672" seq="2008-1672" published="2008-05-29" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">OpenSSL 0.9.8f and 0.9.8g allows remote attackers to cause a denial of service (crash) via a TLS handshake that omits the Server Key Exchange message and uses "particular cipher suites," which triggers a NULL pointer dereference.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://cert.fi/haavoittuvuudet/2008/advisory-openssl.html">http://cert.fi/haavoittuvuudet/2008/advisory-openssl.html</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200806-08.xml">GLSA-200806-08</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.562004">SSA:2008-210-08</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=615606">http://sourceforge.net/project/shownotes.php?release_id=615606</ref>
      <ref source="MISC" url="http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&amp;id=738400">http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&amp;id=738400</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/520586">VU#520586</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:107">MDVSA-2008:107</ref>
      <ref source="CONFIRM" url="http://www.openssl.org/news/secadv_20080528.txt">http://www.openssl.org/news/secadv_20080528.txt</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492932/100/0/threaded">20080602 rPSA-2008-0181-1 openssl openssl-scripts</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29405" patch="1">29405</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020122">1020122</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-620-1">USN-620-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1680">ADV-2008-1680</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1937/references">ADV-2008-1937</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42667">openssl-serverkey-dos(42667)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg01029.html">FEDORA-2008-4723</ref>
    </refs>
    <vuln_soft>
      <prod name="openssl" vendor="openssl_project">
        <vers num="0.9.8f"/>
        <vers num="0.9.8g"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1673" seq="2008-1673" published="2008-06-09" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The asn1 implementation in (a) the Linux kernel 2.4 before 2.4.36.6 and 2.6 before 2.6.25.5, as used in the cifs and ip_nat_snmp_basic modules; and (b) the gxsnmp package; does not properly validate length values during decoding of ASN.1 BER data, which allows remote attackers to cause a denial of service (crash) or execute arbitrary code via (1) a length greater than the working buffer, which can lead to an unspecified overflow; (2) an oid length of zero, which can lead to an off-by-one error; or (3) an indefinite length for a primitive encoding.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git;a=commit;h=33afb8403f361919aa5c8fe1d0a4f5ddbfbbea3c">http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git;a=commit;h=33afb8403f361919aa5c8fe1d0a4f5ddbfbbea3c</ref>
      <ref source="CONFIRM" url="http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ddb2c43594f22843e9f3153da151deaba1a834c5">http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ddb2c43594f22843e9f3153da151deaba1a834c5</ref>
      <ref source="CONFIRM" url="http://kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.36.6">http://kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.36.6</ref>
      <ref source="CONFIRM" url="http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.5">http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.5</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00007.html">SUSE-SA:2008:035</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00012.html">SUSE-SA:2008:038</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00000.html">SUSE-SA:2008:047</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00001.html">SUSE-SA:2008:048</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00003.html">SUSE-SA:2008:049</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.html">SUSE-SA:2008:052</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html">SUSE-SR:2008:025</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0189">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0189</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:113">MDVSA-2008:113</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:174">MDVSA-2008:174</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493300/100/0/threaded">20080611 rPSA-2008-0189-1 kernel xen</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29589" patch="1">29589</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020210">1020210</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-625-1">USN-625-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1770">ADV-2008-1770</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=443962">https://bugzilla.redhat.com/show_bug.cgi?id=443962</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42921">linux-kernel-ber-decoder-bo(42921)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00587.html">FEDORA-2008-5308</ref>
    </refs>
    <vuln_soft>
      <prod name="debian_linux" vendor="debian">
        <vers num="4.0" edition=":alpha"/>
        <vers num="4.0" edition=":amd64"/>
        <vers num="4.0" edition=":arm"/>
        <vers num="4.0" edition=":hppa"/>
        <vers num="4.0" edition=":ia-32"/>
        <vers num="4.0" edition=":ia-64"/>
        <vers num="4.0" edition=":m68k"/>
        <vers num="4.0" edition=":mips"/>
        <vers num="4.0" edition=":mipsel"/>
        <vers num="4.0" edition=":powerpc"/>
        <vers num="4.0" edition=":s-390"/>
        <vers num="4.0" edition=":sparc"/>
      </prod>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.4.0" edition="test1"/>
        <vers num="2.4.0" edition="test10"/>
        <vers num="2.4.0" edition="test11"/>
        <vers num="2.4.0" edition="test12"/>
        <vers num="2.4.0" edition="test2"/>
        <vers num="2.4.0" edition="test3"/>
        <vers num="2.4.0" edition="test4"/>
        <vers num="2.4.0" edition="test5"/>
        <vers num="2.4.0" edition="test6"/>
        <vers num="2.4.0" edition="test7"/>
        <vers num="2.4.0" edition="test8"/>
        <vers num="2.4.0" edition="test9"/>
        <vers num="2.4.1"/>
        <vers num="2.4.2"/>
        <vers num="2.4.3"/>
        <vers num="2.4.4"/>
        <vers num="2.4.5"/>
        <vers num="2.4.6"/>
        <vers num="2.4.7"/>
        <vers num="2.4.8"/>
        <vers num="2.4.9"/>
        <vers num="2.4.10"/>
        <vers num="2.4.11"/>
        <vers num="2.4.12"/>
        <vers num="2.4.13"/>
        <vers num="2.4.14"/>
        <vers num="2.4.15"/>
        <vers num="2.4.16"/>
        <vers num="2.4.17"/>
        <vers num="2.4.18" edition="pre1"/>
        <vers num="2.4.18" edition="pre2"/>
        <vers num="2.4.18" edition="pre3"/>
        <vers num="2.4.18" edition="pre4"/>
        <vers num="2.4.18" edition="pre5"/>
        <vers num="2.4.18" edition="pre6"/>
        <vers num="2.4.18" edition="pre7"/>
        <vers num="2.4.18" edition="pre8"/>
        <vers num="2.4.19" edition="pre1"/>
        <vers num="2.4.19" edition="pre2"/>
        <vers num="2.4.19" edition="pre3"/>
        <vers num="2.4.19" edition="pre4"/>
        <vers num="2.4.19" edition="pre5"/>
        <vers num="2.4.19" edition="pre6"/>
        <vers num="2.4.20"/>
        <vers num="2.4.21" edition="pre1"/>
        <vers num="2.4.21" edition="pre4"/>
        <vers num="2.4.21" edition="pre7"/>
        <vers num="2.4.22"/>
        <vers num="2.4.23" edition="pre9"/>
        <vers num="2.4.23_ow2"/>
        <vers num="2.4.24"/>
        <vers num="2.4.24_ow1"/>
        <vers num="2.4.25"/>
        <vers num="2.4.26"/>
        <vers num="2.4.27" edition="pre1"/>
        <vers num="2.4.27" edition="pre2"/>
        <vers num="2.4.27" edition="pre3"/>
        <vers num="2.4.27" edition="pre4"/>
        <vers num="2.4.27" edition="pre5"/>
        <vers num="2.4.28"/>
        <vers num="2.4.29" edition="rc1"/>
        <vers num="2.4.29" edition="rc2"/>
        <vers num="2.4.30" edition="rc2"/>
        <vers num="2.4.30" edition="rc3"/>
        <vers num="2.4.31" edition="pre1"/>
        <vers num="2.4.32" edition="pre1"/>
        <vers num="2.4.32" edition="pre2"/>
        <vers num="2.4.33" edition="pre1"/>
        <vers num="2.4.33.2"/>
        <vers num="2.4.33.3"/>
        <vers num="2.4.33.4"/>
        <vers num="2.4.33.5"/>
        <vers num="2.4.34"/>
        <vers num="2.4.35"/>
        <vers num="2.4.36"/>
        <vers num="2.4.36.1"/>
        <vers num="2.4.36.2"/>
        <vers num="2.4.36.3"/>
        <vers num="2.4.36.4"/>
        <vers num="2.4.36.5"/>
        <vers num="2.6.0" edition="test1"/>
        <vers num="2.6.0" edition="test2"/>
        <vers num="2.6.0" edition="test3"/>
        <vers num="2.6.0" edition="test4"/>
        <vers num="2.6.0" edition="test5"/>
        <vers num="2.6.0" edition="test6"/>
        <vers num="2.6.0" edition="test7"/>
        <vers num="2.6.0" edition="test8"/>
        <vers num="2.6.0" edition="test9"/>
        <vers num="2.6.1" edition="rc1"/>
        <vers num="2.6.1" edition="rc2"/>
        <vers num="2.6.2"/>
        <vers num="2.6.10" edition="rc2"/>
        <vers num="2.6.11" edition="rc2"/>
        <vers num="2.6.11" edition="rc3"/>
        <vers num="2.6.11" edition="rc4"/>
        <vers num="2.6.11.4"/>
        <vers num="2.6.11.5"/>
        <vers num="2.6.11.6"/>
        <vers num="2.6.11.7"/>
        <vers num="2.6.11.8"/>
        <vers num="2.6.11.11"/>
        <vers num="2.6.11.12"/>
        <vers num="2.6.12" edition="rc1"/>
        <vers num="2.6.12" edition="rc4"/>
        <vers num="2.6.12" edition="rc5"/>
        <vers num="2.6.12.1"/>
        <vers num="2.6.12.2"/>
        <vers num="2.6.12.3"/>
        <vers num="2.6.12.4"/>
        <vers num="2.6.12.5"/>
        <vers num="2.6.12.6"/>
        <vers num="2.6.12.12"/>
        <vers num="2.6.12.22"/>
        <vers num="2.6.13" edition="rc1"/>
        <vers num="2.6.13" edition="rc4"/>
        <vers num="2.6.13" edition="rc6"/>
        <vers num="2.6.13" edition="rc7"/>
        <vers num="2.6.13.1"/>
        <vers num="2.6.13.2"/>
        <vers num="2.6.13.3"/>
        <vers num="2.6.13.4"/>
        <vers num="2.6.14" edition="rc1"/>
        <vers num="2.6.14" edition="rc2"/>
        <vers num="2.6.14" edition="rc3"/>
        <vers num="2.6.14" edition="rc4"/>
        <vers num="2.6.14.1"/>
        <vers num="2.6.14.2"/>
        <vers num="2.6.14.3"/>
        <vers num="2.6.14.4"/>
        <vers num="2.6.14.5"/>
        <vers num="2.6.15" edition="rc1"/>
        <vers num="2.6.15" edition="rc2"/>
        <vers num="2.6.15" edition="rc3"/>
        <vers num="2.6.15.1"/>
        <vers num="2.6.15.2"/>
        <vers num="2.6.15.3"/>
        <vers num="2.6.15.4"/>
        <vers num="2.6.15.5"/>
        <vers num="2.6.15.11"/>
        <vers num="2.6.16" edition="rc1"/>
        <vers num="2.6.16.1"/>
        <vers num="2.6.16.7"/>
        <vers num="2.6.16.9"/>
        <vers num="2.6.16.11"/>
        <vers num="2.6.16.12"/>
        <vers num="2.6.16.13"/>
        <vers num="2.6.16.19"/>
        <vers num="2.6.16.23"/>
        <vers num="2.6.16.27"/>
        <vers num="2.6.17" edition="rc5"/>
        <vers num="2.6.17.1"/>
        <vers num="2.6.17.2"/>
        <vers num="2.6.17.3"/>
        <vers num="2.6.17.5"/>
        <vers num="2.6.17.6"/>
        <vers num="2.6.17.7"/>
        <vers num="2.6.17.8"/>
        <vers num="2.6.17.10"/>
        <vers num="2.6.17.11"/>
        <vers num="2.6.17.12"/>
        <vers num="2.6.17.13"/>
        <vers num="2.6.17.14"/>
        <vers num="2.6.18"/>
        <vers num="2.6.18.1"/>
        <vers num="2.6.18.3"/>
        <vers num="2.6.18.4"/>
        <vers num="2.6.19" edition="rc1"/>
        <vers num="2.6.19" edition="rc2"/>
        <vers num="2.6.19" edition="rc3"/>
        <vers num="2.6.19" edition="rc4"/>
        <vers num="2.6.19.1"/>
        <vers num="2.6.19.2"/>
        <vers num="2.6.20" edition="rc2"/>
        <vers num="2.6.20.1"/>
        <vers num="2.6.20.2"/>
        <vers num="2.6.20.3"/>
        <vers num="2.6.20.4"/>
        <vers num="2.6.20.5"/>
        <vers num="2.6.20.8"/>
        <vers num="2.6.20.9"/>
        <vers num="2.6.20.11"/>
        <vers num="2.6.20.13"/>
        <vers num="2.6.20.15"/>
        <vers num="2.6.21" edition="rc3"/>
        <vers num="2.6.21" edition="rc4"/>
        <vers num="2.6.21" edition="rc5"/>
        <vers num="2.6.21" edition="rc6"/>
        <vers num="2.6.21.1"/>
        <vers num="2.6.21.2"/>
        <vers num="2.6.21.6"/>
        <vers num="2.6.21.7"/>
        <vers num="2.6.22"/>
        <vers num="2.6.22.1"/>
        <vers num="2.6.22.3"/>
        <vers num="2.6.22.4"/>
        <vers num="2.6.22.5"/>
        <vers num="2.6.22.6"/>
        <vers num="2.6.22.7"/>
        <vers num="2.6.22.8"/>
        <vers num="2.6.22.11"/>
        <vers num="2.6.22.12"/>
        <vers num="2.6.22.13"/>
        <vers num="2.6.22.14"/>
        <vers num="2.6.22.15"/>
        <vers num="2.6.22.16"/>
        <vers num="2.6.22.17"/>
        <vers num="2.6.22_rc1"/>
        <vers num="2.6.22_rc7"/>
        <vers num="2.6.23" edition="rc1"/>
        <vers num="2.6.23" edition="rc2"/>
        <vers num="2.6.23.1"/>
        <vers num="2.6.23.2"/>
        <vers num="2.6.23.3"/>
        <vers num="2.6.23.4"/>
        <vers num="2.6.23.5"/>
        <vers num="2.6.23.6"/>
        <vers num="2.6.23.7"/>
        <vers num="2.6.23.9"/>
        <vers num="2.6.23.10"/>
        <vers num="2.6.23.14"/>
        <vers num="2.6.24" edition="rc2"/>
        <vers num="2.6.24" edition="rc3"/>
        <vers num="2.6.24.1"/>
        <vers num="2.6.24.2"/>
        <vers num="2.6.24.6"/>
        <vers num="2.6.24_rc1"/>
        <vers num="2.6.25"/>
        <vers num="2.6.25.1"/>
        <vers num="2.6.25.2"/>
        <vers num="2.6.25.3"/>
        <vers num="2.6.25.4"/>
        <vers num="2.6_test9_cvs"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1674" seq="2008-1674" published="2009-03-26" modified="2009-03-26" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was withdrawn by its CNA.  Further investigation showed that it was not a security issue.  Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2008-1675" seq="2008-1675" published="2008-05-02" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The bdx_ioctl_priv function in the tehuti driver (tehuti.c) in Linux kernel 2.6.x before 2.6.25.1 does not properly check certain information related to register size, which has unspecified impact and local attack vectors, probably related to reading or writing kernel memory.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MLIST" url="http://marc.info/?l=linux-kernel&amp;m=120949204519706&amp;w=2">[linux-kernel] 20080429 [26/37] tehuti: check register size (CVE-2008-1675)</ref>
      <ref source="MLIST" url="http://marc.info/?l=linux-kernel&amp;m=120949204619718&amp;w=2">[linux-kernel] 20080429 [27/37] tehuti: move ioctl perm check closer to function start</ref>
      <ref source="MLIST" url="http://marc.info/?l=linux-kernel&amp;m=120949582428998&amp;w=2">[linux-kernel] 20080429 [04/12] tehuti: check register size (CVE-2008-1675)</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0157">http://wiki.rpath.com/Advisories:rPSA-2008-0157</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0157">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0157</ref>
      <ref source="CONFIRM" url="http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.1">http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.1</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:109">MDVSA-2008:109</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:167">MDVSA-2008:167</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491566/100/0/threaded">20080502 rPSA-2008-0157-1 kernel</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491732/100/0/threaded">20080507 rPSA-2008-0157-1 kernel</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29014">29014</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019960">1019960</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1406/references" adv="1">ADV-2008-1406</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42132">linux-kernel-tehuti-bo(42132)</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2501">https://issues.rpath.com/browse/RPL-2501</ref>
      <ref source="UBUNTU" url="https://usn.ubuntu.com/614-1/">USN-614-1</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00232.html">FEDORA-2008-3873</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.6.0"/>
        <vers num="2.6.1"/>
        <vers num="2.6.2"/>
        <vers num="2.6.10"/>
        <vers num="2.6.11"/>
        <vers num="2.6.11.1"/>
        <vers num="2.6.11.2"/>
        <vers num="2.6.11.3"/>
        <vers num="2.6.11.4"/>
        <vers num="2.6.11.5"/>
        <vers num="2.6.11.6"/>
        <vers num="2.6.11.7"/>
        <vers num="2.6.11.8"/>
        <vers num="2.6.11.9"/>
        <vers num="2.6.11.10"/>
        <vers num="2.6.11.11"/>
        <vers num="2.6.11.12"/>
        <vers num="2.6.12"/>
        <vers num="2.6.12.1"/>
        <vers num="2.6.12.2"/>
        <vers num="2.6.12.3"/>
        <vers num="2.6.12.4"/>
        <vers num="2.6.12.5"/>
        <vers num="2.6.12.6"/>
        <vers num="2.6.13"/>
        <vers num="2.6.13.1"/>
        <vers num="2.6.13.2"/>
        <vers num="2.6.13.3"/>
        <vers num="2.6.13.4"/>
        <vers num="2.6.13.5"/>
        <vers num="2.6.14"/>
        <vers num="2.6.14.1"/>
        <vers num="2.6.14.2"/>
        <vers num="2.6.14.3"/>
        <vers num="2.6.14.4"/>
        <vers num="2.6.14.5"/>
        <vers num="2.6.14.6"/>
        <vers num="2.6.14.7"/>
        <vers num="2.6.15"/>
        <vers num="2.6.15.1"/>
        <vers num="2.6.15.2"/>
        <vers num="2.6.15.3"/>
        <vers num="2.6.15.4"/>
        <vers num="2.6.15.5"/>
        <vers num="2.6.15.6"/>
        <vers num="2.6.15.7"/>
        <vers num="2.6.16"/>
        <vers num="2.6.16.1"/>
        <vers num="2.6.16.2"/>
        <vers num="2.6.16.3"/>
        <vers num="2.6.16.4"/>
        <vers num="2.6.16.5"/>
        <vers num="2.6.16.6"/>
        <vers num="2.6.16.7"/>
        <vers num="2.6.16.8"/>
        <vers num="2.6.16.9"/>
        <vers num="2.6.16.10"/>
        <vers num="2.6.16.11"/>
        <vers num="2.6.16.12"/>
        <vers num="2.6.16.13"/>
        <vers num="2.6.16.14"/>
        <vers num="2.6.16.15"/>
        <vers num="2.6.16.16"/>
        <vers num="2.6.16.17"/>
        <vers num="2.6.16.18"/>
        <vers num="2.6.16.19"/>
        <vers num="2.6.16.20"/>
        <vers num="2.6.16.21"/>
        <vers num="2.6.16.22"/>
        <vers num="2.6.16.23"/>
        <vers num="2.6.16.24"/>
        <vers num="2.6.16.25"/>
        <vers num="2.6.16.26"/>
        <vers num="2.6.16.27"/>
        <vers num="2.6.16.28"/>
        <vers num="2.6.16.29"/>
        <vers num="2.6.16.30"/>
        <vers num="2.6.16.31"/>
        <vers num="2.6.16.32"/>
        <vers num="2.6.16.33"/>
        <vers num="2.6.16.34"/>
        <vers num="2.6.16.35"/>
        <vers num="2.6.16.36"/>
        <vers num="2.6.16.37"/>
        <vers num="2.6.16.38"/>
        <vers num="2.6.16.39"/>
        <vers num="2.6.16.40"/>
        <vers num="2.6.16.41"/>
        <vers num="2.6.16.42"/>
        <vers num="2.6.16.43"/>
        <vers num="2.6.16.44"/>
        <vers num="2.6.16.45"/>
        <vers num="2.6.16.46"/>
        <vers num="2.6.16.47"/>
        <vers num="2.6.16.48"/>
        <vers num="2.6.16.49"/>
        <vers num="2.6.16.50"/>
        <vers num="2.6.16.51"/>
        <vers num="2.6.16.52"/>
        <vers num="2.6.16.53"/>
        <vers num="2.6.16.54"/>
        <vers num="2.6.16.55"/>
        <vers num="2.6.16.56"/>
        <vers num="2.6.16.57"/>
        <vers num="2.6.16.58"/>
        <vers num="2.6.16.59"/>
        <vers num="2.6.16.60"/>
        <vers num="2.6.16.61"/>
        <vers num="2.6.16.62"/>
        <vers num="2.6.17"/>
        <vers num="2.6.17.1"/>
        <vers num="2.6.17.2"/>
        <vers num="2.6.17.3"/>
        <vers num="2.6.17.4"/>
        <vers num="2.6.17.5"/>
        <vers num="2.6.17.6"/>
        <vers num="2.6.17.7"/>
        <vers num="2.6.17.8"/>
        <vers num="2.6.17.9"/>
        <vers num="2.6.17.10"/>
        <vers num="2.6.17.11"/>
        <vers num="2.6.17.12"/>
        <vers num="2.6.17.13"/>
        <vers num="2.6.17.14"/>
        <vers num="2.6.18"/>
        <vers num="2.6.18.1"/>
        <vers num="2.6.18.2"/>
        <vers num="2.6.18.3"/>
        <vers num="2.6.18.4"/>
        <vers num="2.6.18.5"/>
        <vers num="2.6.18.6"/>
        <vers num="2.6.18.7"/>
        <vers num="2.6.18.8"/>
        <vers num="2.6.19"/>
        <vers num="2.6.19.1"/>
        <vers num="2.6.19.2"/>
        <vers num="2.6.19.3"/>
        <vers num="2.6.19.4"/>
        <vers num="2.6.19.5"/>
        <vers num="2.6.19.6"/>
        <vers num="2.6.19.7"/>
        <vers num="2.6.20"/>
        <vers num="2.6.20.1"/>
        <vers num="2.6.20.2"/>
        <vers num="2.6.20.3"/>
        <vers num="2.6.20.4"/>
        <vers num="2.6.20.5"/>
        <vers num="2.6.20.6"/>
        <vers num="2.6.20.7"/>
        <vers num="2.6.20.8"/>
        <vers num="2.6.20.9"/>
        <vers num="2.6.20.10"/>
        <vers num="2.6.20.11"/>
        <vers num="2.6.20.12"/>
        <vers num="2.6.20.13"/>
        <vers num="2.6.20.14"/>
        <vers num="2.6.20.15"/>
        <vers num="2.6.20.16"/>
        <vers num="2.6.20.17"/>
        <vers num="2.6.20.18"/>
        <vers num="2.6.20.19"/>
        <vers num="2.6.20.20"/>
        <vers num="2.6.20.21"/>
        <vers num="2.6.21"/>
        <vers num="2.6.21.1"/>
        <vers num="2.6.21.2"/>
        <vers num="2.6.21.3"/>
        <vers num="2.6.21.4"/>
        <vers num="2.6.21.5"/>
        <vers num="2.6.21.6"/>
        <vers num="2.6.21.7"/>
        <vers num="2.6.22"/>
        <vers num="2.6.22.1"/>
        <vers num="2.6.22.2"/>
        <vers num="2.6.22.3"/>
        <vers num="2.6.22.4"/>
        <vers num="2.6.22.5"/>
        <vers num="2.6.22.6"/>
        <vers num="2.6.22.7"/>
        <vers num="2.6.22.8"/>
        <vers num="2.6.22.9"/>
        <vers num="2.6.22.10"/>
        <vers num="2.6.22.11"/>
        <vers num="2.6.22.12"/>
        <vers num="2.6.22.13"/>
        <vers num="2.6.22.14"/>
        <vers num="2.6.22.15"/>
        <vers num="2.6.22.16"/>
        <vers num="2.6.22.17"/>
        <vers num="2.6.22.18"/>
        <vers num="2.6.22.19"/>
        <vers num="2.6.22.20"/>
        <vers num="2.6.22.21"/>
        <vers num="2.6.22.22"/>
        <vers num="2.6.23"/>
        <vers num="2.6.23.1"/>
        <vers num="2.6.23.2"/>
        <vers num="2.6.23.3"/>
        <vers num="2.6.23.4"/>
        <vers num="2.6.23.5"/>
        <vers num="2.6.23.6"/>
        <vers num="2.6.23.7"/>
        <vers num="2.6.23.8"/>
        <vers num="2.6.23.9"/>
        <vers num="2.6.23.10"/>
        <vers num="2.6.23.11"/>
        <vers num="2.6.23.12"/>
        <vers num="2.6.23.13"/>
        <vers num="2.6.23.14"/>
        <vers num="2.6.23.15"/>
        <vers num="2.6.23.16"/>
        <vers num="2.6.23.17"/>
        <vers num="2.6.24"/>
        <vers num="2.6.24.1"/>
        <vers num="2.6.24.2"/>
        <vers num="2.6.24.3"/>
        <vers num="2.6.24.4"/>
        <vers num="2.6.24.5"/>
        <vers num="2.6.24.6"/>
        <vers num="2.6.24.7"/>
        <vers num="2.6.25"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1676" seq="2008-1676" published="2008-07-07" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Red Hat PKI Common Framework (rhpki-common) in Red Hat Certificate System (aka Certificate Server or RHCS) 7.1 through 7.3, and Netscape Certificate Management System 6.x, does not recognize Certificate Authority profile constraints on Extensions, which might allow remote attackers to bypass intended restrictions and conduct man-in-the-middle attacks by submitting a certificate signing request (CSR) and using the resulting certificate.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2008-0500.html" patch="1">RHSA-2008:0500</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2008-0577.html" patch="1">RHSA-2008:0577</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30062">30062</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020427">1020427</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=445227">https://bugzilla.redhat.com/show_bug.cgi?id=445227</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43573">rhcs-rhpkicommon-csr-security-bypass(43573)</ref>
    </refs>
    <vuln_soft>
      <prod name="certificate_management_system" vendor="netscape">
        <vers num="6.0"/>
        <vers num="6.01"/>
        <vers num="6.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1677" seq="2008-1677" published="2008-05-12" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in the regular expression handler in Red Hat Directory Server 8.0 and 7.1 before SP6 allows remote attackers to cause a denial of service (slapd crash) and possibly execute arbitrary code via a crafted LDAP query that triggers the overflow during translation to a regular expression.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0268.html">RHSA-2008:0268</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0269.html">RHSA-2008:0269</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29126">29126</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020001">1020001</ref>
      <ref source="MISC" url="https://bugzilla.redhat.com/show_bug.cgi?id=444712">https://bugzilla.redhat.com/show_bug.cgi?id=444712</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42332">rhds-fedora-expression-bo(42332)</ref>
    </refs>
    <vuln_soft>
      <prod name="fedora_directory_server" vendor="red_hat">
        <vers num="1.1"/>
      </prod>
      <prod name="directory_server" vendor="redhat">
        <vers num="7.1" edition="sp1"/>
        <vers num="7.1" edition="sp2"/>
        <vers num="7.1" edition="sp3"/>
        <vers num="7.1" edition="sp4"/>
        <vers num="7.1" edition="sp5"/>
        <vers num="8.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1678" seq="2008-1678" published="2008-07-10" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Memory leak in the zlib_stateful_init function in crypto/comp/c_zlib.c in libssl in OpenSSL 0.9.8f through 0.9.8h allows remote attackers to cause a denial of service (memory consumption) via multiple calls, as demonstrated by initial SSL client handshakes to the Apache HTTP Server mod_ssl that specify a compression algorithm.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.gentoo.org/show_bug.cgi?id=222643">http://bugs.gentoo.org/show_bug.cgi?id=222643</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html">APPLE-SA-2008-10-09</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00000.html">SUSE-SR:2008:024</ref>
      <ref source="MLIST" url="http://marc.info/?l=openssl-dev&amp;m=121060672602371&amp;w=2">[openssl-dev] 20080512 possible memory leak in zlib compression</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200807-06.xml">GLSA-200807-06</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3981">3981</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2010&amp;m=slackware-security.663049">SSA:2010-060-02</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3216">http://support.apple.com/kb/HT3216</ref>
      <ref source="CONFIRM" url="http://svn.apache.org/viewvc?view=rev&amp;revision=654119">http://svn.apache.org/viewvc?view=rev&amp;revision=654119</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2009:124">MDVSA-2009:124</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2009-1075.html">RHSA-2009:1075</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/31681">31681</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/31692">31692</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/USN-731-1">USN-731-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2780">ADV-2008-2780</ref>
      <ref source="CONFIRM" url="https://bugs.edge.launchpad.net/bugs/186339">https://bugs.edge.launchpad.net/bugs/186339</ref>
      <ref source="CONFIRM" url="https://bugs.edge.launchpad.net/bugs/224945">https://bugs.edge.launchpad.net/bugs/224945</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=447268">https://bugzilla.redhat.com/show_bug.cgi?id=447268</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43948">openssl-libssl-dos(43948)</ref>
      <ref source="CONFIRM" url="https://issues.apache.org/bugzilla/show_bug.cgi?id=44975">https://issues.apache.org/bugzilla/show_bug.cgi?id=44975</ref>
      <ref source="CONFIRM" url="https://kb.bluecoat.com/index?page=content&amp;id=SA50">https://kb.bluecoat.com/index?page=content&amp;id=SA50</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9754">oval:org.mitre.oval:def:9754</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00055.html">FEDORA-2008-6393</ref>
    </refs>
    <vuln_soft>
      <prod name="openssl" vendor="openssl">
        <vers num="0.9.8f"/>
        <vers num="0.9.8g"/>
        <vers num="0.9.8h"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1679" seq="2008-1679" published="2008-04-22" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple integer overflows in imageop.c in Python before 2.5.3 allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted images that trigger heap-based buffer overflows.  NOTE: this issue is due to an incomplete fix for CVE-2007-4965.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.python.org/issue1179">http://bugs.python.org/issue1179</ref>
      <ref source="MISC" url="http://bugs.python.org/msg64682">http://bugs.python.org/msg64682</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html">APPLE-SA-2009-02-12</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html">SUSE-SR:2008:017</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200807-01.xml">GLSA-200807-01</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.525289">SSA:2008-217-01</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3438">http://support.apple.com/kb/HT3438</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/css/P8/documents/100074697">http://support.avaya.com/css/P8/documents/100074697</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0149">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0149</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1551" patch="1">DSA-1551</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1620">DSA-1620</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:163">MDVSA-2008:163</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:164">MDVSA-2008:164</ref>
      <ref source="CONFIRM" url="http://www.novell.com/support/search.do?cmd=displayKC&amp;docType=kc&amp;externalId=InfoDocument-patchbuilder-readme5032900">http://www.novell.com/support/search.do?cmd=displayKC&amp;docType=kc&amp;externalId=InfoDocument-patchbuilder-readme5032900</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-632-1">USN-632-1</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41958">python-imageopc-bo(41958)</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2424">https://issues.rpath.com/browse/RPL-2424</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10583">oval:org.mitre.oval:def:10583</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7800">oval:org.mitre.oval:def:7800</ref>
    </refs>
    <vuln_soft>
      <prod name="python" vendor="python_software_foundation">
        <vers num="2.4"/>
        <vers num="2.5.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1680" seq="2008-1680" published="2008-04-03" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">PHP-Nuke Platinum 7.6.b.5 allows remote attackers to obtain configuration information via a direct request to maintenance/index.php, which reveals settings such as magic_quotes_gpc.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41745">platinum-index-info-disclosure(41745)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5295">5295</ref>
    </refs>
    <vuln_soft>
      <prod name="php-nuke_platinum" vendor="future_nuke">
        <vers num="7.6.b.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1681" seq="2008-1681" published="2008-04-04" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in IBM DB2 Content Manager before 8.3 FP8 has unknown impact and attack vectors related to the AllowedTrustedLogin privilege.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://publib.boulder.ibm.com/infocenter/cmgmt/v8r3m0/topic/com.ibm.cmgmtreadmefp.doc/aparlist.htm">http://publib.boulder.ibm.com/infocenter/cmgmt/v8r3m0/topic/com.ibm.cmgmtreadmefp.doc/aparlist.htm</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28567">28567</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1070/references">ADV-2008-1070</ref>
      <ref source="CONFIRM" url="http://www-1.ibm.com/support/docview.wss?uid=swg27011946&amp;aid=1">http://www-1.ibm.com/support/docview.wss?uid=swg27011946&amp;aid=1</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41585">db2-allowedtrustedlogin-unspecified(41585)</ref>
    </refs>
    <vuln_soft>
      <prod name="db2_content_manager" vendor="ibm">
        <vers num="8.3" prev="1" edition="fix_pack_7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1682" seq="2008-1682" published="2008-04-04" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in quiz/common/db_config.inc.php in the Online FlashQuiz (com_onlineflashquiz) 1.0.2 component for Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the base_dir parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28574">28574</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41592">onlineflashquiz-dbconfig-file-include(41592)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5345">5345</ref>
    </refs>
    <vuln_soft>
      <prod name="online_flashquiz" vendor="elearningforce">
        <vers num="1.0.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1683" seq="2008-1683" published="2008-04-06" modified="2008-04-15" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2008-0887.  Reason: This candidate is a duplicate of CVE-2008-0887.  Notes: All CVE users should reference CVE-2008-0887 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2008-1684" seq="2008-1684" published="2008-04-06" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.7" CVSS_base_score="4.7" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">inetd on Sun Solaris 10, when debug logging is enabled, allows local users to write to arbitrary files via a symlink attack on the /var/tmp/inetd.log temporary file.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019781">1019781</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-233284-1" patch="1">233284</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28584">28584</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1076">ADV-2008-1076</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41626">solaris-inetd1m-dos(41626)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5369">oval:org.mitre.oval:def:5369</ref>
    </refs>
    <vuln_soft>
      <prod name="solaris" vendor="sun">
        <vers num="10" edition=":sparc"/>
        <vers num="10" edition=":x86"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1685" seq="2008-1685" published="2008-04-06" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">** DISPUTED **  gcc 4.2.0 through 4.3.0 in GNU Compiler Collection, when casts are not used, considers the sum of a pointer and an int to be greater than or equal to the pointer, which might lead to removal of length testing code that was intended as a protection mechanism against integer overflow and buffer overflow attacks, and provide no diagnostic message about this removal. NOTE: the vendor has determined that this compiler behavior is correct according to section 6.5.6 of the C99 standard (aka ISO/IEC 9899:1999).</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://gcc.gnu.org/bugzilla/show_bug.cgi?id=26763">http://gcc.gnu.org/bugzilla/show_bug.cgi?id=26763</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/162289">VU#162289</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41686">gcc-weak-security(41686)</ref>
    </refs>
    <vuln_soft>
      <prod name="gcc" vendor="gnu">
        <vers num="4.2.0"/>
        <vers num="4.2.1"/>
        <vers num="4.2.2"/>
        <vers num="4.2.3"/>
        <vers num="4.2.4"/>
        <vers num="4.3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1686" seq="2008-1686" published="2008-04-08" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Array index vulnerability in Speex 1.1.12 and earlier, as used in libfishsound 0.9.0 and earlier, including Illiminable DirectShow Filters and Annodex Plugins for Firefox, xine-lib before 1.1.12, and many other products, allows remote attackers to execute arbitrary code via a header structure containing a negative offset, which is used to dereference a function pointer.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://blog.kfish.org/2008/04/release-libfishsound-091.html">http://blog.kfish.org/2008/04/release-libfishsound-091.html</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00001.html">SUSE-SR:2008:012</ref>
      <ref source="MLIST" url="http://lists.xiph.org/pipermail/speex-dev/2008-April/006636.html">[Speex-dev] 20080406 libfishsound 0.9.1 Release</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200804-17.xml">GLSA-200804-17</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.460836">SSA:2008-111-01</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=592185">http://sourceforge.net/project/shownotes.php?release_id=592185</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=592185&amp;group_id=9655">http://sourceforge.net/project/shownotes.php?release_id=592185&amp;group_id=9655</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1584" patch="1">DSA-1584</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1585" patch="1">DSA-1585</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1586">DSA-1586</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:092">MDVSA-2008:092</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:093">MDVSA-2008:093</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:094">MDVSA-2008:094</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:124">MDVSA-2008:124</ref>
      <ref source="CONFIRM" url="http://www.metadecks.org/software/sweep/news.html">http://www.metadecks.org/software/sweep/news.html</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2008_13_sr.html">SUSE-SR:2008:013</ref>
      <ref source="MISC" url="http://www.ocert.org/advisories/ocert-2008-004.html">http://www.ocert.org/advisories/ocert-2008-004.html</ref>
      <ref source="MISC" url="http://www.ocert.org/advisories/ocert-2008-2.html">http://www.ocert.org/advisories/ocert-2008-2.html</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0235.html">RHSA-2008:0235</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491009/100/0/threaded">20080417 [oCERT-2008-004] multiple speex implementations insufficientboundary checks</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28665" patch="1">28665</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019875">1019875</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-611-1">USN-611-1</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-611-2">USN-611-2</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-611-3">USN-611-3</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-635-1">USN-635-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1187/references">ADV-2008-1187</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1228/references">ADV-2008-1228</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1268/references">ADV-2008-1268</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1269/references">ADV-2008-1269</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1300/references">ADV-2008-1300</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1301/references">ADV-2008-1301</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1302/references">ADV-2008-1302</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41684">fishsound-libfishsound-speex-bo(41684)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10026">oval:org.mitre.oval:def:10026</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00244.html">FEDORA-2008-3059</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00287.html">FEDORA-2008-3103</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00357.html">FEDORA-2008-3191</ref>
    </refs>
    <vuln_soft>
      <prod name="xine-lib" vendor="xine">
        <vers num="0.9.8"/>
        <vers num="0.9.13"/>
        <vers num="0.99"/>
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3a"/>
        <vers num="1.1.0"/>
        <vers num="1.1.1"/>
        <vers num="1.1.10"/>
        <vers num="1.1.10.1"/>
        <vers num="1.1.11"/>
        <vers num="1.1.11.1" prev="1"/>
      </prod>
      <prod name="libfishsound" vendor="xiph">
        <vers num="0.5.41"/>
        <vers num="0.5.42"/>
        <vers num="0.6.0"/>
        <vers num="0.6.1"/>
        <vers num="0.6.2"/>
        <vers num="0.6.3"/>
        <vers num="0.7.0"/>
        <vers num="0.8.0"/>
        <vers num="0.8.1"/>
        <vers num="0.9.0" prev="1"/>
      </prod>
      <prod name="speex" vendor="xiph">
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.4"/>
        <vers num="1.0.5"/>
        <vers num="1.1.1"/>
        <vers num="1.1.2"/>
        <vers num="1.1.3"/>
        <vers num="1.1.4"/>
        <vers num="1.1.5"/>
        <vers num="1.1.6"/>
        <vers num="1.1.7"/>
        <vers num="1.1.8"/>
        <vers num="1.1.9"/>
        <vers num="1.1.10"/>
        <vers num="1.1.11"/>
        <vers num="1.1.11.1"/>
        <vers num="1.1.12" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1687" seq="2008-1687" published="2008-04-09" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The (1) maketemp and (2) mkstemp builtin functions in GNU m4 before 1.4.11 do not quote their output when a file is created, which might allow context-dependent attackers to trigger a macro expansion, leading to unspecified use of an incorrect filename.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.510612">SSA:2008-098-01</ref>
      <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/04/07/1">[oss-security] 20080406 Security fixes in m4-1.4.11</ref>
      <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/04/07/12">[oss-security] 20080407 Re: Security fixes in m4-1.4.11</ref>
      <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/04/07/3">[oss-security] 20080406 Re: Security fixes in m4-1.4.11</ref>
      <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/04/07/4">[oss-security] 20080407 Re: Security fixes in m4-1.4.11</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28688">28688</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1151/references">ADV-2008-1151</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41706">gnu-m4-macros-weak-security(41706)</ref>
    </refs>
    <vuln_soft>
      <prod name="m4" vendor="gnu">
        <vers num="1.4.10" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1688" seq="2008-1688" published="2008-04-09" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in GNU m4 before 1.4.11 might allow context-dependent attackers to execute arbitrary code, related to improper handling of filenames specified with the -F option.  NOTE: it is not clear when this issue crosses privilege boundaries.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.510612">SSA:2008-098-01</ref>
      <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/04/07/1">[oss-security] 20080406 Security fixes in m4-1.4.11</ref>
      <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/04/07/3">[oss-security] 20080406 Re: Security fixes in m4-1.4.11</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28688">28688</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1151/references">ADV-2008-1151</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41704">gnu-m4-producefrozenstate-format-string(41704)</ref>
    </refs>
    <vuln_soft>
      <prod name="m4" vendor="gnu">
        <vers num="1.4.1"/>
        <vers num="1.4.2"/>
        <vers num="1.4.3"/>
        <vers num="1.4.4"/>
        <vers num="1.4.5"/>
        <vers num="1.4.6"/>
        <vers num="1.4.7"/>
        <vers num="1.4.8"/>
        <vers num="1.4.9"/>
        <vers num="1.4.10"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1689" seq="2008-1689" published="2008-04-07" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Stack consumption vulnerability in WebContainer.exe 1.0.0.336 and earlier in SLMail Pro 6.3.1.0 and earlier allows remote attackers to cause a denial of service (daemon crash) via a long request header in an HTTP request to TCP port 801.  NOTE: some of these details are obtained from third party information.</descript>
      <descript source="nvd">Only version information is located here: http://www.seattlelab.com/Products/SLMailPro/Utilities.asp. Versions 3.x, 4.x, and 5.x are vulnerable, but specific version information is not available.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/slmaildos-adv.txt">http://aluigi.altervista.org/adv/slmaildos-adv.txt</ref>
      <ref source="MISC" url="http://aluigi.org/poc/slmaildos.zip">http://aluigi.org/poc/slmaildos.zip</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28505">28505</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1039/references">ADV-2008-1039</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41532">slmailpro-webcontainer-bo(41532)</ref>
    </refs>
    <vuln_soft>
      <prod name="slmail_pro" vendor="seattle_lab_software">
        <vers num="5.5"/>
        <vers num="6.1"/>
        <vers num="6.2"/>
        <vers num="6.2.1"/>
        <vers num="6.3"/>
        <vers num="6.3.1.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1690" seq="2008-1690" published="2008-04-07" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">WebContainer.exe 1.0.0.336 and earlier in SLMail Pro 6.3.1.0 and earlier allows remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a long URI in HTTP requests to TCP port 801.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.org/poc/slmaildos.zip">http://aluigi.org/poc/slmaildos.zip</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28505">28505</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1039/references">ADV-2008-1039</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41531">slmailpro-webcontainer-code-execution(41531)</ref>
    </refs>
    <vuln_soft>
      <prod name="slmail_pro" vendor="seattle_lab_software">
        <vers num="6.3.1.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1691" seq="2008-1691" published="2008-04-07" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in SLMail.exe in SLMail Pro 6.3.1.0 and earlier allows remote attackers to cause a denial of service (UDP service outage) via a large packet to UDP port 54.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/slmaildos-adv.txt">http://aluigi.altervista.org/adv/slmaildos-adv.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28505">28505</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1039/references">ADV-2008-1039</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41533">slmailpro-slmail-dos(41533)</ref>
    </refs>
    <vuln_soft>
      <prod name="slmail_pro" vendor="seattle_lab_software">
        <vers num="6.3.1.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1692" seq="2008-1692" published="2008-04-07" modified="2009-02-26" severity="Medium" CVSS_version="2.0" CVSS_score="6.9" CVSS_base_score="6.9" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Eterm 0.9.4 opens a terminal window on :0 if -display is not specified and the DISPLAY environment variable is not set, which might allow local users to hijack X11 connections.  NOTE: realistic attack scenarios require that the victim enters a command on the wrong machine.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=473127">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=473127</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200805-03.xml">GLSA-200805-03</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:222">MDVSA-2008:222</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28512">28512</ref>
    </refs>
    <vuln_soft>
      <prod name="eterm" vendor="eterm">
        <vers num="0.9.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1693" seq="2008-1693" published="2008-04-18" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The CairoFont::create function in CairoFontEngine.cc in Poppler, possibly before 0.8.0, as used in Xpdf, Evince, ePDFview, KWord, and other applications, does not properly handle embedded fonts in PDF files, which allows remote attackers to execute arbitrary code via a crafted font object, related to dereferencing a function pointer associated with the type of this font object.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html">SUSE-SR:2008:011</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200804-18.xml">GLSA-200804-18</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019893">1019893</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1548" patch="1">DSA-1548</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1606">DSA-1606</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:089">MDVSA-2008:089</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:173">MDVSA-2008:173</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:197">MDVSA-2008:197</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2008_13_sr.html">SUSE-SR:2008:013</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0238.html">RHSA-2008:0238</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0239.html">RHSA-2008:0239</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0240.html">RHSA-2008:0240</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0262.html">RHSA-2008:0262</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28830">28830</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-603-1">USN-603-1</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-603-2">USN-603-2</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1265/references">ADV-2008-1265</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1266/references">ADV-2008-1266</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41884">xpdf-pdf-code-execution(41884)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11226">oval:org.mitre.oval:def:11226</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00522.html">FEDORA-2008-3312</ref>
    </refs>
    <vuln_soft>
      <prod name="poppler" vendor="poppler">
        <vers num="0.1"/>
        <vers num="0.1.1"/>
        <vers num="0.1.2"/>
        <vers num="0.2.0"/>
        <vers num="0.3.0"/>
        <vers num="0.3.1"/>
        <vers num="0.3.2"/>
        <vers num="0.3.3"/>
        <vers num="0.4.0"/>
        <vers num="0.4.1"/>
        <vers num="0.4.2"/>
        <vers num="0.4.3"/>
        <vers num="0.4.4"/>
        <vers num="0.5.0"/>
        <vers num="0.5.1"/>
        <vers num="0.5.2"/>
        <vers num="0.5.3"/>
        <vers num="0.5.4"/>
        <vers num="0.5.9"/>
        <vers num="0.5.91"/>
        <vers num="0.6.0"/>
        <vers num="0.6.1"/>
        <vers num="0.6.2"/>
        <vers num="0.6.3"/>
        <vers num="0.6.4"/>
        <vers num="0.7.0"/>
        <vers num="0.7.1"/>
        <vers num="0.7.2"/>
        <vers num="0.7.3" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1694" seq="2008-1694" published="2008-04-22" modified="2018-10-03" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">vcdiff in Emacs 20.7 to 22.1.50, when used with SCCS, allows local users to overwrite arbitrary files via a symlink attack on temporary files.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.gentoo.org/show_bug.cgi?id=216880">http://bugs.gentoo.org/show_bug.cgi?id=216880</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:096">MDVSA-2008:096</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28857">28857</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019909">1019909</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1309/references">ADV-2008-1309</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1310/references">ADV-2008-1310</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=208483">https://bugzilla.redhat.com/show_bug.cgi?id=208483</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41906">xemacs-gnuemacs-vcdiff-symlink(41906)</ref>
      <ref source="UBUNTU" url="https://usn.ubuntu.com/607-1/">USN-607-1</ref>
    </refs>
    <vuln_soft>
      <prod name="emacs" vendor="gnu">
        <vers num="20.7"/>
        <vers num="21.1"/>
        <vers num="21.2"/>
        <vers num="21.3"/>
        <vers num="21.4"/>
      </prod>
      <prod name="sccs" vendor="gnu">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1696" seq="2008-1696" published="2008-04-08" modified="2017-09-28" severity="Low" CVSS_version="2.0" CVSS_score="3.7" CVSS_base_score="3.7" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="1.9" CVSS_vector="(AV:L/AC:H/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in makepost.php in DaZPHPNews 0.1-1, when register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the prefixdir parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28582">28582</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41608">dazphpnews-makepost-file-include(41608)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5347">5347</ref>
    </refs>
    <vuln_soft>
      <prod name="dazphpnews" vendor="dazphp">
        <vers num="0.1-1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1697" seq="2008-1697" published="2008-04-08" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in ovwparser.dll in HP OpenView Network Node Manager (OV NNM) 7.53, 7.51, and earlier allows remote attackers to execute arbitrary code via a long URI in an HTTP request processed by ovas.exe, as demonstrated by a certain topology/homeBaseView request.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=121553626110871&amp;w=2">SSRT080033</ref>
      <ref source="MISC" url="http://www.offensive-security.com/0day/hp-nnm-ov.py.txt">http://www.offensive-security.com/0day/hp-nnm-ov.py.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28569" patch="1">28569</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019782">1019782</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1085/references" adv="1">ADV-2008-1085</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41600">hpopenview-ovas-bo(41600)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5342">5342</ref>
    </refs>
    <vuln_soft>
      <prod name="openview_network_node_manager" vendor="hp">
        <vers num="7.0.1"/>
        <vers num="7.51"/>
        <vers num="7.53" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1698" seq="2008-1698" published="2008-04-08" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in gallery.php in Simple Gallery 2.2 allows remote attackers to inject arbitrary web script or HTML via the album parameter to index.php.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28596">28596</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41622">simplegallery-index-album-xss(41622)</ref>
    </refs>
    <vuln_soft>
      <prod name="simple_gallery" vendor="ventrian">
        <vers num="2.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1699" seq="2008-1699" published="2008-04-08" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in permalink.php in Desi Quintans Writer's Block CMS 3.8a allows remote attackers to execute arbitrary SQL commands via the PostID parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3803">3803</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490376/100/0/threaded">20080402 Writers Block SQL Injection Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28564">28564</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41619">writersblock-permalink-sql-injection(41619)</ref>
    </refs>
    <vuln_soft>
      <prod name="writers_block_cms" vendor="desiquintans">
        <vers num="3.8a"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1700" seq="2008-1700" published="2008-04-08" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The Web TransferCtrl Class 8,2,1,4 (iManFile.cab), as used in WorkSite Web 8.2 before SP1 P2, allows remote attackers to cause a denial of service (memory consumption) via a large number of SendNrlLink directives, which opens a separate window for each directive.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.mwrinfosecurity.com/publications/mwri_interwoven-worksite-activex-control-remote-code-execution_2008-03-10.pdf">http://www.mwrinfosecurity.com/publications/mwri_interwoven-worksite-activex-control-remote-code-execution_2008-03-10.pdf</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41757">worksiteweb-webtransferctrl-imanfile-dos(41757)</ref>
    </refs>
    <vuln_soft>
      <prod name="worksite_web" vendor="interwoven">
        <vers num="8.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1701" seq="2008-1701" published="2008-04-08" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Novell NetWare 6.5 allows attackers to cause a denial of service (ABEND) via a crafted Macintosh iPrint client request.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28561">28561</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019750">1019750</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1074/references">ADV-2008-1074</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41588">novell-netware-iprint-dos(41588)</ref>
      <ref source="CONFIRM" url="https://secure-support.novell.com/KanisaPlatform/Publishing/667/3842033_f.SAL_Public.html">https://secure-support.novell.com/KanisaPlatform/Publishing/667/3842033_f.SAL_Public.html</ref>
    </refs>
    <vuln_soft>
      <prod name="iprint" vendor="novell">
        <vers num="6.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1702" seq="2008-1702" published="2008-04-08" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Absolute path traversal vulnerability in dload.php in the my_gallery 2.3 plugin for e107 allows remote attackers to obtain sensitive information via a full pathname in the file parameter.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3801">3801</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490041/100/0/threaded">20080325 e107 My_Gallery Plugin Arbitrary File Download Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28440">28440</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41433">mygallery-dload-file-download(41433)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5308">5308</ref>
    </refs>
    <vuln_soft>
      <prod name="my_gallery" vendor="e107">
        <vers num="2.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1703" seq="2008-1703" published="2008-04-11" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple buffer overflows in TIBCO Software Rendezvous before 8.1.0, as used in multiple TIBCO products, allow remote attackers to execute arbitrary code via a crafted message.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28717">28717</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019826">1019826</ref>
      <ref source="CONFIRM" url="http://www.tibco.com/resources/mk/rendezvous_security_advisory_20080409.txt">http://www.tibco.com/resources/mk/rendezvous_security_advisory_20080409.txt</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1189/references">ADV-2008-1189</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1190/references">ADV-2008-1190</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41760">tibco-rendezvous-multiple-code-execution(41760)</ref>
    </refs>
    <vuln_soft>
      <prod name="adapter_files_z_os" vendor="tibco">
        <vers num="4.4.1" prev="1"/>
      </prod>
      <prod name="hawk" vendor="tibco">
        <vers num="4.8.0" prev="1"/>
      </prod>
      <prod name="iprocess_engine" vendor="tibco">
        <vers num="10.3.0"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
        <vers num="10.3.4"/>
        <vers num="10.3.5"/>
        <vers num="10.4"/>
        <vers num="10.4.1"/>
        <vers num="10.5"/>
        <vers num="10.6"/>
        <vers num="10.6.0"/>
        <vers num="10.6.1"/>
      </prod>
      <prod name="rendezvous" vendor="tibco">
        <vers num="8.10" prev="1"/>
      </prod>
      <prod name="rendezvous_datasecurity" vendor="tibco">
        <vers num="2.1.6" prev="1"/>
      </prod>
      <prod name="rendezvous_tx" vendor="tibco">
        <vers num="2.04" prev="1"/>
      </prod>
      <prod name="runtime_agent" vendor="tibco">
        <vers num="5.5.4" prev="1"/>
      </prod>
      <prod name="substantiation_es" vendor="tibco">
        <vers num="2.4.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1704" seq="2008-1704" published="2008-04-11" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple buffer overflows in TIBCO Software Enterprise Message Service (EMS) before 4.4.3, and iProcess Engine 10.6.0 through 10.6.1, allow remote attackers to execute arbitrary code via a crafted message to the EMS server.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28717">28717</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019826">1019826</ref>
      <ref source="CONFIRM" url="http://www.tibco.com/resources/mk/ems_security_advisory_20080409.txt">http://www.tibco.com/resources/mk/ems_security_advisory_20080409.txt</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1190/references">ADV-2008-1190</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41761">tibco-ems-iprocess-code-execution(41761)</ref>
    </refs>
    <vuln_soft>
      <prod name="enterprise_message_service" vendor="tibco">
        <vers num="4.0.0"/>
        <vers num="4.1.0"/>
        <vers num="4.2.0"/>
        <vers num="4.3.0"/>
        <vers num="4.4.0"/>
        <vers num="4.4.1"/>
        <vers num="4.4.2" prev="1"/>
      </prod>
      <prod name="iprocess_engine" vendor="tibco">
        <vers num="10.6.0"/>
        <vers num="10.6.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1705" seq="2008-1705" published="2008-04-09" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Format string vulnerability in the logging function in IBM solidDB 06.00.1018 and earlier allows remote attackers to execute arbitrary code via format string specifiers in the (1) user name, (2) peer name, and possibly unspecified other fields.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/soliduro-adv.txt">http://aluigi.altervista.org/adv/soliduro-adv.txt</ref>
      <ref source="MISC" url="http://aluigi.org/poc/soliduro.zip">http://aluigi.org/poc/soliduro.zip</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019721">1019721</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490129/100/0/threaded">20080326 Multiple vulnerabilities in solidDB 06.00.1018</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28468">28468</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1038">ADV-2008-1038</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41485">ibm-soliddb-solid-format-string(41485)</ref>
    </refs>
    <vuln_soft>
      <prod name="soliddb" vendor="ibm">
        <vers num="06.00.1018"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1706" seq="2008-1706" published="2008-04-09" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Uncontrolled array index in IBM solidDB 06.00.1018 and earlier allows remote attackers to cause a denial of service (daemon crash) via a large value in a certain 32-bit field.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/soliduro-adv.txt">http://aluigi.altervista.org/adv/soliduro-adv.txt</ref>
      <ref source="MISC" url="http://aluigi.org/poc/soliduro.zip">http://aluigi.org/poc/soliduro.zip</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019721">1019721</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490129/100/0/threaded">20080326 Multiple vulnerabilities in solidDB 06.00.1018</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28468">28468</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1038">ADV-2008-1038</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41486">ibm-soliddb-arrayindex-dos(41486)</ref>
    </refs>
    <vuln_soft>
      <prod name="soliddb" vendor="ibm">
        <vers num="06.00.1018"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1707" seq="2008-1707" published="2008-04-09" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">IBM solidDB 06.00.1018 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a packet with an 0x11 value in a certain "type" field.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/soliduro-adv.txt">http://aluigi.altervista.org/adv/soliduro-adv.txt</ref>
      <ref source="MISC" url="http://aluigi.org/poc/soliduro.zip">http://aluigi.org/poc/soliduro.zip</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019721">1019721</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490129/100/0/threaded">20080326 Multiple vulnerabilities in solidDB 06.00.1018</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28468">28468</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1038">ADV-2008-1038</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41487">ibm-soliddb-solid-dos(41487)</ref>
    </refs>
    <vuln_soft>
      <prod name="soliddb" vendor="ibm">
        <vers num="06.00.1018" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1708" seq="2008-1708" published="2008-04-09" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">IBM solidDB 06.00.1018 and earlier does not validate a certain field that specifies an amount of memory to allocate, which allows remote attackers to cause a denial of service (daemon exit) via a packet with a large value in this field.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/soliduro-adv.txt">http://aluigi.altervista.org/adv/soliduro-adv.txt</ref>
      <ref source="MISC" url="http://aluigi.org/poc/soliduro.zip">http://aluigi.org/poc/soliduro.zip</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019721">1019721</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490129/100/0/threaded">20080326 Multiple vulnerabilities in solidDB 06.00.1018</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28468">28468</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1038">ADV-2008-1038</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41488">ibm-soliddb-memory-dos(41488)</ref>
    </refs>
    <vuln_soft>
      <prod name="soliddb" vendor="ibm">
        <vers num="06.00.1018" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1709" seq="2008-1709" published="2008-04-09" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in Microsoft Visual InterDev 6.0 (SP6) allows user-assisted attackers to execute arbitrary code via a Studio Solution (.SLN) file with a long malformed Project line beginning with a 'Project("{}") =' sequence, probably a different vector than CVE-2008-0250.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41826">visualinterdev-sln-project-bo(41826)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5349">5349</ref>
    </refs>
    <vuln_soft>
      <prod name="visual_interdev" vendor="microsoft">
        <vers num="6.0" edition="sp6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1710" seq="2008-1710" published="2008-04-09" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Untrusted search path vulnerability in chnfsmnt in IBM AIX 6.1 allows local users to gain privileges via a modified PATH environment variable.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019693">1019693</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28429">28429</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0983">ADV-2008-0983</ref>
      <ref source="AIXAPAR" url="http://www-01.ibm.com/support/docview.wss?uid=isg1IZ20391">IZ20391</ref>
      <ref source="AIXAPAR" url="http://www-01.ibm.com/support/docview.wss?uid=isg1IZ23556">IZ23556</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/docview.wss?uid=isg1IZ18296">IZ18296</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5911">oval:org.mitre.oval:def:5911</ref>
    </refs>
    <vuln_soft>
      <prod name="aix" vendor="ibm">
        <vers num="6.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1711" seq="2008-1711" published="2008-04-09" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Terong PHP Photo Gallery (aka Advanced Web Photo Gallery) 1.0 stores passwords in cleartext in a MySQL database, which allows context-dependent attackers to obtain sensitive information.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41820">photogallery-password-info-disclosure(41820)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5364">5364</ref>
    </refs>
    <vuln_soft>
      <prod name="advanced_web_photo_gallery" vendor="terong">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1712" seq="2008-1712" published="2008-04-09" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in includes/functions_weblog.php in mxBB mx_blogs 2.0.0 beta allows remote attackers to execute arbitrary PHP code via a URL in the mx_root_path parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28515">28515</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41819">mxblogs-functionsweblog-file-include(41819)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5323">5323</ref>
    </refs>
    <vuln_soft>
      <prod name="mxbb" vendor="mx-system">
        <vers num="2.0.0_beta"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1713" seq="2008-1713" published="2008-04-09" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">MailServer.exe in NoticeWare Email Server 4.6.1.0 allows remote attackers to cause a denial of service (application crash) via a long string to IMAP port (143/tcp).</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28559">28559</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41581">emailserverng-mailserver-dos(41581)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5341">5341</ref>
    </refs>
    <vuln_soft>
      <prod name="email_server" vendor="noticeware">
        <vers num="4.6.1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1714" seq="2008-1714" published="2008-04-09" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in show.php in FaScript FaPhoto 1.0, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28545">28545</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41557">faphoto-show-sql-injection(41557)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5334">5334</ref>
    </refs>
    <vuln_soft>
      <prod name="faphoto" vendor="fascript">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1715" seq="2008-1715" published="2008-04-09" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in content/user.php in AuraCMS 2.2.1 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the country parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28499">28499</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41529">auracms-user-security-bypass(41529)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5319">5319</ref>
    </refs>
    <vuln_soft>
      <prod name="auracms" vendor="auracms">
        <vers num="2.2.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1716" seq="2008-1716" published="2008-04-09" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in WoltLab Community Framework (WCF) 1.0.6 in WoltLab Burning Board 3.0.5 allows remote attackers to inject arbitrary web script or HTML via the (1) page and (2) form parameters, which are not properly handled when they are reflected back in an error message.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2008-04/0161.html">20080407 WoltLab(R) Community Framework XSS and Full Path Disclosure Vulnerability</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2008-April/061271.html">20080408 WoltLab(R) Community Framework XSS and Full Path Disclosure Vulnerability</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490560/100/0/threaded">20080407 WoltLab(R) Community Framework XSS and Full Path Disclosure Vulnerability</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490782/100/0/threaded">20080412 Re: WoltLab(R) Community Framework WCF 1.0.6</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28678">28678</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41714">wbb-wcf-page-form-xss(41714)</ref>
    </refs>
    <vuln_soft>
      <prod name="burning_board" vendor="woltlab">
        <vers num="3.0.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1717" seq="2008-1717" published="2008-04-09" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">WoltLab Community Framework (WCF) 1.0.6 in WoltLab Burning Board 3.0.5 allows remote attackers to obtain the full path via invalid (1) page and (2) form parameters, which leaks the path from an exception handler when a valid class cannot be found.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2008-04/0161.html">20080407 WoltLab(R) Community Framework XSS and Full Path Disclosure Vulnerability</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2008-April/061271.html">20080408 WoltLab(R) Community Framework XSS and Full Path Disclosure Vulnerability</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490560/100/0/threaded">20080407 WoltLab(R) Community Framework XSS and Full Path Disclosure Vulnerability</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490782/100/0/threaded">20080412 Re: WoltLab(R) Community Framework WCF 1.0.6</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28678">28678</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41713">wbb-wcf-exception-info-disclosure(41713)</ref>
    </refs>
    <vuln_soft>
      <prod name="burning_board" vendor="woltlab">
        <vers num="3.0.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1718" seq="2008-1718" published="2008-04-10" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in mimesr.dll in Autonomy (formerly Verity) KeyView, as used in IBM Lotus Notes before 8.0, might allow user-assisted remote attackers to execute arbitrary code via an e-mail message with a crafted Text mail (MIME) attachment.</descript>
      <descript source="nvd">Secunia information:
http://secunia.com/advisories/28210</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www-1.ibm.com/support/docview.wss?rs=463&amp;uid=swg21298453" adv="1">http://www-1.ibm.com/support/docview.wss?rs=463&amp;uid=swg21298453</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41856">autonomy-mimesr-bo(41856)</ref>
    </refs>
    <vuln_soft>
      <prod name="keyview" vendor="autonomy">
        <vers num=""/>
      </prod>
      <prod name="lotus_notes" vendor="ibm">
        <vers num="6.0"/>
        <vers num="6.5"/>
        <vers num="7.0"/>
        <vers num="8.0"/>
        <vers num="8.0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1719" seq="2008-1719" published="2008-04-10" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple cross-site request forgery (CSRF) vulnerabilities in Nuke ET 3.2 and 3.4 allow remote attackers to perform actions as administrators, as demonstrated by inserting an XSS sequence into a document.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.mrzayas.es/2008/04/07/xsrf-en-nuke-et-3x/">http://www.mrzayas.es/2008/04/07/xsrf-en-nuke-et-3x/</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41851">nukeet-multiple-unspecified-csrf(41851)</ref>
    </refs>
    <vuln_soft>
      <prod name="nuke_et" vendor="truzone">
        <vers num="3.2"/>
        <vers num="3.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1720" seq="2008-1720" published="2008-04-10" modified="2018-10-03" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in rsync 2.6.9 to 3.0.1, with extended attribute (xattr) support enabled, might allow remote attackers to execute arbitrary code via unknown vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html">SUSE-SR:2008:011</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=125017764422557&amp;w=2">HPSBMA02447</ref>
      <ref source="CONFIRM" url="http://rsync.samba.org/ftp/rsync/security/rsync-3.0.1-xattr-alloc.diff" patch="1">http://rsync.samba.org/ftp/rsync/security/rsync-3.0.1-xattr-alloc.diff</ref>
      <ref source="CONFIRM" url="http://samba.anu.edu.au/rsync/security.html#s3_0_2" patch="1">http://samba.anu.edu.au/rsync/security.html#s3_0_2</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200804-16.xml">GLSA-200804-16</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=591462&amp;group_id=69227">http://sourceforge.net/project/shownotes.php?release_id=591462&amp;group_id=69227</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1545">DSA-1545</ref>
      <ref source="MLIST" url="http://www.mail-archive.com/rsync-announce@lists.samba.org/msg00057.html">[rsync-announce] 20080408 Rsync 3.0.2 released w/xattr security fix (attn: 2.6.9 onward)</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:084">MDVSA-2008:084</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28726">28726</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019835">1019835</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1191/references">ADV-2008-1191</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1215/references">ADV-2008-1215</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41766">rsync-xattr-bo(41766)</ref>
      <ref source="UBUNTU" url="https://usn.ubuntu.com/600-1/">USN-600-1</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00237.html">FEDORA-2008-3047</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00247.html">FEDORA-2008-3060</ref>
    </refs>
    <vuln_soft>
      <prod name="rsync" vendor="samba">
        <vers num="2.6.9"/>
        <vers num="2.7.0"/>
        <vers num="2.7.1"/>
        <vers num="2.7.2"/>
        <vers num="2.7.3"/>
        <vers num="2.7.4"/>
        <vers num="2.7.5"/>
        <vers num="2.7.6"/>
        <vers num="2.7.7"/>
        <vers num="2.7.8"/>
        <vers num="2.7.9"/>
        <vers num="2.8.0"/>
        <vers num="2.8.1"/>
        <vers num="2.8.2"/>
        <vers num="2.8.3"/>
        <vers num="2.8.4"/>
        <vers num="2.8.5"/>
        <vers num="2.8.6"/>
        <vers num="2.8.7"/>
        <vers num="2.8.8"/>
        <vers num="2.8.9"/>
        <vers num="2.9.0"/>
        <vers num="2.9.1"/>
        <vers num="2.9.2"/>
        <vers num="2.9.3"/>
        <vers num="2.9.4"/>
        <vers num="2.9.5"/>
        <vers num="2.9.6"/>
        <vers num="2.9.7"/>
        <vers num="2.9.8"/>
        <vers num="2.9.9"/>
        <vers num="3.0.0"/>
        <vers num="3.0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1721" seq="2008-1721" published="2008-04-10" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Integer signedness error in the zlib extension module in Python 2.5.2 and earlier allows remote attackers to execute arbitrary code via a negative signed integer, which triggers insufficient memory allocation and a buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.python.org/issue2586">http://bugs.python.org/issue2586</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html">APPLE-SA-2009-02-12</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200807-01.xml">GLSA-200807-01</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3802">3802</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.525289">SSA:2008-217-01</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3438">http://support.apple.com/kb/HT3438</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/css/P8/documents/100074697">http://support.avaya.com/css/P8/documents/100074697</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0149">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0149</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1551">DSA-1551</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1620">DSA-1620</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:085">MDVSA-2008:085</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490690/100/0/threaded">20080409 IOActive Security Advisory: Buffer overflow in Python zlib extension module</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/507985/100/0/threaded">20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28715">28715</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019823">1019823</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-632-1">USN-632-1</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2009-0016.html">http://www.vmware.com/security/advisories/VMSA-2009-0016.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1229/references">ADV-2008-1229</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/3316">ADV-2009-3316</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41748">zlib-pystringfromstringandsize-bo(41748)</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2444">https://issues.rpath.com/browse/RPL-2444</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8249">oval:org.mitre.oval:def:8249</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8494">oval:org.mitre.oval:def:8494</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9407">oval:org.mitre.oval:def:9407</ref>
    </refs>
    <vuln_soft>
      <prod name="python" vendor="python_software_foundation">
        <vers num="2.5.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1722" seq="2008-1722" published="2008-04-10" modified="2018-10-03" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Multiple integer overflows in (1) filter/image-png.c and (2) filter/image-zoom.c in CUPS 1.3 allow attackers to cause a denial of service (crash) and trigger memory corruption, as demonstrated via a crafted PNG image.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.cups.org/str.php?L2790" patch="1">http://www.cups.org/str.php?L2790</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1625">DSA-1625</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200804-23.xml">GLSA-200804-23</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/218395">VU#218395</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:170">MDVSA-2008:170</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2008_13_sr.html">SUSE-SR:2008:013</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28781">28781</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019854">1019854</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-606-1">USN-606-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1226/references">ADV-2008-1226</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41832">cups-imagepng-imagezoom-bo(41832)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8768">oval:org.mitre.oval:def:8768</ref>
      <ref source="REDHAT" url="https://rhn.redhat.com/errata/RHSA-2008-0498.html">RHSA-2008:0498</ref>
      <ref source="UBUNTU" url="https://usn.ubuntu.com/656-1/">USN-656-1</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00068.html">FEDORA-2008-3586</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00081.html">FEDORA-2008-3449</ref>
    </refs>
    <vuln_soft>
      <prod name="cups" vendor="cups">
        <vers num="1.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1724" seq="2008-1724" published="2008-04-11" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the IActiveXTransfer.FileTransfer method in the SecureTransport FileTransfer ActiveX control in vcst_en.dll 1.0.0.5 in Tumbleweed SecureTransport Server before 4.6.1 Hotfix 20 allows remote attackers to execute arbitrary code via a long remoteFile parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3806">3806</ref>
      <ref source="MISC" url="http://www.aushack.com/200708-tumbleweed.txt">http://www.aushack.com/200708-tumbleweed.txt</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490536/100/0/threaded">20080407 Tumbleweed SecureTransport FileTransfer ActiveX Control Buffer Overflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28662">28662</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1165/references">ADV-2008-1165</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41692">securetransport-filetransfer-activex-bo(41692)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5398">5398</ref>
    </refs>
    <vuln_soft>
      <prod name="securetransport_server_app" vendor="tumbleweed">
        <vers num="4.6.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1725" seq="2008-1725" published="2008-04-11" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="9.0" CVSS_base_score="9.0" CVSS_impact_subscore="9.5" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:C/A:C)">
    <desc>
      <descript source="cve">The IBizEBank.FIProfile.1 ActiveX control in fiprofile20.ocx in IBiz E-Banking Integrator (formerly IBiz OFX Integrator) 2.0.2932 exposes the unsafe WriteOFXDataFile method, which allows remote attackers to overwrite arbitrary files via a full pathname in the argument.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28700">28700</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41752">ibiz-fiprofile20-file-overwrite(41752)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5416">5416</ref>
    </refs>
    <vuln_soft>
      <prod name="ibiz_e-banking_integrator" vendor="nsoftware">
        <vers num="2.0.2932"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1726" seq="2008-1726" published="2008-04-11" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in KnowledgeQuest 2.6, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary SQL commands via the (1) kqid parameter to (a) articletext.php and (b) articletextonly.php and the (2) username parameter to (c) logincheck.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28713">28713</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28716">28716</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41746">knowledgequest-kqid-username-sql-injection(41746)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5421">5421</ref>
    </refs>
    <vuln_soft>
      <prod name="knowledgequest" vendor="myknowledgequest">
        <vers num="2.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1727" seq="2008-1727" published="2008-04-11" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">KnowledgeQuest 2.5 and 2.6 does not require authentication for access to admincheck.php, which allows remote attackers to create arbitrary admin accounts.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41747">knowledgequest-admincheck-security-bypass(41747)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5418">5418</ref>
    </refs>
    <vuln_soft>
      <prod name="knowledgequest" vendor="myknowledgequest">
        <vers num="2.5"/>
        <vers num="2.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1728" seq="2008-1728" published="2008-04-11" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.0" CVSS_base_score="4.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">ConnectionManagerImpl.java in Ignite Realtime Openfire 3.4.5 allows remote authenticated users to cause a denial of service (daemon outage) by triggering large outgoing queues without reading messages.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200804-26.xml">GLSA-200804-26</ref>
      <ref source="CONFIRM" url="http://www.igniterealtime.org/builds/openfire/docs/latest/changelog.html">http://www.igniterealtime.org/builds/openfire/docs/latest/changelog.html</ref>
      <ref source="MISC" url="http://www.igniterealtime.org/fisheye/changelog/svn-org?cs=10031">http://www.igniterealtime.org/fisheye/changelog/svn-org?cs=10031</ref>
      <ref source="CONFIRM" url="http://www.igniterealtime.org/issues/browse/JM-1289" adv="1">http://www.igniterealtime.org/issues/browse/JM-1289</ref>
      <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/04/10/7">[oss-security] 20080411 CVE request: openfire &lt;3.5.0 Denial of Service</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28722">28722</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1188/references">ADV-2008-1188</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41744">openfire-connectionmanagerImpljava-dos(41744)</ref>
    </refs>
    <vuln_soft>
      <prod name="openfire" vendor="ignite_realtime">
        <vers num="3.4.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1729" seq="2008-1729" published="2008-04-11" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.8" CVSS_base_score="5.8" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">The menu system in Drupal 6 before 6.2 has incorrect menu settings, which allows remote attackers to (1) edit the profile pages of arbitrary users, and obtain sensitive information from (2) tracker and (3) blog pages, related to a missing check for the "access content" permission; and (4) allows remote authenticated users, with administration page view access, to edit content types.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://drupal.org/node/244637" adv="1" patch="1">http://drupal.org/node/244637</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28714" patch="1">28714</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1185/references">ADV-2008-1185</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41755">drupal-menusystem-security-bypass(41755)</ref>
    </refs>
    <vuln_soft>
      <prod name="drupal" vendor="drupal">
        <vers num="6.0" edition="beta1"/>
        <vers num="6.0" edition="beta2"/>
        <vers num="6.0" edition="beta3"/>
        <vers num="6.0" edition="beta4"/>
        <vers num="6.0" edition="rc-1"/>
        <vers num="6.0" edition="rc-2"/>
        <vers num="6.0" edition="rc-3"/>
        <vers num="6.0" edition="rc-4"/>
        <vers num="6.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1730" seq="2008-1730" published="2008-04-11" modified="2017-10-18" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in download.html in ARWScripts Gallery Script Lite (aka gallery-script-lite or Free Photo Gallery Site Script), as of 20080411, allows remote attackers to read arbitrary local files via directory traversal sequences in the path parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28718">28718</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41742">galleryscriptlite-path-info-disclosure(41742)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5419">5419</ref>
    </refs>
    <vuln_soft>
      <prod name="gallery_script_lite" vendor="arwscripts">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1731" seq="2008-1731" published="2008-04-11" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The Simple Access module for Drupal 5.x through 5.x-1.2-2 does not properly handle the privacy information for nodes, which might allow remote attackers to bypass intended access restrictions, and read or modify nodes, in opportunistic circumstances related to interaction between Simple Access and (1) Node clone or (2) Project issue tracking.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://drupal.org/node/244560" adv="1" patch="1">http://drupal.org/node/244560</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28720" patch="1">28720</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1184">ADV-2008-1184</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41756">simpleaccess-privacy-info-disclosure(41756)</ref>
    </refs>
    <vuln_soft>
      <prod name="simple_access" vendor="3281d">
        <vers num="5.x-1.0"/>
        <vers num="5.x-1.0-beta1"/>
        <vers num="5.x-1.1"/>
        <vers num="5.x-1.2"/>
        <vers num="5.x-1.2-1"/>
        <vers num="5.x-1.x-dev"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1732" seq="2008-1732" published="2008-04-11" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in showpredictionsformatch.php in Prediction Football 1.x allows remote attackers to execute arbitrary SQL commands via the matchid parameter in a dupa action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28704">28704</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1160/references">ADV-2008-1160</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41728">predictionfootball-matchid-sql-injection(41728)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5410">5410</ref>
    </refs>
    <vuln_soft>
      <prod name="predictionfootball" vendor="predictionfootball">
        <vers num="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1733" seq="2008-1733" published="2008-04-11" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in puarcade.class.php 2.2 and earlier in the Pragmatic Utopia PU Arcade (com_puarcade) component for Joomla! allows remote attackers to execute arbitrary SQL commands via the gid parameter to index.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3807">3807</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490626/100/0/threaded">20080409 Pu Arcade component for Joomla - SQL injection</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28701">28701</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41726">puarcade-gid-sql-injection(41726)</ref>
    </refs>
    <vuln_soft>
      <prod name="com_puarcade" vendor="pragmaticutopia">
        <vers num="2.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1734" seq="2008-1734" published="2008-04-18" modified="2017-08-07" severity="Low" CVSS_version="2.0" CVSS_score="3.6" CVSS_base_score="3.6" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:P)">
    <desc>
      <descript source="cve">Interpretation conflict in PHP Toolkit before 1.0.1 on Gentoo Linux might allow local users to cause a denial of service (PHP outage) and read contents of PHP scripts by creating a file with a one-letter lowercase alphabetic name, which triggers interpretation of a certain unquoted [a-z] argument as a matching shell glob for this name, rather than interpretation as the literal [a-z] regular-expression string, and consequently blocks the launch of the PHP interpreter within the Apache HTTP Server.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugs.gentoo.org/show_bug.cgi?id=209535">http://bugs.gentoo.org/show_bug.cgi?id=209535</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200804-19.xml">GLSA-200804-19</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28844">28844</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41928">phptoolkit-phpselect-dos(41928)</ref>
    </refs>
    <vuln_soft>
      <prod name="php_toolkit" vendor="gentoo">
        <vers num="1.0" prev="1" edition="rc1"/>
        <vers num="1.0" prev="1" edition="rc2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1735" seq="2008-1735" published="2008-04-29" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.9" CVSS_base_score="4.9" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">BitDefender Antivirus 2008 20080118 and earlier allows local users to cause a denial of service (system crash) via an invalid pointer to the CLIENT_ID structure in a call to the NtOpenProcess hooked System Service Descriptor Table (SSDT) function.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MISC" url="http://kb.bitdefender.com/KB419-en--Security-vulnerability-in-BitDefender-2008.html" patch="1">http://kb.bitdefender.com/KB419-en--Security-vulnerability-in-BitDefender-2008.html</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3838">3838</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019943">1019943</ref>
      <ref source="MISC" url="http://www.coresecurity.com/?action=item&amp;id=2249">http://www.coresecurity.com/?action=item&amp;id=2249</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491405/100/0/threaded">20080428 CORE-2008-0320 - Insufficient argument validation of hooked SSDT functions on multiple Antivirus and Firewalls</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28741">28741</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1384">ADV-2008-1384</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42081">bitdefender-ssdt-dos(42081)</ref>
    </refs>
    <vuln_soft>
      <prod name="antivirus" vendor="bitdefender">
        <vers num="2008"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1736" seq="2008-1736" published="2008-04-29" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Comodo Firewall Pro before 3.0 does not properly validate certain parameters to hooked System Service Descriptor Table (SSDT) functions, which allows local users to cause a denial of service (system crash) via (1) a crafted OBJECT_ATTRIBUTES structure in a call to the NtDeleteFile function, which leads to improper validation of a ZwQueryObject result; and unspecified calls to the (2) NtCreateFile and (3) NtSetThreadContext functions, different vectors than CVE-2007-0709.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3838">3838</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019944">1019944</ref>
      <ref source="MISC" url="http://www.coresecurity.com/?action=item&amp;id=2249">http://www.coresecurity.com/?action=item&amp;id=2249</ref>
      <ref source="MISC" url="http://www.personalfirewall.comodo.com/release_notes.html">http://www.personalfirewall.comodo.com/release_notes.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491405/100/0/threaded">20080428 CORE-2008-0320 - Insufficient argument validation of hooked SSDT functions on multiple Antivirus and Firewalls</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28742" patch="1">28742</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1383">ADV-2008-1383</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42082">comodo-ssdt-dos(42082)</ref>
    </refs>
    <vuln_soft>
      <prod name="comodo_personal_firewall" vendor="comodo">
        <vers num="2.4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1737" seq="2008-1737" published="2008-04-29" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.9" CVSS_base_score="6.9" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Sophos Anti-Virus 7.0.5, and other 7.x versions, when Runtime Behavioural Analysis is enabled, allows local users to cause a denial of service (reboot with the product disabled) and possibly gain privileges via a zero value in a certain length field in the ObjectAttributes argument to the NtCreateKey hooked System Service Descriptor Table (SSDT) function.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3838">3838</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019945">1019945</ref>
      <ref source="MISC" url="http://www.coresecurity.com/?action=item&amp;id=2249">http://www.coresecurity.com/?action=item&amp;id=2249</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491405/100/0/threaded">20080428 CORE-2008-0320 - Insufficient argument validation of hooked SSDT functions on multiple Antivirus and Firewalls</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28743">28743</ref>
      <ref source="CONFIRM" url="http://www.sophos.com/support/knowledgebase/article/37810.html">http://www.sophos.com/support/knowledgebase/article/37810.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1381">ADV-2008-1381</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42083">sophos-ssdt-dos(42083)</ref>
    </refs>
    <vuln_soft>
      <prod name="anti-virus" vendor="sophos">
        <vers num="7.0.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1738" seq="2008-1738" published="2008-04-29" modified="2018-10-11" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Rising Antivirus 2008 before 20.38.20 allows local users to cause a denial of service (system crash) via an invalid pointer to the _CLIENT_ID structure in a call to the NtOpenProcess hooked System Service Descriptor Table (SSDT) function.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3838">3838</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019946">1019946</ref>
      <ref source="MISC" url="http://www.coresecurity.com/?action=item&amp;id=2249">http://www.coresecurity.com/?action=item&amp;id=2249</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491405/100/0/threaded">20080428 CORE-2008-0320 - Insufficient argument validation of hooked SSDT functions on multiple Antivirus and Firewalls</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28744">28744</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1382">ADV-2008-1382</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42084">risingantivirus-ssdt-dos(42084)</ref>
    </refs>
    <vuln_soft>
      <prod name="rising_antivirus" vendor="rising-global">
        <vers num="20.38.20" prev="1" edition="2008"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1739" seq="2008-1739" published="2008-09-03" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Apple QuickTime before 7.4.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted ftyp atoms in a movie file, which triggers memory corruption.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT1241">http://support.apple.com/kb/HT1241</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/45144">apple-quicktime-ftyp-code-execution(45144)</ref>
    </refs>
    <vuln_soft>
      <prod name="quicktime" vendor="apple">
        <vers num="-"/>
        <vers num="3.0"/>
        <vers num="5.0"/>
        <vers num="5.0.1"/>
        <vers num="5.0.2"/>
        <vers num="6.0"/>
        <vers num="6.1"/>
        <vers num="6.5"/>
        <vers num="6.5.1"/>
        <vers num="6.5.2"/>
        <vers num="7.0"/>
        <vers num="7.0.1"/>
        <vers num="7.0.2"/>
        <vers num="7.0.3"/>
        <vers num="7.0.4"/>
        <vers num="7.1"/>
        <vers num="7.1.1"/>
        <vers num="7.1.2"/>
        <vers num="7.1.3"/>
        <vers num="7.1.4"/>
        <vers num="7.1.5"/>
        <vers num="7.1.6"/>
        <vers num="7.2"/>
        <vers num="7.3"/>
        <vers num="7.3.1"/>
        <vers num="7.3.1.70"/>
        <vers num="7.4"/>
        <vers num="7.4.1"/>
        <vers num="7.4.4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1740" seq="2008-1740" published="2008-05-16" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">The Presence Engine (PE) service in Cisco Unified Presence before 6.0(1) allows remote attackers to cause a denial of service (core dump and service interruption) via an unspecified "stress test," aka Bug ID CSCsh20972.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020023">1020023</ref>
      <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_advisory09186a0080995682.shtml" patch="1">20080514 Cisco Unified Presence Denial of Service Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29220">29220</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1534">ADV-2008-1534</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42412">cisco-unifiedpresence-presenceengine-dos(42412)</ref>
    </refs>
    <vuln_soft>
      <prod name="unified_presence" vendor="cisco">
        <vers num="6.0_1"/>
        <vers num="6.0_2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1741" seq="2008-1741" published="2008-05-16" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">The SIP Proxy (SIPD) service in Cisco Unified Presence before 6.0(3) allows remote attackers to cause a denial of service (core dump and service interruption) via a TCP port scan, aka Bug ID CSCsj64533.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020023">1020023</ref>
      <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_advisory09186a0080995682.shtml" patch="1">20080514 Cisco Unified Presence Denial of Service Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29222">29222</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1534">ADV-2008-1534</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42413">cisco-unifiedpresence-sipproxy-dos(42413)</ref>
    </refs>
    <vuln_soft>
      <prod name="unified_presence" vendor="cisco">
        <vers num="6.0_1"/>
        <vers num="6.0_2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1742" seq="2008-1742" published="2008-05-16" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Memory leak in the Certificate Trust List (CTL) Provider service in Cisco Unified Communications Manager (CUCM) 5.x before 5.1(3) allows remote attackers to cause a denial of service (memory consumption and service interruption) via a series of malformed TCP packets, as demonstrated by TCPFUZZ, aka Bug ID CSCsj80609.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020022">1020022</ref>
      <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_advisory09186a0080995688.shtml">20080514 Cisco Unified Communications Manager Denial of Service Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29221">29221</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1533">ADV-2008-1533</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42410">cucm-ctlprovider-dos(42410)</ref>
    </refs>
    <vuln_soft>
      <prod name="unified_communications_manager" vendor="cisco">
        <vers num="4.1"/>
        <vers num="4.2"/>
        <vers num="4.3"/>
        <vers num="5.1" edition="(1)"/>
        <vers num="5.1" edition="(2)"/>
        <vers num="5.1" edition="(2a)"/>
        <vers num="5.1" edition="(2b)"/>
        <vers num="5.1" edition="(3a)"/>
        <vers num="6.0" edition="(1)"/>
        <vers num="6.0" edition="(1a)"/>
        <vers num="6.1" edition="(1a)"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1743" seq="2008-1743" published="2008-05-16" modified="2018-10-31" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Memory leak in the Certificate Trust List (CTL) Provider service in Cisco Unified Communications Manager (CUCM) 5.x before 5.1(3) and 6.x before 6.1(1) allows remote attackers to cause a denial of service (memory consumption and service interruption) via a series of malformed TCP packets, aka Bug ID CSCsi98433.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020022" adv="1">1020022</ref>
      <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_advisory09186a0080995688.shtml" adv="1">20080514 Cisco Unified Communications Manager Denial of Service Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29221" adv="1">29221</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1533" adv="1">ADV-2008-1533</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42414" adv="1">cucm-ctl-dos(42414)</ref>
    </refs>
    <vuln_soft>
      <prod name="unified_communications_manager" vendor="cisco">
        <vers num="5.0"/>
        <vers num="5.1"/>
        <vers num="5.1(1)"/>
        <vers num="5.1(1b)"/>
        <vers num="5.1(1c)"/>
        <vers num="5.1(2)"/>
        <vers num="5.1(2a)"/>
        <vers num="5.1(2b)"/>
        <vers num="6.0"/>
        <vers num="6.0(1)"/>
        <vers num="6.0(1a)"/>
        <vers num="6.0(1b)"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1744" seq="2008-1744" published="2008-05-16" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">The Certificate Authority Proxy Function (CAPF) service in Cisco Unified Communications Manager (CUCM) 4.1 before 4.1(3)SR7, 4.2 before 4.2(3)SR4, and 4.3 before 4.3(2) allows remote attackers to cause a denial of service (service crash) via malformed network traffic, aka Bug ID CSCsk46770.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020022">1020022</ref>
      <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_advisory09186a0080995688.shtml">20080514 Cisco Unified Communications Manager Denial of Service Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29221">29221</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1533">ADV-2008-1533</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42415">cucm-capf-dos(42415)</ref>
    </refs>
    <vuln_soft>
      <prod name="unified_callmanager" vendor="cisco">
        <vers num="4.1"/>
        <vers num="4.1_3_sr4"/>
        <vers num="4.1_3_sr5"/>
        <vers num="4.1_3_sr5b"/>
        <vers num="4.1_3_sr5c"/>
      </prod>
      <prod name="unified_communications_manager" vendor="cisco">
        <vers num="4.2_3_sr2"/>
        <vers num="4.2_3_sr2b"/>
        <vers num="4.2_3_sr3"/>
        <vers num="4.3"/>
        <vers num="4.3_1_sr1"/>
        <vers num="5.1_1"/>
        <vers num="5.1_2"/>
        <vers num="5.1_2a"/>
        <vers num="5.1_2b"/>
        <vers num="5.1_3a"/>
        <vers num="6.0"/>
        <vers num="6.0_1"/>
        <vers num="6.0_1a"/>
        <vers num="6.1"/>
        <vers num="6.1_1a"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1745" seq="2008-1745" published="2008-05-16" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Cisco Unified Communications Manager (CUCM) 5.x before 5.1(2) and 6.x before 6.1(1) allows remote attackers to cause a denial of service (service interruption) via a SIP JOIN message with a malformed header, aka Bug ID CSCsi48115.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020022">1020022</ref>
      <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_advisory09186a0080995688.shtml">20080514 Cisco Unified Communications Manager Denial of Service Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29221">29221</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1533">ADV-2008-1533</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42417">cucm-sip-join-dos(42417)</ref>
    </refs>
    <vuln_soft>
      <prod name="unified_communications_manager" vendor="cisco">
        <vers num="4.1" edition="(3)sr.5"/>
        <vers num="4.1" edition="(3)sr4"/>
        <vers num="4.1" edition="(3)sr5"/>
        <vers num="4.1" edition="(3)sr5b"/>
        <vers num="4.1" edition="(3)sr5c"/>
        <vers num="4.2" edition="4.2(3)sr.2"/>
        <vers num="4.2" edition="4.2_(3)sr2b"/>
        <vers num="4.2" edition="4.2_(3)sr3"/>
        <vers num="4.3" edition="4.3(1)sr.1"/>
        <vers num="5.1" edition="(1)"/>
        <vers num="5.1" edition="(2)"/>
        <vers num="5.1" edition="(2a)"/>
        <vers num="5.1" edition="(2b)"/>
        <vers num="5.1" edition="(3a)"/>
        <vers num="6.0" edition="(1)"/>
        <vers num="6.0" edition="(1a)"/>
        <vers num="6.1" edition="(1a)"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1746" seq="2008-1746" published="2008-05-16" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">The SNMP Trap Agent service in Cisco Unified Communications Manager (CUCM) 4.1 before 4.1(3)SR6, 4.2 before 4.2(3)SR3, 4.3 before 4.3(2), 5.x before 5.1(3), and 6.x before 6.1(1) allows remote attackers to cause a denial of service (core dump and service restart) via a series of malformed UDP packets, as demonstrated by the IP Stack Integrity Checker (ISIC), aka Bug ID CSCsj24113.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020022">1020022</ref>
      <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_advisory09186a0080995688.shtml">20080514 Cisco Unified Communications Manager Denial of Service Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29221">29221</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1533">ADV-2008-1533</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42420">cucm-snmp-dos(42420)</ref>
    </refs>
    <vuln_soft>
      <prod name="unified_communications_manager" vendor="cisco">
        <vers num="4.1" edition="(3)sr.5"/>
        <vers num="4.1" edition="(3)sr4"/>
        <vers num="4.1" edition="(3)sr5"/>
        <vers num="4.1" edition="(3)sr5b"/>
        <vers num="4.1" edition="(3)sr5c"/>
        <vers num="4.2" edition="4.2(3)sr.2"/>
        <vers num="4.2" edition="4.2_(3)sr2b"/>
        <vers num="4.2" edition="4.2_(3)sr3"/>
        <vers num="4.3" edition="4.3(1)sr.1"/>
        <vers num="5.1" edition="(1)"/>
        <vers num="5.1" edition="(2)"/>
        <vers num="5.1" edition="(2a)"/>
        <vers num="5.1" edition="(2b)"/>
        <vers num="6.0"/>
        <vers num="6.1" edition="(1a)"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1747" seq="2008-1747" published="2008-05-16" modified="2019-07-31" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Cisco Unified Communications Manager 4.1 before 4.1(3)SR6, 4.2 before 4.2(3)SR3, 4.3 before 4.3(2), 5.x before 5.1(3), and 6.x before 6.1(1) allows remote attackers to cause a denial of service (CCM service restart) via an unspecified SIP INVITE message, aka Bug ID CSCsk46944.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020022" adv="1">1020022</ref>
      <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_advisory09186a0080995688.shtml" adv="1">20080514 Cisco Unified Communications Manager Denial of Service Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29221" adv="1">29221</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1533">ADV-2008-1533</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42418" adv="1">cucm-sip-dos(42418)</ref>
    </refs>
    <vuln_soft>
      <prod name="unified_communications_manager" vendor="cisco">
        <vers num="4.1(3)"/>
        <vers num="4.1(3)sr1"/>
        <vers num="4.1(3)sr2"/>
        <vers num="4.1(3)sr3"/>
        <vers num="4.1(3)sr4"/>
        <vers num="4.2"/>
        <vers num="4.3"/>
        <vers num="4.3(1)"/>
        <vers num="5.0"/>
        <vers num="5.1"/>
        <vers num="5.1(1)"/>
        <vers num="5.1(1b)"/>
        <vers num="5.1(1c)"/>
        <vers num="5.1(2)"/>
        <vers num="5.1(2a)"/>
        <vers num="5.1(2b)"/>
        <vers num="6.0"/>
        <vers num="6.0(1)"/>
        <vers num="6.0(1a)"/>
        <vers num="6.0(1b)"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1748" seq="2008-1748" published="2008-05-16" modified="2019-08-01" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Cisco Unified Communications Manager 4.1 before 4.1(3)SR7, 4.2 before 4.2(3)SR4, 4.3 before 4.3(2), 5.x before 5.1(3), and 6.x before 6.1(1) does not properly validate SIP URLs, which allows remote attackers to cause a denial of service (service interruption) via a SIP INVITE message, aka Bug ID CSCsl22355.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020022" adv="1">1020022</ref>
      <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_advisory09186a0080995688.shtml" adv="1" patch="1">20080514 Cisco Unified Communications Manager Denial of Service Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29221" adv="1">29221</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1533">ADV-2008-1533</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42419" adv="1">cucm-invite-dos(42419)</ref>
    </refs>
    <vuln_soft>
      <prod name="unified_communications_manager" vendor="cisco">
        <vers num="4.1(3)"/>
        <vers num="4.1(3)sr1"/>
        <vers num="4.1(3)sr2"/>
        <vers num="4.1(3)sr3"/>
        <vers num="4.1(3)sr4"/>
        <vers num="4.2"/>
        <vers num="4.3"/>
        <vers num="4.3(1)"/>
        <vers num="5.0"/>
        <vers num="5.1"/>
        <vers num="5.1(1)"/>
        <vers num="5.1(1b)"/>
        <vers num="5.1(1c)"/>
        <vers num="5.1(2)"/>
        <vers num="5.1(2a)"/>
        <vers num="5.1(2b)"/>
        <vers num="6.0"/>
        <vers num="6.0(1)"/>
        <vers num="6.0(1a)"/>
        <vers num="6.0(1b)"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1749" seq="2008-1749" published="2008-05-14" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Memory leak in Cisco Content Switching Module (CSM) 4.2(3) up to 4.2(8) and Cisco Content Switching Module with SSL (CSM-S) 2.1(2) up to 2.1(7) allows remote attackers to cause a denial of service (memory consumption) via TCP segments with an unspecified combination of TCP flags.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_advisory09186a0080995684.shtml" patch="1">20080514 Cisco Content Switching Module Memory Leak Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29216">29216</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020021">1020021</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1532/references">ADV-2008-1532</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42409">cisco-csm-csms-dos(42409)</ref>
    </refs>
    <vuln_soft>
      <prod name="cisco_content_switching_module" vendor="cisco">
        <vers num="4.2.3"/>
        <vers num="4.2.3a"/>
        <vers num="4.2.4"/>
        <vers num="4.2.5"/>
        <vers num="4.2.6"/>
        <vers num="4.2.7"/>
        <vers num="4.2.8"/>
      </prod>
      <prod name="cisco_content_switching_module_ssl" vendor="cisco">
        <vers num="2.1.2"/>
        <vers num="2.1.3"/>
        <vers num="2.1.4"/>
        <vers num="2.1.5"/>
        <vers num="2.1.6"/>
        <vers num="2.1.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1750" seq="2008-1750" published="2008-04-11" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in Integry Systems LiveCart 1.1.1 and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter to the /category URI.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://livecart.com/news/LiveCart-1-1-2-released.12" adv="1">http://livecart.com/news/LiveCart-1-1-2-released.12</ref>
      <ref source="BUGTRAQ" url="http://seclists.org/bugtraq/2008/May/0021.html">20080503 Fixed: LiveCart SQL injection vulnerability fixed since version 1.1.2</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28723">28723</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41750">livecart-id-sql-injection(41750)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5422">5422</ref>
    </refs>
    <vuln_soft>
      <prod name="livecart" vendor="livecart">
        <vers num="1.0.1"/>
        <vers num="1.1.0"/>
        <vers num="1.1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1751" seq="2008-1751" published="2008-04-11" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple directory traversal vulnerabilities in index.php in Ksemail allow remote attackers to read arbitrary local files via a .. (dot dot) in the (1) language and (2) lang parameters.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28724">28724</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41749">ksemail-index-file-include(41749)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5423">5423</ref>
    </refs>
    <vuln_soft>
      <prod name="ksemail" vendor="ksemail">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1752" seq="2008-1752" published="2008-04-11" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">ezRADIUS 0.1 stores sensitive information under the web root with insufficient access control, which allows remote attackers to obtain credentials via a direct request for (1) config.ini or (2) database.ini.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/forum/forum.php?forum_id=809832">http://sourceforge.net/forum/forum.php?forum_id=809832</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=591272&amp;group_id=221332">http://sourceforge.net/project/shownotes.php?release_id=591272&amp;group_id=221332</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41767">ezradius-config-database-info-disclosure(41767)</ref>
    </refs>
    <vuln_soft>
      <prod name="ezradius" vendor="achmad_zaenuri">
        <vers num="0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1753" seq="2008-1753" published="2008-04-11" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in system/workplace/admin/workplace/sessions.jsp in Alkacon OpenCMS 7.0.3 allows remote attackers to inject arbitrary web script or HTML via the searchfilter parameter, a different vector than CVE-2008-1510.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3808">3808</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490498/100/0/threaded">20080405 Alkacon OpenCms sessions.jsp searchfilter XSS</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490710/100/0/threaded">20080410 Re: Alkacon OpenCms sessions.jsp searchfilter XSS</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28637">28637</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41675">opencms-sessions-xss(41675)</ref>
    </refs>
    <vuln_soft>
      <prod name="opencms" vendor="alkacon">
        <vers num="7.0.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1754" seq="2008-1754" published="2008-04-11" modified="2017-08-07" severity="Low" CVSS_version="2.0" CVSS_score="1.7" CVSS_base_score="1.7" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.1" CVSS_vector="(AV:L/AC:L/Au:S/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Symantec Altiris Deployment Solution before 6.9.164 stores the Deployment Solution Agent (aka AClient) password in cleartext in memory, which allows local users to obtain sensitive information by dumping the AClient.exe process memory.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://securityresponse.symantec.com/avcenter/security/Content/2008.04.10.html" patch="1">http://securityresponse.symantec.com/avcenter/security/Content/2008.04.10.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28707">28707</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019825">1019825</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1197/references">ADV-2008-1197</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41771">altiris-agent-aclient-info-disclosure(41771)</ref>
    </refs>
    <vuln_soft>
      <prod name="altiris_deployment_solution" vendor="symantec">
        <vers num="6.8" prev="1" edition="sp1"/>
        <vers num="6.8" prev="1" edition="sp2"/>
        <vers num="6.8.380"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1755" seq="2008-1755" published="2008-04-11" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in the showSource function in showSource.php in World of Phaos 4.0.1 allows remote attackers to read arbitrary files via directory traversal sequences in the file parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28719">28719</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41741">worldofphaos-showsource-info-disclosure(41741)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5420">5420</ref>
    </refs>
    <vuln_soft>
      <prod name="world_of_phaos" vendor="zekewalker">
        <vers num="4.0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1756" seq="2008-1756" published="2008-04-11" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.9" CVSS_base_score="4.9" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Qmaster daemon in Sun N1 Grid Engine 6.1 allows local users to cause a denial of service (daemon crash) via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-234822-1" adv="1" patch="1">234822</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28731">28731</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019830">1019830</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1196/references">ADV-2008-1196</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41763">sun-gridengine-qmaster-dos(41763)</ref>
    </refs>
    <vuln_soft>
      <prod name="n1_grid_engine" vendor="sun">
        <vers num="6.1" edition=":aix"/>
        <vers num="6.1" edition=":hp-ux"/>
        <vers num="6.1" edition=":irix"/>
        <vers num="6.1" edition=":linux"/>
        <vers num="6.1" edition=":mac_os"/>
        <vers num="6.1" edition=":sparc"/>
        <vers num="6.1" edition=":x86"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1757" seq="2008-1757" published="2008-04-12" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php in the ConcoursPhoto module for KwsPHP 1.0 allows remote attackers to inject arbitrary web script or HTML via the VIEW parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3809">3809</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490470/100/0/threaded">20080404 KwsPHP Module ConcoursPhoto XSS</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28612">28612</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41814">concoursphoto-index-xss(41814)</ref>
    </refs>
    <vuln_soft>
      <prod name="kwsphp" vendor="kwsphp">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1758" seq="2008-1758" published="2008-04-12" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the ConcoursPhoto module for KwsPHP allows remote attackers to execute arbitrary SQL commands via the C_ID parameter to index.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28738">28738</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41636">concoursphoto-cid-sql-injection(41636)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5353">5353</ref>
    </refs>
    <vuln_soft>
      <prod name="kwsphp" vendor="kwsphp">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1759" seq="2008-1759" published="2008-04-12" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the jeuxflash module for KwsPHP allows remote attackers to execute arbitrary SQL commands via the cat parameter to index.php, a different vector than CVE-2007-4922.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28601">28601</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41635">jeuxflash-cat-sql-injection(41635)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5352">5352</ref>
    </refs>
    <vuln_soft>
      <prod name="jeuxflash_module" vendor="jeuxflash">
        <vers num=""/>
      </prod>
      <prod name="kwsphp" vendor="kwsphp">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1760" seq="2008-1760" published="2008-04-12" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple PHP remote file inclusion vulnerabilities in Blogator-script before 1.01 allow remote attackers to execute arbitrary PHP code via a URL in the incl_page parameter in (1) struct_admin.php, (2) struct_admin_blog.php, and (3) struct_main.php in _blogadata/include.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.blogator-script.com/changelog.php">http://www.blogator-script.com/changelog.php</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28627">28627</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41660">blogatorscript-inclpage-file-include(41660)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5365">5365</ref>
    </refs>
    <vuln_soft>
      <prod name="blogator-script" vendor="blogator-script">
        <vers num="0.90"/>
        <vers num="0.91"/>
        <vers num="0.92"/>
        <vers num="0.93"/>
        <vers num="0.95"/>
        <vers num="1.00" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1761" seq="2008-1761" published="2008-04-12" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Opera before 9.27 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted newsfeed source, which triggers an invalid memory access.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00007.html">SUSE-SR:2008:009</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200804-14.xml">GLSA-200804-14</ref>
      <ref source="CONFIRM" url="http://www.opera.com/docs/changelogs/linux/927/" patch="1">http://www.opera.com/docs/changelogs/linux/927/</ref>
      <ref source="CONFIRM" url="http://www.opera.com/support/search/view/881/" adv="1">http://www.opera.com/support/search/view/881/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28585" patch="1">28585</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1084/references">ADV-2008-1084</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41625">opera-newsfeed-code-execution(41625)</ref>
    </refs>
    <vuln_soft>
      <prod name="opera" vendor="opera">
        <vers num="9.02"/>
        <vers num="9.10"/>
        <vers num="9.20"/>
        <vers num="9.21"/>
        <vers num="9.22"/>
        <vers num="9.23"/>
        <vers num="9.24"/>
        <vers num="9.25"/>
        <vers num="9.26" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1762" seq="2008-1762" published="2008-04-12" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Opera before 9.27 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted scaled image pattern in an HTML CANVAS element, which triggers memory corruption.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00007.html">SUSE-SR:2008:009</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200804-14.xml">GLSA-200804-14</ref>
      <ref source="CONFIRM" url="http://www.opera.com/docs/changelogs/linux/927/" adv="1" patch="1">http://www.opera.com/docs/changelogs/linux/927/</ref>
      <ref source="CONFIRM" url="http://www.opera.com/support/search/view/882/" adv="1" patch="1">http://www.opera.com/support/search/view/882/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28585" patch="1">28585</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1084/references" adv="1">ADV-2008-1084</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41627">opera-htmlcanvas-code-execution(41627)</ref>
    </refs>
    <vuln_soft>
      <prod name="opera_browser" vendor="opera">
        <vers num="5.0" edition="beta2"/>
        <vers num="5.0" edition="beta3"/>
        <vers num="5.0" edition="beta4"/>
        <vers num="5.0" edition="beta5"/>
        <vers num="5.0" edition="beta6"/>
        <vers num="5.0" edition="beta7"/>
        <vers num="5.0" edition="beta8"/>
        <vers num="5.02"/>
        <vers num="5.10"/>
        <vers num="5.11"/>
        <vers num="5.12"/>
        <vers num="6.0" edition="beta1"/>
        <vers num="6.0" edition="beta2"/>
        <vers num="6.0" edition="tp1"/>
        <vers num="6.0" edition="tp2"/>
        <vers num="6.0" edition="tp3"/>
        <vers num="6.01"/>
        <vers num="6.1" edition="beta1"/>
        <vers num="6.02"/>
        <vers num="6.03"/>
        <vers num="6.04"/>
        <vers num="6.05"/>
        <vers num="6.06"/>
        <vers num="6.11"/>
        <vers num="6.12"/>
        <vers num="7.0" edition="beta1"/>
        <vers num="7.0" edition="beta1_v2"/>
        <vers num="7.0" edition="beta2"/>
        <vers num="7.01"/>
        <vers num="7.02"/>
        <vers num="7.03"/>
        <vers num="7.10" edition="beta1"/>
        <vers num="7.11" edition="beta2"/>
        <vers num="7.20" edition="beta7"/>
        <vers num="7.21"/>
        <vers num="7.22"/>
        <vers num="7.23"/>
        <vers num="7.50" edition="beta1"/>
        <vers num="7.51"/>
        <vers num="7.52"/>
        <vers num="7.53"/>
        <vers num="7.54" edition="update1"/>
        <vers num="7.54" edition="update2"/>
        <vers num="7.60"/>
        <vers num="8.0" edition="beta1"/>
        <vers num="8.0" edition="beta2"/>
        <vers num="8.0" edition="beta3"/>
        <vers num="8.01"/>
        <vers num="8.02"/>
        <vers num="8.50"/>
        <vers num="8.51"/>
        <vers num="8.52"/>
        <vers num="8.53"/>
        <vers num="8.54"/>
        <vers num="9.0" edition="beta1"/>
        <vers num="9.0" edition="beta2"/>
        <vers num="9.01"/>
        <vers num="9.02"/>
        <vers num="9.10"/>
        <vers num="9.12"/>
        <vers num="9.20" edition="beta1"/>
        <vers num="9.21"/>
        <vers num="9.22"/>
        <vers num="9.23"/>
        <vers num="9.24"/>
        <vers num="9.25"/>
        <vers num="9.26" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1763" seq="2008-1763" published="2008-04-12" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in _blogadata/include/sond_result.php in Blogator-script 0.95 allows remote attackers to execute arbitrary SQL commands via the id_art parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.blogator-script.com/changelog.php">http://www.blogator-script.com/changelog.php</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490500/100/0/threaded">20080405 Blogator-script 0.95 SQL Injection Vulnerbility</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28635">28635</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41658">blogatorscript-sondresult-sql-injection(41658)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5368">5368</ref>
    </refs>
    <vuln_soft>
      <prod name="blogator_script" vendor="blogator_script">
        <vers num="0.95"/>
        <vers num="1.01"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1764" seq="2008-1764" published="2008-04-12" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Opera before 9.27 has unknown impact and attack vectors related to "keyboard handling of password inputs."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00007.html">SUSE-SR:2008:009</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200804-14.xml">GLSA-200804-14</ref>
      <ref source="CONFIRM" url="http://www.opera.com/docs/changelogs/linux/927/" adv="1" patch="1">http://www.opera.com/docs/changelogs/linux/927/</ref>
      <ref source="CONFIRM" url="http://www.opera.com/docs/changelogs/windows/927/" adv="1" patch="1">http://www.opera.com/docs/changelogs/windows/927/</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41834">opera-password-inputs-unspecified(41834)</ref>
    </refs>
    <vuln_soft>
      <prod name="opera" vendor="opera">
        <vers num="5..10"/>
        <vers num="5.0" edition="beta_2"/>
        <vers num="5.0" edition="beta_3"/>
        <vers num="5.0" edition="beta_4"/>
        <vers num="5.0" edition="beta_5"/>
        <vers num="5.0" edition="beta_6"/>
        <vers num="5.0" edition="beta_7"/>
        <vers num="5.0" edition="beta_8"/>
        <vers num="5.1"/>
        <vers num="5.02"/>
        <vers num="5.3"/>
        <vers num="5.4"/>
        <vers num="5.5"/>
        <vers num="5.6"/>
        <vers num="5.7"/>
        <vers num="5.8"/>
        <vers num="5.9"/>
        <vers num="5.10"/>
        <vers num="5.11"/>
        <vers num="5.12"/>
        <vers num="6" edition="beta_1"/>
        <vers num="6.0" edition="beta_1"/>
        <vers num="6.0" edition="beta_2"/>
        <vers num="6.0" edition="beta_3"/>
        <vers num="6.1"/>
        <vers num="6.02"/>
        <vers num="6.03"/>
        <vers num="6.04"/>
        <vers num="6.05"/>
        <vers num="6.06"/>
        <vers num="6.11"/>
        <vers num="6.12"/>
        <vers num="7" edition="beta_1"/>
        <vers num="7" edition="beta_1.2"/>
        <vers num="7.0" edition="beta_1"/>
        <vers num="7.0" edition="beta_1v2"/>
        <vers num="7.0" edition="beta_2"/>
        <vers num="7.01"/>
        <vers num="7.02"/>
        <vers num="7.03"/>
        <vers num="7.10"/>
        <vers num="7.11"/>
        <vers num="7.20" edition="beta7"/>
        <vers num="7.21"/>
        <vers num="7.22"/>
        <vers num="7.23"/>
        <vers num="7.30"/>
        <vers num="7.50" edition="beta_1"/>
        <vers num="7.51"/>
        <vers num="7.52"/>
        <vers num="7.53"/>
        <vers num="7.54" edition="update_1"/>
        <vers num="7.54" edition="update_2"/>
        <vers num="7.55"/>
        <vers num="8.0" edition="beta_1"/>
        <vers num="8.0" edition="beta_2"/>
        <vers num="8.0" edition="beta_3"/>
        <vers num="8.01"/>
        <vers num="8.02"/>
        <vers num="8.50"/>
        <vers num="8.51"/>
        <vers num="8.52"/>
        <vers num="8.53"/>
        <vers num="8.54"/>
        <vers num="9.0" edition="beta_1"/>
        <vers num="9.0" edition="beta_2"/>
        <vers num="9.01"/>
        <vers num="9.1tp"/>
        <vers num="9.02"/>
        <vers num="9.6"/>
        <vers num="9.10"/>
        <vers num="9.20" edition="beta_1"/>
        <vers num="9.21"/>
        <vers num="9.22"/>
        <vers num="9.23"/>
        <vers num="9.24"/>
        <vers num="9.25"/>
        <vers num="9.26" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1765" seq="2008-1765" published="2008-04-23" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in Adobe Photoshop Album Starter Edition 3.2, and possibly After Effects CS3, allows user-assisted remote attackers and physically proximate attackers to execute arbitrary code via a BMP file with an invalid image header.  NOTE: the related issue in Photoshop CS3 is already covered by CVE-2007-2244.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2008-04/0551.html">20080421 Adobe Unchecked Overflow</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019910">1019910</ref>
      <ref source="CONFIRM" url="http://www.adobe.com/support/security/advisories/apsa08-04.html" adv="1" patch="1">http://www.adobe.com/support/security/advisories/apsa08-04.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28874">28874</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1317">ADV-2008-1317</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41941">adobe-bmp-image-file-bo(41941)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5479">5479</ref>
    </refs>
    <vuln_soft>
      <prod name="photoshop" vendor="adobe">
        <vers num="3.2" edition=":starter"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1766" seq="2008-1766" published="2008-04-12" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple unspecified vulnerabilities in phpBB before 3.0.1 have unknown impact and attack vectors, related to "two minor security-related bugs."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.phpbb.com/community/viewtopic.php?f=14&amp;t=879735" patch="1">http://www.phpbb.com/community/viewtopic.php?f=14&amp;t=879735</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1236/references">ADV-2008-1236</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41886">phpbb-multiple-unspecified(41886)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpbb" vendor="phpbb">
        <vers num="3.0.0" prev="1" edition="rc3"/>
        <vers num="3.0.0" prev="1" edition="rc4"/>
        <vers num="3.0.0" prev="1" edition="rc5"/>
        <vers num="3.0.0" prev="1" edition="rc6"/>
        <vers num="3.0.0" prev="1" edition="rc7"/>
        <vers num="3.0.0" prev="1" edition="rc8"/>
        <vers num="3.0.0rc" edition="1"/>
        <vers num="3.0.0rc" edition="2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1767" seq="2008-1767" published="2008-05-23" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in pattern.c in libxslt before 1.1.24 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XSL style sheet file with a long XSLT "transformation match" condition that triggers a large number of steps.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugzilla.gnome.org/show_bug.cgi?id=527297">http://bugzilla.gnome.org/show_bug.cgi?id=527297</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Nov/msg00001.html">APPLE-SA-2008-11-13</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//Jul/msg00001.html">APPLE-SA-2008-07-11</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html">APPLE-SA-2008-10-09</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200806-02.xml">GLSA-200806-02</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3216">http://support.apple.com/kb/HT3216</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3298">http://support.apple.com/kb/HT3298</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1589">DSA-1589</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:151">MDVSA-2008:151</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2008_13_sr.html">SUSE-SR:2008:013</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0287.html">RHSA-2008:0287</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29312">29312</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/31681">31681</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020071">1020071</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-633-1">USN-633-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1580/references">ADV-2008-1580</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2094/references">ADV-2008-2094</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2780">ADV-2008-2780</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42560">libxslt-xsl-bo(42560)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9785">oval:org.mitre.oval:def:9785</ref>
    </refs>
    <vuln_soft>
      <prod name="desktop" vendor="redhat">
        <vers num="3"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="2.1" edition=":as"/>
        <vers num="2.1" edition=":es"/>
        <vers num="2.1" edition=":ws"/>
        <vers num="3.0" edition=":as"/>
        <vers num="3.0" edition=":es"/>
        <vers num="3.0" edition=":ws"/>
        <vers num="4.0" edition=":as"/>
        <vers num="4.0" edition=":es"/>
        <vers num="4.0" edition=":ws"/>
        <vers num="5.0" edition=":server"/>
      </prod>
      <prod name="enterprise_linux_desktop" vendor="redhat">
        <vers num="4"/>
        <vers num="5" edition=":client"/>
      </prod>
      <prod name="enterprise_linux_desktop_workstation" vendor="redhat">
        <vers num="5"/>
      </prod>
      <prod name="linux_advanced_workstation" vendor="redhat">
        <vers num="2.1" edition=":itanium"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1768" seq="2008-1768" published="2008-04-25" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple integer overflows in VLC before 0.8.6f allow remote attackers to cause a denial of service (crash) via the (1) MP4 demuxer, (2) Real demuxer, and (3) Cinepak codec, which triggers a buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200804-25.xml">GLSA-200804-25</ref>
      <ref source="CONFIRM" url="http://wiki.videolan.org/Changelog/0.8.6f">http://wiki.videolan.org/Changelog/0.8.6f</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28903">28903</ref>
      <ref source="CONFIRM" url="http://www.videolan.org/developers/vlc/NEWS">http://www.videolan.org/developers/vlc/NEWS</ref>
      <ref source="CONFIRM" url="http://www.videolan.org/security/sa0803.php">http://www.videolan.org/security/sa0803.php</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0985">ADV-2008-0985</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14412">oval:org.mitre.oval:def:14412</ref>
    </refs>
    <vuln_soft>
      <prod name="vlc" vendor="videolan">
        <vers num="0.1.99"/>
        <vers num="0.1.99a"/>
        <vers num="0.1.99b"/>
        <vers num="0.1.99c"/>
        <vers num="0.1.99d"/>
        <vers num="0.1.99e"/>
        <vers num="0.1.99f"/>
        <vers num="0.1.99g"/>
        <vers num="0.1.99h"/>
        <vers num="0.1.99i"/>
        <vers num="0.2.0"/>
        <vers num="0.2.50"/>
        <vers num="0.2.60"/>
        <vers num="0.2.61"/>
        <vers num="0.2.62"/>
        <vers num="0.2.63"/>
        <vers num="0.2.70"/>
        <vers num="0.2.71"/>
        <vers num="0.2.72"/>
        <vers num="0.2.73"/>
        <vers num="0.2.80"/>
        <vers num="0.2.81"/>
        <vers num="0.2.82"/>
        <vers num="0.2.83"/>
        <vers num="0.2.90"/>
        <vers num="0.2.91"/>
        <vers num="0.2.92"/>
        <vers num="0.3.0"/>
        <vers num="0.3.1"/>
        <vers num="0.4.0"/>
        <vers num="0.4.1"/>
        <vers num="0.4.2"/>
        <vers num="0.4.3"/>
        <vers num="0.4.3_ac3"/>
        <vers num="0.4.4"/>
        <vers num="0.4.5"/>
        <vers num="0.4.6"/>
        <vers num="0.5.0"/>
        <vers num="0.5.1"/>
        <vers num="0.5.2"/>
        <vers num="0.5.3"/>
        <vers num="0.6.0"/>
        <vers num="0.6.1"/>
        <vers num="0.6.2"/>
        <vers num="0.7.0"/>
        <vers num="0.7.1"/>
        <vers num="0.7.2"/>
        <vers num="0.8.0"/>
        <vers num="0.8.1"/>
        <vers num="0.8.2"/>
        <vers num="0.8.4"/>
        <vers num="0.8.4a"/>
        <vers num="0.8.5"/>
        <vers num="0.8.6"/>
        <vers num="0.8.6a"/>
        <vers num="0.8.6b"/>
        <vers num="0.8.6c"/>
        <vers num="0.8.6d"/>
        <vers num="0.8.6e"/>
        <vers num="0.8.1337"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1769" seq="2008-1769" published="2008-04-25" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">VLC before 0.8.6f allow remote attackers to cause a denial of service (crash) via a crafted Cinepak file that triggers an out-of-bounds array access and memory corruption.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugs.gentoo.org/show_bug.cgi?id=214627#c3">http://bugs.gentoo.org/show_bug.cgi?id=214627#c3</ref>
      <ref source="MISC" url="http://git.videolan.org/gitweb.cgi/vlc.git/?a=commit;h=cf489d7bff3c1b36b2d5501ecf21129c78104d98">http://git.videolan.org/gitweb.cgi/vlc.git/?a=commit;h=cf489d7bff3c1b36b2d5501ecf21129c78104d98</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200804-25.xml">GLSA-200804-25</ref>
      <ref source="CONFIRM" url="http://wiki.videolan.org/Changelog/0.8.6f">http://wiki.videolan.org/Changelog/0.8.6f</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28904">28904</ref>
      <ref source="CONFIRM" url="http://www.videolan.org/developers/vlc/NEWS">http://www.videolan.org/developers/vlc/NEWS</ref>
      <ref source="CONFIRM" url="http://www.videolan.org/security/sa0803.php">http://www.videolan.org/security/sa0803.php</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0985">ADV-2008-0985</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14445">oval:org.mitre.oval:def:14445</ref>
    </refs>
    <vuln_soft>
      <prod name="vlc" vendor="videolan">
        <vers num="0.1.99"/>
        <vers num="0.1.99a"/>
        <vers num="0.1.99b"/>
        <vers num="0.1.99c"/>
        <vers num="0.1.99d"/>
        <vers num="0.1.99e"/>
        <vers num="0.1.99f"/>
        <vers num="0.1.99g"/>
        <vers num="0.1.99h"/>
        <vers num="0.1.99i"/>
        <vers num="0.2.0"/>
        <vers num="0.2.50"/>
        <vers num="0.2.60"/>
        <vers num="0.2.61"/>
        <vers num="0.2.62"/>
        <vers num="0.2.63"/>
        <vers num="0.2.70"/>
        <vers num="0.2.71"/>
        <vers num="0.2.72"/>
        <vers num="0.2.73"/>
        <vers num="0.2.80"/>
        <vers num="0.2.81"/>
        <vers num="0.2.82"/>
        <vers num="0.2.83"/>
        <vers num="0.2.90"/>
        <vers num="0.2.91"/>
        <vers num="0.2.92"/>
        <vers num="0.3.0"/>
        <vers num="0.3.1"/>
        <vers num="0.4.0"/>
        <vers num="0.4.1"/>
        <vers num="0.4.2"/>
        <vers num="0.4.3"/>
        <vers num="0.4.3_ac3"/>
        <vers num="0.4.4"/>
        <vers num="0.4.5"/>
        <vers num="0.4.6"/>
        <vers num="0.5.0"/>
        <vers num="0.5.1"/>
        <vers num="0.5.2"/>
        <vers num="0.5.3"/>
        <vers num="0.6.0"/>
        <vers num="0.6.1"/>
        <vers num="0.6.2"/>
        <vers num="0.7.0"/>
        <vers num="0.7.1"/>
        <vers num="0.7.2"/>
        <vers num="0.8.0"/>
        <vers num="0.8.1"/>
        <vers num="0.8.2"/>
        <vers num="0.8.4"/>
        <vers num="0.8.4a"/>
        <vers num="0.8.5"/>
        <vers num="0.8.6"/>
        <vers num="0.8.6a"/>
        <vers num="0.8.6b"/>
        <vers num="0.8.6c"/>
        <vers num="0.8.6d"/>
        <vers num="0.8.6e"/>
        <vers num="0.8.1337"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1770" seq="2008-1770" published="2008-06-04" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">CRLF injection vulnerability in Akamai Download Manager ActiveX control before 2.2.3.6 allows remote attackers to force the download and execution of arbitrary files via a URL parameter containing an encoded LF followed by a malicious target line.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2008-June/062672.html">20080604 Akamai Technologies Security Advisory 2008-0001 (Download Manager)</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493077/100/0/threaded">20080604 Akamai Technologies Security Advisory 2008-0001 (Download Manager)</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493142/100/0/threaded">20080605 Akamai Download Manager File Downloaded To Arbitrary Location Vulnerability</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020194">1020194</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1746/references" adv="1">ADV-2008-1746</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42879">downloadmanager-url-code-execution(42879)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5741">5741</ref>
    </refs>
    <vuln_soft>
      <prod name="download_manager" vendor="akamai">
        <vers num="2.0.4.4"/>
        <vers num="2.2.0.0"/>
        <vers num="2.2.1.0"/>
        <vers num="2.2.3.5" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1771" seq="2008-1771" published="2008-04-16" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Integer overflow in the ws_getpostvars function in Firefly Media Server (formerly mt-daapd) 0.2.4.1 (0.9~r1696-1.2 on Debian) allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an HTTP POST request with a large Content-Length.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476241">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476241</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=593465&amp;group_id=98211">http://sourceforge.net/project/shownotes.php?release_id=593465&amp;group_id=98211</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1597">DSA-1597</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28860">28860</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019908">1019908</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1303/references">ADV-2008-1303</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41850">firefly-wsgetpostvars-bo(41850)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00446.html">FEDORA-2008-3250</ref>
    </refs>
    <vuln_soft>
      <prod name="fireflymediaserver" vendor="fireflymediaserver">
        <vers num="0.2.4.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1772" seq="2008-1772" published="2008-04-14" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">iScripts SocialWare stores passwords in cleartext in a database, which allows context-dependent attackers to obtain sensitive information.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41812">socialware-password-info-disclosure(41812)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5402">5402</ref>
    </refs>
    <vuln_soft>
      <prod name="socialware" vendor="iscripts">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1773" seq="2008-1773" published="2008-04-14" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in includes/header.inc.php in Dragoon 0.1 allows remote attackers to execute arbitrary PHP code via a URL in the root parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28660">28660</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41680">dragoon-headerinc-file-include(41680)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5393">5393</ref>
    </refs>
    <vuln_soft>
      <prod name="dragoon" vendor="dragoon">
        <vers num="0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1774" seq="2008-1774" published="2008-04-14" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in editlink.php in Pligg 9.9.0 allows remote attackers to execute arbitrary SQL commands via the id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28681">28681</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1164/references">ADV-2008-1164</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41709">pliggcms-editlink-sql-injection(41709)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5406">5406</ref>
    </refs>
    <vuln_soft>
      <prod name="pligg_cms" vendor="pligg">
        <vers num="9.9.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1775" seq="2008-1775" published="2008-04-14" modified="2017-08-07" severity="Low" CVSS_version="2.0" CVSS_score="3.5" CVSS_base_score="3.5" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="6.8" CVSS_vector="(AV:N/AC:M/Au:S/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in mindex.do in ManageEngine Firewall Analyzer 4.0.3 allows remote attackers to inject arbitrary web script or HTML via the displayName parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28604">28604</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41810">manageengine-mindex-xss(41810)</ref>
    </refs>
    <vuln_soft>
      <prod name="firewall_analyzer" vendor="manageengine">
        <vers num="4.0.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1776" seq="2008-1776" published="2008-04-14" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in modules/basicfog/basicfogfactory.class.php in PhpBlock A8.4 allows remote attackers to execute arbitrary PHP code via a URL in the PATH_TO_CODE parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28588">28588</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41616">phpblock-basicfogfactoryclass-file-include(41616)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5348">5348</ref>
    </refs>
    <vuln_soft>
      <prod name="phpblock" vendor="phpblock">
        <vers num="a8.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1777" seq="2008-1777" published="2008-04-14" modified="2011-03-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The eDirectory Host Environment service (dhost.exe) in Novell eDirectory 8.8.2 allows remote attackers to cause a denial of service (CPU consumption) via a long HTTP HEAD request to TCP port 8028.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.offensive-security.com/0day/novel-edir.py.txt">http://www.offensive-security.com/0day/novel-edir.py.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28572">28572</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019783">1019783</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1075">ADV-2008-1075</ref>
    </refs>
    <vuln_soft>
      <prod name="edirectory" vendor="novell">
        <vers num="8.8.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1778" seq="2008-1778" published="2008-04-14" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="6.6" CVSS_base_score="6.6" CVSS_impact_subscore="9.2" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the floating point context switch implementation in Sun Solaris 9 and 10 on x86 platforms might allow local users to cause a denial of service (application exit), corrupt data, or trigger incorrect calculations via unknown vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-233921-1">233921</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28733">28733</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019833">1019833</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1193/references">ADV-2008-1193</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41765">sun-solaris-floatingpoint-contextswitch-dos(41765)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4950">oval:org.mitre.oval:def:4950</ref>
    </refs>
    <vuln_soft>
      <prod name="sunos" vendor="sun">
        <vers num="5.9"/>
        <vers num="5.10"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1779" seq="2008-1779" published="2008-04-14" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Sun Solaris 8, 9, and 10 allows "remote privileged" users to cause a denial of service (panic) via unknown vectors related to self encapsulated IP packets.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-235901-1">235901</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2008-173.htm">http://support.avaya.com/elmodocs2/security/ASA-2008-173.htm</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28732">28732</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019831">1019831</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1192/references">ADV-2008-1192</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1325/references">ADV-2008-1325</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41762">sun-solaris-selfencapsulatedippackets-dos(41762)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4848">oval:org.mitre.oval:def:4848</ref>
    </refs>
    <vuln_soft>
      <prod name="solaris" vendor="sun">
        <vers num="8" edition=":sparc"/>
        <vers num="8" edition=":x86"/>
        <vers num="9" edition=":sparc"/>
        <vers num="9" edition=":x86"/>
        <vers num="10" edition=":sparc"/>
        <vers num="10" edition=":x86"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1780" seq="2008-1780" published="2008-04-14" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the labeled networking functionality in Solaris 10 Trusted Extensions allows applications in separate labeling zones to bypass labeling restrictions via unknown vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-235421-1">235421</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28734">28734</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019832">1019832</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1194/references">ADV-2008-1194</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41764">sun-solaris-extensions-security-bypass(41764)</ref>
    </refs>
    <vuln_soft>
      <prod name="solaris" vendor="sun">
        <vers num="10" edition=":sparc"/>
        <vers num="10" edition=":x86"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1781" seq="2008-1781" published="2008-04-15" modified="2008-09-10" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was withdrawn by its requester.  Further investigation showed that it was not a security issue.  Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2008-1782" seq="2008-1782" published="2008-04-15" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">phpdemo/viewsource.php in Advanced Software Engineering ChartDirector 4.1 allows remote attackers to read sensitive files via the file parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28674">28674</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1140/references">ADV-2008-1140</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41701">chartdirector-viewsource-info-disclosure(41701)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5399">5399</ref>
    </refs>
    <vuln_soft>
      <prod name="chartdirector" vendor="advanced_software_engineering">
        <vers num="4.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1783" seq="2008-1783" published="2008-04-15" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:P)">
    <desc>
      <descript source="cve">Prozilla Reviews 1.0 allows remote attackers to delete arbitrary users via a modified UserID parameter in a direct request to siteadmin/DeleteUser.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28642">28642</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1118/references">ADV-2008-1118</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41678">prozillareviews-deleteuser-weak-security(41678)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5387">5387</ref>
    </refs>
    <vuln_soft>
      <prod name="reviews" vendor="prozilla">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1784" seq="2008-1784" published="2008-04-15" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Prozilla Topsites 1.0 allows remote attackers to perform administrative actions via a direct request to (1) addu.php, (2) editu.php, and (3) uidx.php in siteadmin/.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28641">28641</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1117">ADV-2008-1117</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41679">prozillatopsites-multiple-security-bypass(41679)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5388">5388</ref>
    </refs>
    <vuln_soft>
      <prod name="topsites" vendor="prozilla">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1785" seq="2008-1785" published="2008-04-15" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="5.5" CVSS_base_score="5.5" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:N/I:P/A:P)">
    <desc>
      <descript source="cve">delete.php in Prozilla Top 100 1.2 allows remote authenticated users to delete statistics and accounts of arbitrary users via a modified s parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1119/references">ADV-2008-1119</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41674">prozillatop100-delete-weak-security(41674)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5384">5384</ref>
    </refs>
    <vuln_soft>
      <prod name="top_100" vendor="prozilla">
        <vers num="1.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1786" seq="2008-1786" published="2008-04-16" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The DSM gui_cm_ctrls ActiveX control (gui_cm_ctrls.ocx), as used in multiple CA products including BrightStor ARCServe Backup for Laptops and Desktops r11.5, Desktop Management Suite r11.1 through r11.2 C2; Unicenter r11.1 through r11.2 C2; and Desktop and Server Management r11.1 through r11.2 C2 allows remote attackers to execute arbitrary code via crafted function arguments.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://community.ca.com/blogs/casecurityresponseblog/archive/2008/04/16/ca-dsm-gui-cm-ctrls-activex-control-vulnerability.aspx" adv="1" patch="1">http://community.ca.com/blogs/casecurityresponseblog/archive/2008/04/16/ca-dsm-gui-cm-ctrls-activex-control-vulnerability.aspx</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/684883">VU#684883</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490959/100/0/threaded">20080416 CA DSM gui_cm_ctrls ActiveX Control Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28809" patch="1">28809</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019872">1019872</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1249/references" adv="1">ADV-2008-1249</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41853">ca-dsmguicmctrls-code-execution(41853)</ref>
      <ref source="CONFIRM" url="https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=174256" adv="1" patch="1">https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=174256</ref>
    </refs>
    <vuln_soft>
      <prod name="arcserve_backup_laptops_and_desktops" vendor="computer_associates">
        <vers num="r11.5"/>
      </prod>
      <prod name="desktop_and_server_management" vendor="computer_associates">
        <vers num="r11.1"/>
        <vers num="r11.2"/>
        <vers num="r11.2a"/>
        <vers num="r11.2c1"/>
        <vers num="r11.2c2"/>
      </prod>
      <prod name="desktop_management_suite" vendor="computer_associates">
        <vers num="r11.2"/>
        <vers num="r11.2a"/>
        <vers num="r11.2c1"/>
        <vers num="r11.2c2"/>
      </prod>
      <prod name="unicenter_asset_management" vendor="computer_associates">
        <vers num="r11.1"/>
        <vers num="r11.2"/>
        <vers num="r11.2a"/>
        <vers num="r11.2c1"/>
        <vers num="r11.2c2"/>
      </prod>
      <prod name="unicenter_desktop_management_bundle" vendor="computer_associates">
        <vers num="r11.1"/>
        <vers num="r11.2"/>
        <vers num="r11.2a"/>
        <vers num="r11.2c1"/>
        <vers num="r11.2c2"/>
      </prod>
      <prod name="unicenter_remote_control" vendor="computer_associates">
        <vers num="r11.1"/>
        <vers num="r11.2"/>
        <vers num="r11.2a"/>
        <vers num="r11.2c1"/>
        <vers num="r11.2c2"/>
      </prod>
      <prod name="unicenter_software_delivery" vendor="computer_associates">
        <vers num="r11.1"/>
        <vers num="r11.2"/>
        <vers num="r11.2a"/>
        <vers num="r11.2c1"/>
        <vers num="r11.2c2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1787" seq="2008-1787" published="2008-04-15" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in index.php in Poplar Gedcom Viewer 2.0 allow remote attackers to inject arbitrary web script or HTML via the (1) text and (2) ul parameters.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://downloads.securityfocus.com/vulnerabilities/exploits/28608.html">http://downloads.securityfocus.com/vulnerabilities/exploits/28608.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28608">28608</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41689">poplargedcomviewer-text-xss(41689)</ref>
    </refs>
    <vuln_soft>
      <prod name="poplar_gedcom_viewer" vendor="poplar_gedcom_viewer">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1788" seq="2008-1788" published="2008-04-15" modified="2017-10-18" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in directory.php in Prozilla Entertainers 1.1 and earlier allows remote attackers to execute arbitrary SQL commands via the cat parameter.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5371">5371</ref>
    </refs>
    <vuln_soft>
      <prod name="entertainers" vendor="prozilla">
        <vers num="1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1789" seq="2008-1789" published="2008-04-15" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in forum.php in Prozilla Forum allows remote attackers to execute arbitrary SQL commands via the forum parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28643">28643</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41702">prozillaforum-forum-sql-injection(41702)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5385">5385</ref>
    </refs>
    <vuln_soft>
      <prod name="forum" vendor="prozilla">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1790" seq="2008-1790" published="2008-04-15" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unrestricted file upload vulnerability in iScripts SocialWare allows remote authenticated administrators to upload arbitrary files via a crafted logo file in the "Manage Settings" functionality.  NOTE: remote exploitation is facilitated by a separate SQL injection vulnerability.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28670">28670</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1137/references">ADV-2008-1137</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41751">socialware-managesettings-file-upload(41751)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5402">5402</ref>
    </refs>
    <vuln_soft>
      <prod name="socialware" vendor="iscripts">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1791" seq="2008-1791" published="2008-04-15" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in ladder.php in My Gaming Ladder 7.5 and earlier allows remote attackers to execute arbitrary SQL commands via the ladderid parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28671">28671</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1138/references">ADV-2008-1138</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41698">mygamingladder-ladder-sql-injection(41698)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5401">5401</ref>
    </refs>
    <vuln_soft>
      <prod name="mygamingladder" vendor="mygamingladder">
        <vers num="7.0" prev="1"/>
        <vers num="7.5" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1792" seq="2008-1792" published="2008-04-15" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the insertion filter in the Flickr Drupal module 5.x before 5.x-1.3 and 6.x before 6.x-1.0-alpha allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://drupal.org/node/241939" adv="1" patch="1">http://drupal.org/node/241939</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28594" patch="1">28594</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1082/references">ADV-2008-1082</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41603">flickr-unspecified-xss(41603)</ref>
    </refs>
    <vuln_soft>
      <prod name="flickr" vendor="drupalr">
        <vers num="5.x-0.0-beta"/>
        <vers num="5.x-1.0"/>
        <vers num="5.x-1.1"/>
        <vers num="5.x-1.2"/>
        <vers num="5.x-1.x-dev"/>
        <vers num="6.x-1.x-dev"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1793" seq="2008-1793" published="2008-04-15" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in view.cgi in Smart Classified ADS Professional, Smart Photo ADS, and Smart Photo ADS Gold allow remote attackers to inject arbitrary web script or HTML via the (1) AdNum and (2) Department parameters.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28595">28595</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41611">homeofficeonline-smartads-view-xss(41611)</ref>
    </refs>
    <vuln_soft>
      <prod name="smart_classified_ads" vendor="hoffice">
        <vers num="" edition=":professional"/>
      </prod>
      <prod name="smart_photo_ads" vendor="hoffice">
        <vers num=""/>
      </prod>
      <prod name="smart_photo_ads_gold" vendor="hoffice">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1794" seq="2008-1794" published="2008-04-15" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in the Webform Drupal module 5.x before 5.x-1.10, 5.x-2.x before 5.x-2.0-beta3, and 6.x before 6.x-1.0-beta3 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://drupal.org/node/242053" adv="1" patch="1">http://drupal.org/node/242053</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28597">28597</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1081/references">ADV-2008-1081</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41617">webform-mod-unspecified-xss(41617)</ref>
    </refs>
    <vuln_soft>
      <prod name="webform_module" vendor="drupal">
        <vers num="5.x-1.0"/>
        <vers num="5.x-1.1"/>
        <vers num="5.x-1.2"/>
        <vers num="5.x-1.3"/>
        <vers num="5.x-1.4"/>
        <vers num="5.x-1.5"/>
        <vers num="5.x-1.6"/>
        <vers num="5.x-1.7"/>
        <vers num="5.x-1.8"/>
        <vers num="5.x-1.9"/>
        <vers num="5.x-2.0" edition="beta1"/>
        <vers num="5.x-2.0" edition="beta2"/>
        <vers num="6.x-1.x-dev"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1795" seq="2008-1795" published="2008-04-15" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in Blackboard Academic Suite 7.x and earlier, and possibly some 8.0 versions, allow remote attackers to inject arbitrary web script or HTML via (1) the searchText parameter in a Course action to webapps/blackboard/execute/viewCatalog or (2) the data__announcements___pk1_pk2__subject parameter in an ADD action to bin/common/announcement.pl.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://secskill.wordpress.com/2008/03/27/hacking-blackboard-academic-suite-2/">http://secskill.wordpress.com/2008/03/27/hacking-blackboard-academic-suite-2/</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3810">3810</ref>
      <ref source="MISC" url="http://www.scribd.com/doc/2363025/Hacking-Blackboard-Academic-Suite">http://www.scribd.com/doc/2363025/Hacking-Blackboard-Academic-Suite</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490096/100/0/threaded">20080326 Blackboard Academic Suite Multiple XSS Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28455">28455</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019710">1019710</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41478">blackboard-searchtext-xss(41478)</ref>
    </refs>
    <vuln_soft>
      <prod name="academic_suite" vendor="blackboard">
        <vers num="7" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1796" seq="2008-1796" published="2008-04-15" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.9" CVSS_base_score="4.9" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Comix 3.6.4 creates temporary directories with predictable names, which allows local users to cause an unspecified denial of service.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200804-29.xml">GLSA-200804-29</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41854">comix-temporary-directories-dos(41854)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00171.html">FEDORA-2008-2981</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00183.html">FEDORA-2008-2993</ref>
    </refs>
    <vuln_soft>
      <prod name="comix" vendor="comix">
        <vers num="3.6.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1797" seq="2008-1797" published="2008-04-15" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.1" CVSS_base_score="7.1" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Secure Computing Webwasher 5.30 before build 3159 and 6.3.0 before build 3150 allows remote attackers to cause a denial of service (freeze) via a crafted URL.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3811">3811</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490406/100/0/threaded">20080403 Webwasher Denial of Service Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28600">28600</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41620">webwasher-unspecified-dos(41620)</ref>
    </refs>
    <vuln_soft>
      <prod name="webwasher" vendor="secure_computing">
        <vers num="5.30" prev="1"/>
        <vers num="6.3.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1798" seq="2008-1798" published="2008-04-15" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in forum/kietu/libs/calendrier.php in Dragoon 0.1 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the cal[lng] parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28638">28638</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41669">dragoon-calendrier-file-include(41669)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5369">5369</ref>
    </refs>
    <vuln_soft>
      <prod name="dragoon" vendor="dragoon">
        <vers num="0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1799" seq="2008-1799" published="2008-04-15" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in thumbnails.php in sabros.us 1.75 allows remote attackers to read arbitrary files via a .. (dot dot) in the img parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28623">28623</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41672">sabrosus-thumbnails-file-include(41672)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5360">5360</ref>
    </refs>
    <vuln_soft>
      <prod name="sabros.us" vendor="sabros.us">
        <vers num="1.75"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1800" seq="2008-1800" published="2008-04-15" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in index.php in DivXDB 2002 0.94b allow remote attackers to inject arbitrary web script or HTML via the (1) choice, (2) _page_, (3) zone_admin, (4) general_search, and (5) import parameters.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28566">28566</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41634">divxdb-index-xss(41634)</ref>
    </refs>
    <vuln_soft>
      <prod name="divxdb" vendor="divx">
        <vers num="0.94b" edition="2002"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1801" seq="2008-1801" published="2008-05-12" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Integer underflow in the iso_recv_msg function (iso.c) in rdesktop 1.5.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a Remote Desktop Protocol (RDP) request with a small length field.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=696">20080507 Multiple Vendor rdesktop iso_recv_msg() Integer Underflow Vulnerability</ref>
      <ref source="CONFIRM" url="http://rdesktop.cvs.sourceforge.net/rdesktop/rdesktop/iso.c?r1=1.19&amp;r2=1.20&amp;pathrev=HEAD">http://rdesktop.cvs.sourceforge.net/rdesktop/rdesktop/iso.c?r1=1.19&amp;r2=1.20&amp;pathrev=HEAD</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200806-04.xml">GLSA-200806-04</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.395286">SSA:2008-148-01</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-240708-1">240708</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2008-360.htm">http://support.avaya.com/elmodocs2/security/ASA-2008-360.htm</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1573">DSA-1573</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:101">MDVSA-2008:101</ref>
      <ref source="FEDORA" url="http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00244.html">FEDORA-2008-3886</ref>
      <ref source="FEDORA" url="http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00270.html">FEDORA-2008-3917</ref>
      <ref source="FEDORA" url="http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00296.html">FEDORA-2008-3985</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0575.html">RHSA-2008:0575</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0576.html">RHSA-2008:0576</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0725.html">RHSA-2008:0725</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29097">29097</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019990">1019990</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-646-1">USN-646-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1467/references">ADV-2008-1467</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2403">ADV-2008-2403</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42272">rdesktop-isorecvmsg-code-execution(42272)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11570">oval:org.mitre.oval:def:11570</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5561">5561</ref>
    </refs>
    <vuln_soft>
      <prod name="rdesktop" vendor="rdesktop">
        <vers num="1.5.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1802" seq="2008-1802" published="2008-05-12" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the process_redirect_pdu (rdp.c) function in rdesktop 1.5.0 allows remote attackers to execute arbitrary code via a Remote Desktop Protocol (RDP) redirect request with modified length fields.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=697">20080507 Multiple Vendor rdesktop process_redirect_pdu() BSS Overflow Vulnerability</ref>
      <ref source="CONFIRM" url="http://rdesktop.cvs.sourceforge.net/rdesktop/rdesktop/rdp.c?r1=1.101&amp;r2=1.102&amp;pathrev=HEAD">http://rdesktop.cvs.sourceforge.net/rdesktop/rdesktop/rdp.c?r1=1.101&amp;r2=1.102&amp;pathrev=HEAD</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200806-04.xml">GLSA-200806-04</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-240708-1">240708</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2008-360.htm">http://support.avaya.com/elmodocs2/security/ASA-2008-360.htm</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1573">DSA-1573</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:101">MDVSA-2008:101</ref>
      <ref source="FEDORA" url="http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00244.html">FEDORA-2008-3886</ref>
      <ref source="FEDORA" url="http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00270.html">FEDORA-2008-3917</ref>
      <ref source="FEDORA" url="http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00296.html">FEDORA-2008-3985</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29097">29097</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019991">1019991</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-646-1">USN-646-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1467/references">ADV-2008-1467</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2403">ADV-2008-2403</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42275">rdesktop-processredirectpdu-bo(42275)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5585">5585</ref>
    </refs>
    <vuln_soft>
      <prod name="rdesktop" vendor="rdesktop">
        <vers num="1.5.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1803" seq="2008-1803" published="2008-05-12" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Integer signedness error in the xrealloc function (rdesktop.c) in RDesktop 1.5.0 allows remote attackers to execute arbitrary code via unknown parameters that trigger a heap-based overflow.  NOTE: the role of the channel_process function was not specified by the original researcher.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=698">20080507 Multiple Vendor rdesktop channel_process() Integer Signedness Vulnerability</ref>
      <ref source="CONFIRM" url="http://rdesktop.cvs.sourceforge.net/rdesktop/rdesktop/rdesktop.c?r1=1.161&amp;r2=1.162&amp;pathrev=HEAD">http://rdesktop.cvs.sourceforge.net/rdesktop/rdesktop/rdesktop.c?r1=1.161&amp;r2=1.162&amp;pathrev=HEAD</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200806-04.xml">GLSA-200806-04</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/mailarchive/message.php?msg_name=20080511065217.GA24455%40cse.unsw.EDU.AU" patch="1">http://sourceforge.net/mailarchive/message.php?msg_name=20080511065217.GA24455%40cse.unsw.EDU.AU</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-240708-1">240708</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2008-360.htm">http://support.avaya.com/elmodocs2/security/ASA-2008-360.htm</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1573">DSA-1573</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:101">MDVSA-2008:101</ref>
      <ref source="FEDORA" url="http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00244.html">FEDORA-2008-3886</ref>
      <ref source="FEDORA" url="http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00270.html">FEDORA-2008-3917</ref>
      <ref source="FEDORA" url="http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00296.html">FEDORA-2008-3985</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0575.html" adv="1">RHSA-2008:0575</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29097">29097</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019992">1019992</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-646-1">USN-646-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1467/references" adv="1">ADV-2008-1467</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2403" adv="1">ADV-2008-2403</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42277">rdesktop-xrealloc-bo(42277)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9800">oval:org.mitre.oval:def:9800</ref>
    </refs>
    <vuln_soft>
      <prod name="rdesktop" vendor="rdesktop">
        <vers num="1.5.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1804" seq="2008-1804" published="2008-05-22" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">preprocessors/spp_frag3.c in Sourcefire Snort before 2.8.1 does not properly identify packet fragments that have dissimilar TTL values, which allows remote attackers to bypass detection rules by using a different TTL for each fragment.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://cvs.snort.org/viewcvs.cgi/snort/ChangeLog?rev=1.534.2.11">http://cvs.snort.org/viewcvs.cgi/snort/ChangeLog?rev=1.534.2.11</ref>
      <ref source="CONFIRM" url="http://cvs.snort.org/viewcvs.cgi/snort/src/preprocessors/spp_frag3.c.diff?r1=text&amp;tr1=1.46.2.4&amp;r2=text&amp;tr2=1.46.2.5&amp;diff_format=h">http://cvs.snort.org/viewcvs.cgi/snort/src/preprocessors/spp_frag3.c.diff?r1=text&amp;tr1=1.46.2.4&amp;r2=text&amp;tr2=1.46.2.5&amp;diff_format=h</ref>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=701">20080521 Multiple Vendor Snort IP Fragment TTL Evasion Vulnerability</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020081">1020081</ref>
      <ref source="CONFIRM" url="http://www.ipcop.org/index.php?name=News&amp;file=article&amp;sid=40">http://www.ipcop.org/index.php?name=News&amp;file=article&amp;sid=40</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29327">29327</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1602">ADV-2008-1602</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42584">snort-ttl-security-bypass(42584)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00156.html">FEDORA-2008-4986</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00167.html">FEDORA-2008-5001</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00198.html">FEDORA-2008-5045</ref>
    </refs>
    <vuln_soft>
      <prod name="snort" vendor="snort">
        <vers num="2.8.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1805" seq="2008-1805" published="2008-06-06" modified="2011-03-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Incomplete blacklist vulnerability in Skype 3.6.0.248, and other versions before 3.8.0.139, allows user-assisted remote attackers to bypass warning dialogs and possibly execute arbitrary code via a file: URI that ends in an executable extension that is not covered by the blacklist.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=711">20080604 Skype File URI Security Bypass Code Execution Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29553">29553</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020201">1020201</ref>
      <ref source="CONFIRM" url="http://www.skype.com/security/skype-sb-2008-003.html" adv="1" patch="1">http://www.skype.com/security/skype-sb-2008-003.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1749/references">ADV-2008-1749</ref>
    </refs>
    <vuln_soft>
      <prod name="skype" vendor="skype_technologies">
        <vers num="3.0.0.106" edition="beta"/>
        <vers num="3.0.0.123" edition="beta"/>
        <vers num="3.0.0.137" edition="beta"/>
        <vers num="3.0.0.154" edition="beta"/>
        <vers num="3.0.0.190"/>
        <vers num="3.0.0.198"/>
        <vers num="3.0.0.205"/>
        <vers num="3.0.0.209"/>
        <vers num="3.0.0.214"/>
        <vers num="3.0.0.216"/>
        <vers num="3.0.0.217"/>
        <vers num="3.0.0.218"/>
        <vers num="3.1.0.112" edition="beta"/>
        <vers num="3.1.0.134" edition="beta"/>
        <vers num="3.1.0.144"/>
        <vers num="3.1.0.147"/>
        <vers num="3.1.0.150"/>
        <vers num="3.1.0.152"/>
        <vers num="3.2.0.53" edition="beta"/>
        <vers num="3.2.0.63" edition="beta"/>
        <vers num="3.2.0.82" edition="beta"/>
        <vers num="3.2.0.115" edition="beta"/>
        <vers num="3.2.0.145"/>
        <vers num="3.2.0.148"/>
        <vers num="3.2.0.152"/>
        <vers num="3.2.0.158"/>
        <vers num="3.2.0.163"/>
        <vers num="3.2.0.175"/>
        <vers num="3.5.0.107" edition="beta"/>
        <vers num="3.5.0.158" edition="beta"/>
        <vers num="3.5.0.178" edition="beta"/>
        <vers num="3.5.0.202"/>
        <vers num="3.5.0.214"/>
        <vers num="3.5.0.229"/>
        <vers num="3.5.0.234"/>
        <vers num="3.5.0.239"/>
        <vers num="3.6.0.127" edition="beta"/>
        <vers num="3.6.0.159" edition="beta"/>
        <vers num="3.6.0.216"/>
        <vers num="3.6.0.244"/>
        <vers num="3.6.0.248"/>
        <vers num="3.8.0.96" edition="beta"/>
        <vers num="3.8.0.115" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1806" seq="2008-1806" published="2008-06-16" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Integer overflow in FreeType2 before 2.3.6 allows context-dependent attackers to execute arbitrary code via a crafted set of 16-bit length values within the Private dictionary table in a Printer Font Binary (PFB) file, which triggers a heap-based buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=715">20080610 Multiple Vendor FreeType2 PFB Integer Overflow Vulnerability</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html">APPLE-SA-2008-09-09</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html">APPLE-SA-2008-09-12</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html">APPLE-SA-2009-02-12</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html">20080830 VMSA-2008-0014 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX address information disclosure, privilege escalation and other security issues.</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html">SUSE-SR:2008:014</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200806-10.xml">GLSA-200806-10</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-201209-25.xml">GLSA-201209-25</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020238">1020238</ref>
      <ref source="MISC" url="http://sourceforge.net/project/shownotes.php?group_id=3157&amp;release_id=605780">http://sourceforge.net/project/shownotes.php?group_id=3157&amp;release_id=605780</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1">239006</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3026">http://support.apple.com/kb/HT3026</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3129">http://support.apple.com/kb/HT3129</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3438">http://support.apple.com/kb/HT3438</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm">http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:121">MDVSA-2008:121</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0556.html">RHSA-2008:0556</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0558.html">RHSA-2008:0558</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/495497/100/0/threaded">20080814 rPSA-2008-0255-1 freetype</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/495869/100/0/threaded">20080830 VMSA-2008-0014 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX address information disclosure, privilege escalation and other security issues.</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29640" patch="1">29640</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-643-1">USN-643-1</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2008-0014.html">http://www.vmware.com/security/advisories/VMSA-2008-0014.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/support/player/doc/releasenotes_player.html">http://www.vmware.com/support/player/doc/releasenotes_player.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/support/player2/doc/releasenotes_player2.html">http://www.vmware.com/support/player2/doc/releasenotes_player2.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/support/server/doc/releasenotes_server.html">http://www.vmware.com/support/server/doc/releasenotes_server.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html">http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html">http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1794">ADV-2008-1794</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1876/references">ADV-2008-1876</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2423">ADV-2008-2423</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2466">ADV-2008-2466</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2525">ADV-2008-2525</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2558">ADV-2008-2558</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2608">https://issues.rpath.com/browse/RPL-2608</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9321">oval:org.mitre.oval:def:9321</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html">FEDORA-2008-5425</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html">FEDORA-2008-5430</ref>
    </refs>
    <vuln_soft>
      <prod name="freetype" vendor="freetype">
        <vers num="1.3.1"/>
        <vers num="2.3.3"/>
        <vers num="2.3.4"/>
        <vers num="2.3.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1807" seq="2008-1807" published="2008-06-16" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">FreeType2 before 2.3.6 allow context-dependent attackers to execute arbitrary code via an invalid "number of axes" field in a Printer Font Binary (PFB) file, which triggers a free of arbitrary memory locations, leading to memory corruption.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=716">20080610 Multiple Vendor FreeType2 PFB Memory Corruption Vulnerability</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html">APPLE-SA-2008-09-09</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html">APPLE-SA-2008-09-12</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html">APPLE-SA-2009-02-12</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html">20080830 VMSA-2008-0014 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX address information disclosure, privilege escalation and other security issues.</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html">SUSE-SR:2008:014</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200806-10.xml">GLSA-200806-10</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-201209-25.xml">GLSA-201209-25</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020239">1020239</ref>
      <ref source="MISC" url="http://sourceforge.net/project/shownotes.php?group_id=3157&amp;release_id=605780">http://sourceforge.net/project/shownotes.php?group_id=3157&amp;release_id=605780</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1">239006</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3026">http://support.apple.com/kb/HT3026</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3129">http://support.apple.com/kb/HT3129</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3438">http://support.apple.com/kb/HT3438</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm">http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:121">MDVSA-2008:121</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0556.html">RHSA-2008:0556</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0558.html">RHSA-2008:0558</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/495497/100/0/threaded">20080814 rPSA-2008-0255-1 freetype</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/495869/100/0/threaded">20080830 VMSA-2008-0014 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX address information disclosure, privilege escalation and other security issues.</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29641">29641</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-643-1">USN-643-1</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2008-0014.html">http://www.vmware.com/security/advisories/VMSA-2008-0014.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/support/player/doc/releasenotes_player.html">http://www.vmware.com/support/player/doc/releasenotes_player.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/support/player2/doc/releasenotes_player2.html">http://www.vmware.com/support/player2/doc/releasenotes_player2.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/support/server/doc/releasenotes_server.html">http://www.vmware.com/support/server/doc/releasenotes_server.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html">http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html">http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1794">ADV-2008-1794</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1876/references">ADV-2008-1876</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2423">ADV-2008-2423</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2466">ADV-2008-2466</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2525">ADV-2008-2525</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2558">ADV-2008-2558</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2608">https://issues.rpath.com/browse/RPL-2608</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9767">oval:org.mitre.oval:def:9767</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html">FEDORA-2008-5425</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html">FEDORA-2008-5430</ref>
    </refs>
    <vuln_soft>
      <prod name="freetype" vendor="freetype">
        <vers num="1.3.1"/>
        <vers num="2.3.3"/>
        <vers num="2.3.4"/>
        <vers num="2.3.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1808" seq="2008-1808" published="2008-06-16" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple off-by-one errors in FreeType2 before 2.3.6 allow context-dependent attackers to execute arbitrary code via (1) a crafted table in a Printer Font Binary (PFB) file or (2) a crafted SHC instruction in a TrueType Font (TTF) file, which triggers a heap-based buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=717">20080610 Multiple Vendor FreeType2 Multiple Heap Overflow Vulnerabilities</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html">APPLE-SA-2008-09-09</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html">APPLE-SA-2008-09-12</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html">APPLE-SA-2009-02-12</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html">20080830 VMSA-2008-0014 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX address information disclosure, privilege escalation and other security issues.</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html">SUSE-SR:2008:014</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200806-10.xml">GLSA-200806-10</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-201209-25.xml">GLSA-201209-25</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020240">1020240</ref>
      <ref source="MISC" url="http://sourceforge.net/project/shownotes.php?group_id=3157&amp;release_id=605780">http://sourceforge.net/project/shownotes.php?group_id=3157&amp;release_id=605780</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1">239006</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3026">http://support.apple.com/kb/HT3026</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3129">http://support.apple.com/kb/HT3129</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3438">http://support.apple.com/kb/HT3438</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm">http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:121">MDVSA-2008:121</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0556.html">RHSA-2008:0556</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0558.html">RHSA-2008:0558</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2009-0329.html">RHSA-2009:0329</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/495497/100/0/threaded">20080814 rPSA-2008-0255-1 freetype</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/495869/100/0/threaded">20080830 VMSA-2008-0014 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX address information disclosure, privilege escalation and other security issues.</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29637" patch="1">29637</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29639" patch="1">29639</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-643-1">USN-643-1</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2008-0014.html">http://www.vmware.com/security/advisories/VMSA-2008-0014.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/support/player/doc/releasenotes_player.html">http://www.vmware.com/support/player/doc/releasenotes_player.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/support/player2/doc/releasenotes_player2.html">http://www.vmware.com/support/player2/doc/releasenotes_player2.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/support/server/doc/releasenotes_server.html">http://www.vmware.com/support/server/doc/releasenotes_server.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html">http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html">http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1794">ADV-2008-1794</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1876/references">ADV-2008-1876</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2423">ADV-2008-2423</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2466">ADV-2008-2466</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2525">ADV-2008-2525</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2558">ADV-2008-2558</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2608">https://issues.rpath.com/browse/RPL-2608</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11188">oval:org.mitre.oval:def:11188</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html">FEDORA-2008-5425</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html">FEDORA-2008-5430</ref>
    </refs>
    <vuln_soft>
      <prod name="freetype" vendor="freetype">
        <vers num="1.3.1"/>
        <vers num="2.0.6"/>
        <vers num="2.0.9"/>
        <vers num="2.1.7"/>
        <vers num="2.1.9"/>
        <vers num="2.1.10"/>
        <vers num="2.2"/>
        <vers num="2.2.1"/>
        <vers num="2.2.10"/>
        <vers num="2.3.3"/>
        <vers num="2.3.4"/>
        <vers num="2.3.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1809" seq="2008-1809" published="2008-07-14" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in Novell eDirectory 8.7.3 before 8.7.3.10b, and 8.8 before 8.8.2 FTF2, allows remote attackers to execute arbitrary code via an LDAP search request containing "NULL search parameters."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=724">20080709 Novell eDirectory LDAP Search Request Heap Corruption Vulnerability</ref>
      <ref source="CONFIRM" url="http://www.novell.com/support/viewContent.do?externalId=3843876" patch="1">http://www.novell.com/support/viewContent.do?externalId=3843876</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30175">30175</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020470">1020470</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2062/references">ADV-2008-2062</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43716">novell-edirectory-ldap-bo(43716)</ref>
    </refs>
    <vuln_soft>
      <prod name="edirectory" vendor="novell">
        <vers num="8.7.3"/>
        <vers num="8.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1810" seq="2008-1810" published="2008-08-01" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.4" CVSS_base_score="4.4" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Untrusted search path vulnerability in dbmsrv in SAP MaxDB 7.6.03.15 on Linux allows local users to gain privileges via a modified PATH environment variable.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=729">20080730 SAP MaxDB dbmsrv Untrusted Execution Path Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30474">30474</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020585">1020585</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2267/references">ADV-2008-2267</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/44125">maxdb-dbmsrv-code-execution(44125)</ref>
    </refs>
    <vuln_soft>
      <prod name="maxdb" vendor="sap">
        <vers num="7.6.03.15"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1811" seq="2008-1811" published="2008-04-16" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.5" CVSS_base_score="5.5" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Oracle Application Express 3.0.1 has unspecified impact and remote authenticated attack vectors related to flows_030000.wwv_execute_immediate, aka APEX01.  NOTE: the previous information was obtained from the April 2008 CPU.  Oracle has not commented on reliable researcher claims that APEX01 is for insufficient authorization checks for SQL commands in the run_ddl function in flows_030000.wwv_execute_immediate, allowing privilege escalation by certain non-DBA remote authenticated users.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=690">20080415 Oracle Application Express Privilege Escalation Vulnerability</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpuapr2008-082075.html">http://www.oracle.com/technetwork/topics/security/cpuapr2008-082075.html</ref>
      <ref source="HP" url="http://www.securityfocus.com/archive/1/491024/100/0/threaded">HPSBMA02133</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019855">1019855</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1233/references" adv="1">ADV-2008-1233</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1267/references" adv="1">ADV-2008-1267</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41858">oracle-cpu-april-2008(41858)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41988">oracle-apex-privilege-escalation(41988)</ref>
    </refs>
    <vuln_soft>
      <prod name="application_express" vendor="oracle">
        <vers num="3.0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1812" seq="2008-1812" published="2008-04-16" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Oracle Enterprise Manager component in Oracle Database 9.0.1.5 FIPS+; Application Server 1.0.2.2; and Enterprise Manager for AS 1.0.2.2 and Database 9.0.1.5 has unknown impact and local attack vectors, aka EM01.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpuapr2008-082075.html">http://www.oracle.com/technetwork/topics/security/cpuapr2008-082075.html</ref>
      <ref source="HP" url="http://www.securityfocus.com/archive/1/491024/100/0/threaded">HPSBMA02133</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019855">1019855</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1233/references">ADV-2008-1233</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1267/references">ADV-2008-1267</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41858">oracle-cpu-april-2008(41858)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41989">oracle-enterprise-manager-unspecified(41989)</ref>
    </refs>
    <vuln_soft>
      <prod name="application_server" vendor="oracle">
        <vers num="9.0.4.3"/>
      </prod>
      <prod name="database_9i" vendor="oracle">
        <vers num="9.0.1.5" edition=":fips%2b"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1813" seq="2008-1813" published="2008-04-16" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple unspecified vulnerabilities in Oracle Database 9.0.1.5 FIPS+, 9.2.0.8, 9.2.0.8DV, 10.1.0.5, and 10.2.0.3 have unknown impact and remote unauthenticated or authenticated attack vectors related to (1) SYS.DBMS_AQ in the Advanced Queuing component, aka DB01; (2) Core RDBMS, aka DB03; (3) SDO_GEOM in Oracle Spatial, aka DB06; (4) Export, aka DB12; and (5) DBMS_STATS in Query Optimizer, aka DB13.  NOTE: the previous information was obtained from the Oracle CPU.  Oracle has not commented on reliable researcher claims that DB06 is SQL injection, and DB13 occurs when the OUTLN account is reset to use a hard-coded password.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpuapr2008-082075.html">http://www.oracle.com/technetwork/topics/security/cpuapr2008-082075.html</ref>
      <ref source="MISC" url="http://www.red-database-security.com/advisory/oracle_outln_password_change.html">http://www.red-database-security.com/advisory/oracle_outln_password_change.html</ref>
      <ref source="MISC" url="http://www.red-database-security.com/advisory/oracle_sql_injection_sdo_geom.html">http://www.red-database-security.com/advisory/oracle_sql_injection_sdo_geom.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490919/100/0/threaded">20080416 Oracle - SQL Injection in package SDO_GEOM [DB06]</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490950/100/0/threaded">20080416 Oracle - Hardcoded Password and Password Reset of OUTLN User [DB13]</ref>
      <ref source="HP" url="http://www.securityfocus.com/archive/1/491024/100/0/threaded">HPSBMA02133</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019855">1019855</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1233/references" adv="1">ADV-2008-1233</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1267/references" adv="1">ADV-2008-1267</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41858">oracle-cpu-april-2008(41858)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41991">oracle-database-dbmsaq-unspecified(41991)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41992">oracle-database-corerdbms-unspecified(41992)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41993">oracle-database-sdogeom-sql-injection(41993)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41994">oracle-database-export-info-disclosure(41994)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41995">oracle-database-queryop-default-password(41995)</ref>
    </refs>
    <vuln_soft>
      <prod name="database_9i" vendor="oracle">
        <vers num="9.0.1.5"/>
        <vers num="9.2.0.8"/>
        <vers num="9.2.0.8dv"/>
      </prod>
      <prod name="database_server" vendor="oracle">
        <vers num="9.0.1.5" edition=":fips"/>
        <vers num="10.1.0.5"/>
        <vers num="10.2.0.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1814" seq="2008-1814" published="2008-04-16" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.0" CVSS_base_score="9.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Oracle Secure Enterprise Search or Ultrasearch component in Oracle Database 9.0.1.5 FIPS+, 9.2.0.8, 9.2.0.8DV, 10.1.0.5, and 10.2.0.3; Application Server 9.0.4.3 and 10.1.2.2; and Oracle Collaboration Suite 10.1.2; has unknown impact and remote attack vectors, aka DB04.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpuapr2008-082075.html">http://www.oracle.com/technetwork/topics/security/cpuapr2008-082075.html</ref>
      <ref source="HP" url="http://www.securityfocus.com/archive/1/491024/100/0/threaded">HPSBMA02133</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019855">1019855</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1233/references">ADV-2008-1233</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1267/references">ADV-2008-1267</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41858">oracle-cpu-april-2008(41858)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41997">oracle-search-wksys-unspecified(41997)</ref>
    </refs>
    <vuln_soft>
      <prod name="application_server" vendor="oracle">
        <vers num="9.0.4.3"/>
      </prod>
      <prod name="application_server_10g" vendor="oracle">
        <vers num="10.1.2.2"/>
      </prod>
      <prod name="collaboration_suite" vendor="oracle">
        <vers num="10.1.2"/>
      </prod>
      <prod name="database_9i" vendor="oracle">
        <vers num="9.2.0.8"/>
        <vers num="9.2.0.8dv"/>
      </prod>
      <prod name="database_server" vendor="oracle">
        <vers num="9.0.1.5" edition=":fips"/>
        <vers num="10.1.0.5"/>
        <vers num="10.2.0.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1815" seq="2008-1815" published="2008-04-16" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.5" CVSS_base_score="5.5" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Change Data Capture component in Oracle Database 10.1.0.5, 10.2.0.3, and 11.1.0.6 has unknown impact and remote authenticated attack vectors related to DBMS_CDC_UTILITY, aka DB02.  NOTE: the previous information was obtained from the April 2008 CPU.  Oracle has not commented on reliable researcher claims that DB02 is for SQL injection in LOCK_CHANGE_SET.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpuapr2008-082075.html">http://www.oracle.com/technetwork/topics/security/cpuapr2008-082075.html</ref>
      <ref source="HP" url="http://www.securityfocus.com/archive/1/491024/100/0/threaded">HPSBMA02133</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491522/30/390/threaded">20080501 Team SHATTER Security Advisory: Oracle Database SQL Injection in SYS.DBMS_CDC_UTILITY.LOCK_CHANGE_SET (DB02)</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019855">1019855</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1233/references" adv="1">ADV-2008-1233</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1267/references" adv="1">ADV-2008-1267</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41858">oracle-cpu-april-2008(41858)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41998">oracle-database-dbmscdcutility-unspecified(41998)</ref>
    </refs>
    <vuln_soft>
      <prod name="database_10g" vendor="oracle">
        <vers num="10.1.0.5"/>
        <vers num="10.2.0.3"/>
      </prod>
      <prod name="database_11g" vendor="oracle">
        <vers num="11.1.0.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1816" seq="2008-1816" published="2008-04-16" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.5" CVSS_base_score="5.5" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple unspecified vulnerabilities in Oracle Database 10.1.0.5 and 10.2.0.3 have unknown impact and remote authenticated attack vectors related to (1) SDO_UTIL in the Oracle Spatial component, aka DB05; or (2) fine grained auditing in the Audit component, aka DB14.  NOTE: the previous information was obtained from the Oracle CPU.  Oracle has not commented on reliable researcher claims that DB05 is SQL injection.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpuapr2008-082075.html">http://www.oracle.com/technetwork/topics/security/cpuapr2008-082075.html</ref>
      <ref source="MISC" url="http://www.red-database-security.com/advisory/oracle_sql_injection_sdo_util.html">http://www.red-database-security.com/advisory/oracle_sql_injection_sdo_util.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490918/100/0/threaded">20080416 Oracle - SQL Injection Vulnerability in SDO_UTIL [DB05]</ref>
      <ref source="HP" url="http://www.securityfocus.com/archive/1/491024/100/0/threaded">HPSBMA02133</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019855">1019855</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1233/references" adv="1">ADV-2008-1233</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1267/references" adv="1">ADV-2008-1267</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41858">oracle-cpu-april-2008(41858)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41999">oracle-database-sdoutil-sql-injection(41999)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42000">oracle-database-audit-unspecified(42000)</ref>
    </refs>
    <vuln_soft>
      <prod name="database_server" vendor="oracle">
        <vers num="10.1.0.5"/>
        <vers num="10.2.0.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1817" seq="2008-1817" published="2008-04-16" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.0" CVSS_base_score="9.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple unspecified vulnerabilities in Oracle Database 9.0.1.5 FIPS+, 9.2.0.8, 9.2.0.8DV, 10.1.0.5, 10.2.0.3, and 11.1.0.6 have unknown impact and remote attack vectors related to (1) SDO_IDX in the Spatial component, aka DB07; and (2) Core RDBMS, aka DB10.  NOTE: the previous information was obtained from the Oracle CPU.  Oracle has not commented on reliable researcher claims that DB07 is SQL injection.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpuapr2008-082075.html">http://www.oracle.com/technetwork/topics/security/cpuapr2008-082075.html</ref>
      <ref source="MISC" url="http://www.red-database-security.com/advisory/oracle_sql_injection_sdo_idx.html">http://www.red-database-security.com/advisory/oracle_sql_injection_sdo_idx.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490920/100/0/threaded">20080416 Oracle - SQL Injection in package SDO_IDX [DB07]</ref>
      <ref source="HP" url="http://www.securityfocus.com/archive/1/491024/100/0/threaded">HPSBMA02133</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019855">1019855</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1233/references" adv="1">ADV-2008-1233</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1267/references" adv="1">ADV-2008-1267</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41858">oracle-cpu-april-2008(41858)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42001">oracle-database-sdoidx-sql-injection(42001)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42002">oracle-database-rdbms-info-disclosure(42002)</ref>
    </refs>
    <vuln_soft>
      <prod name="database_9i" vendor="oracle">
        <vers num="9.2.0.8dv"/>
      </prod>
      <prod name="database_server" vendor="oracle">
        <vers num="9.0.1.5" edition=":fips"/>
        <vers num="10.1.0.5"/>
        <vers num="10.2.0.3"/>
        <vers num="11.1.0.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1818" seq="2008-1818" published="2008-04-16" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Authentication component in Oracle Database 11.1.0.6 has unknown impact and remote attack vectors, aka DB08.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpuapr2008-082075.html">http://www.oracle.com/technetwork/topics/security/cpuapr2008-082075.html</ref>
      <ref source="HP" url="http://www.securityfocus.com/archive/1/491024/100/0/threaded">HPSBMA02133</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019855">1019855</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1233/references">ADV-2008-1233</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1267/references">ADV-2008-1267</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41858">oracle-cpu-april-2008(41858)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42031">oracle-database-auth-unspecified(42031)</ref>
    </refs>
    <vuln_soft>
      <prod name="database_server" vendor="oracle">
        <vers num="11.1.0.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1819" seq="2008-1819" published="2008-04-16" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Oracle Net Services component in Oracle Database 9.2.0.8, 10.1.0.5, and 10.2.0.3 has unknown impact and local attack vectors, aka DB09.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpuapr2008-082075.html">http://www.oracle.com/technetwork/topics/security/cpuapr2008-082075.html</ref>
      <ref source="HP" url="http://www.securityfocus.com/archive/1/491024/100/0/threaded">HPSBMA02133</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019855">1019855</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1233/references">ADV-2008-1233</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1267/references">ADV-2008-1267</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41858">oracle-cpu-april-2008(41858)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42033">oracle-database-net-unspecified(42033)</ref>
    </refs>
    <vuln_soft>
      <prod name="database_9i" vendor="oracle">
        <vers num="9.2.0.8"/>
      </prod>
      <prod name="database_server" vendor="oracle">
        <vers num="10.1.0.5"/>
        <vers num="10.2.0.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1820" seq="2008-1820" published="2008-04-16" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.0" CVSS_base_score="4.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Data Pump component in Oracle Database 9.2.0.8, 10.1.0.5, 10.2.0.3, and 11.1.0.6 has unknown impact and remote attack vectors related to KUPF$FILE_INT, aka DB11.  NOTE: the previous information was obtained from the April 2008 CPU.  Oracle has not commented on reliable researcher claims that DB11 is for a buffer overflow in the SYS.KUPF$FILE_INT.GET_FULL_FILENAME procedure.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpuapr2008-082075.html">http://www.oracle.com/technetwork/topics/security/cpuapr2008-082075.html</ref>
      <ref source="HP" url="http://www.securityfocus.com/archive/1/491024/100/0/threaded">HPSBMA02133</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491524/30/390/threaded">20080501 Team SHATTER Security Advisory: Oracle Database Buffer Overflow in SYS.KUPF$FILE_INT.GET_FULL_FILENAME (DB11)</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019855">1019855</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1233/references" adv="1">ADV-2008-1233</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1267/references" adv="1">ADV-2008-1267</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41858">oracle-cpu-april-2008(41858)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42036">oracle-database-datapump-dos(42036)</ref>
    </refs>
    <vuln_soft>
      <prod name="database_10g" vendor="oracle">
        <vers num="10.1.0.5"/>
        <vers num="10.2.0.3"/>
      </prod>
      <prod name="database_11g" vendor="oracle">
        <vers num="11.1.0.6"/>
      </prod>
      <prod name="database_9i" vendor="oracle">
        <vers num="9.2.0.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1821" seq="2008-1821" published="2008-04-16" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.0" CVSS_base_score="9.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Advanced Queuing component in Oracle Database 9.0.1.5 FIPS+, and 10.1.0.5 has unknown impact and remote attack vectors related to SYS.DBMS_AQJMS_INTERNAL, aka DB15.  NOTE: the previous information was obtained from the April 2008 CPU.  Oracle has not commented on reliable researcher claims that DB15 is for multiple buffer overflows in the (1) AQ$_REGISTER and (2) AQ$_UNREGISTER procedures.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpuapr2008-082075.html">http://www.oracle.com/technetwork/topics/security/cpuapr2008-082075.html</ref>
      <ref source="HP" url="http://www.securityfocus.com/archive/1/491024/100/0/threaded">HPSBMA02133</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491521/30/390/threaded">20080501 Team SHATTER Security Advisory: Oracle Database Buffer Overflow in SYS.DBMS_AQJMS_INTERNAL (DB15)</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019855">1019855</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1233/references" adv="1">ADV-2008-1233</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1267/references" adv="1">ADV-2008-1267</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41858">oracle-cpu-april-2008(41858)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42037">oracle-database-advqueuing-dos(42037)</ref>
    </refs>
    <vuln_soft>
      <prod name="database_server" vendor="oracle">
        <vers num="9.0.1.5" edition=":fips%2b"/>
        <vers num="10.1.0.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1822" seq="2008-1822" published="2008-04-16" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Oracle Application Express component in Oracle Application Express 3.0.1 has unknown impact and remote attack vectors, aka APEX02.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpuapr2008-082075.html">http://www.oracle.com/technetwork/topics/security/cpuapr2008-082075.html</ref>
      <ref source="HP" url="http://www.securityfocus.com/archive/1/491024/100/0/threaded">HPSBMA02133</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019855">1019855</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1233/references">ADV-2008-1233</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1267/references">ADV-2008-1267</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41858">oracle-cpu-april-2008(41858)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42041">oracle-apex-unspecified-access(42041)</ref>
    </refs>
    <vuln_soft>
      <prod name="application_express" vendor="oracle">
        <vers num="3.0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1823" seq="2008-1823" published="2008-04-16" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Oracle Jinitiator component in Oracle Application Server 1.3.1.14 has unknown impact and remote attack vectors, aka AS01.</descript>
      <descript source="nvd">According to the vendor " the impact of this vulnerability is limited to Jinitiator; there is no Oracle Application Server impact. Oracle Jinitiator versions 1.3.1.15 and later are not affected".</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpuapr2008-082075.html">http://www.oracle.com/technetwork/topics/security/cpuapr2008-082075.html</ref>
      <ref source="HP" url="http://www.securityfocus.com/archive/1/491024/100/0/threaded">HPSBMA02133</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019855">1019855</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1233/references">ADV-2008-1233</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1267/references">ADV-2008-1267</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41858">oracle-cpu-april-2008(41858)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42045">oracle-jinitiator-unauth-access(42045)</ref>
    </refs>
    <vuln_soft>
      <prod name="jinitiator" vendor="oracle">
        <vers num="1.3.1.14"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1824" seq="2008-1824" published="2008-04-16" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Oracle Dynamic Monitoring Service component in Oracle Application Server 9.0.4.3, 10.1.2.2, and 10.1.3.3 has unknown impact and remote attack vectors, aka AS02.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpuapr2008-082075.html">http://www.oracle.com/technetwork/topics/security/cpuapr2008-082075.html</ref>
      <ref source="HP" url="http://www.securityfocus.com/archive/1/491024/100/0/threaded">HPSBMA02133</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019855">1019855</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1233/references">ADV-2008-1233</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1267/references">ADV-2008-1267</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41858">oracle-cpu-april-2008(41858)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42050">oracle-appserver-dynmon-unspecified(42050)</ref>
    </refs>
    <vuln_soft>
      <prod name="application_server_10g" vendor="oracle">
        <vers num="10.1.2.2"/>
        <vers num="10.1.3.3"/>
      </prod>
      <prod name="application_server_9i" vendor="oracle">
        <vers num="9.0.4.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1825" seq="2008-1825" published="2008-04-16" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Oracle Portal component in Oracle Application Server 9.0.4.3 has unknown impact and remote attack vectors, aka AS03.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpuapr2008-082075.html">http://www.oracle.com/technetwork/topics/security/cpuapr2008-082075.html</ref>
      <ref source="HP" url="http://www.securityfocus.com/archive/1/491024/100/0/threaded">HPSBMA02133</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019855">1019855</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1233/references">ADV-2008-1233</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1267/references">ADV-2008-1267</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41858">oracle-cpu-april-2008(41858)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42051">oracle-appserver-portal-unspecified5(42051)</ref>
    </refs>
    <vuln_soft>
      <prod name="application_server_9i" vendor="oracle">
        <vers num="9.0.4.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1826" seq="2008-1826" published="2008-04-16" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple unspecified vulnerabilities in Oracle E-Business Suite 11.5.10.2 have unknown impact and attack vectors related to (a) Advanced Pricing, aka (1) APP01 and (2) APP10; and (b) Applications Framework, aka (3) APP05.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpuapr2008-082075.html">http://www.oracle.com/technetwork/topics/security/cpuapr2008-082075.html</ref>
      <ref source="HP" url="http://www.securityfocus.com/archive/1/491024/100/0/threaded">HPSBMA02133</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019855">1019855</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1233/references">ADV-2008-1233</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1267/references">ADV-2008-1267</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41858">oracle-cpu-april-2008(41858)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42053">oracle-ebusiness-advpricing-unspecified(42053)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42054">oracle-ebusiness-appframework-unspecified(42054)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42055">oracle-ebusiness-advpricing-unspecified2(42055)</ref>
    </refs>
    <vuln_soft>
      <prod name="e-business_suite" vendor="oracle">
        <vers num="11.5.10.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1827" seq="2008-1827" published="2008-04-16" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple unspecified vulnerabilities in Oracle E-Business Suite 11.5.10.2 and 12.0.4 have unknown impact and attack vectors related to (a) Advanced Pricing component, aka (1) APP02, (2) APP03, and (3) APP09; (b) Application Object Library component, aka (4) APP04, (5) APP07, and (6) APP11; (c) Applications Manager component, aka (7) APP06; (d) and Applications Technology Stack component, aka (8) APP08.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpuapr2008-082075.html">http://www.oracle.com/technetwork/topics/security/cpuapr2008-082075.html</ref>
      <ref source="HP" url="http://www.securityfocus.com/archive/1/491024/100/0/threaded">HPSBMA02133</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019855">1019855</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1233/references">ADV-2008-1233</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1267/references">ADV-2008-1267</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41858">oracle-cpu-april-2008(41858)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42056">oracle-ebusiness-advpricing-unspecified3(42056)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42057">oracle-ebusiness-advpricing-unspecified4(42057)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42059">oracle-ebusiness-appobjlib-dos(42059)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42060">oracle-ebusiness-appmanager-unspecified(42060)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42061">oracle-ebusiness-appobjlib-unspecified(42061)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42062">oracle-ebusiness-apptechstack-unspecified(42062)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42063">oracle-ebusiness-advpricing-unspecified5(42063)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42064">oracle-ebusiness-appobjlib-unspecified2(42064)</ref>
    </refs>
    <vuln_soft>
      <prod name="e-business_suite_11i" vendor="oracle">
        <vers num="11.5.10.2"/>
      </prod>
      <prod name="e-business_suite_12" vendor="oracle">
        <vers num="12.0.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1828" seq="2008-1828" published="2008-04-16" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.0" CVSS_base_score="9.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the PeopleSoft PeopleTools component in Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne 8.22.19, 8.48.16, and 8.49.09 has unknown impact and remote authenticated attack vectors, aka PSE01.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpuapr2008-082075.html">http://www.oracle.com/technetwork/topics/security/cpuapr2008-082075.html</ref>
      <ref source="HP" url="http://www.securityfocus.com/archive/1/491024/100/0/threaded">HPSBMA02133</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019855">1019855</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1233/references">ADV-2008-1233</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1267/references">ADV-2008-1267</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41858">oracle-cpu-april-2008(41858)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42065">oracle-peoplesoft-peopletools-unspecified3(42065)</ref>
    </refs>
    <vuln_soft>
      <prod name="enterpriseone" vendor="jdedwards">
        <vers num="8.22.19"/>
        <vers num="8.48.16"/>
        <vers num="8.49.09"/>
      </prod>
      <prod name="peoplesoft_enterprise" vendor="oracle">
        <vers num="8.22.19"/>
        <vers num="8.48.16"/>
        <vers num="8.49.09"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1829" seq="2008-1829" published="2008-04-16" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.0" CVSS_base_score="9.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the PeopleSoft HCM Recruiting component in Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne 8.8 SP1 has unknown impact and remote attack vectors, aka PSE02.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpuapr2008-082075.html">http://www.oracle.com/technetwork/topics/security/cpuapr2008-082075.html</ref>
      <ref source="HP" url="http://www.securityfocus.com/archive/1/491024/100/0/threaded">HPSBMA02133</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019855">1019855</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1233/references">ADV-2008-1233</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1267/references">ADV-2008-1267</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41858">oracle-cpu-april-2008(41858)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42066">oracle-peoplesoft-hcm-unspecified2(42066)</ref>
    </refs>
    <vuln_soft>
      <prod name="enterpriseone" vendor="oracle">
        <vers num="8.8" edition="sp1"/>
      </prod>
      <prod name="peoplesoft_enterprise" vendor="oracle">
        <vers num="8.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1830" seq="2008-1830" published="2008-04-16" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.0" CVSS_base_score="9.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the PeopleSoft HCM ePerformance component in Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne 8.9 and 9.0 has unknown impact and remote attack vectors, aka PSE03.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpuapr2008-082075.html">http://www.oracle.com/technetwork/topics/security/cpuapr2008-082075.html</ref>
      <ref source="HP" url="http://www.securityfocus.com/archive/1/491024/100/0/threaded">HPSBMA02133</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019855">1019855</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1233/references">ADV-2008-1233</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1267/references">ADV-2008-1267</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41858">oracle-cpu-april-2008(41858)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42067">oracle-peoplesoft-eperformance-unspecified(42067)</ref>
    </refs>
    <vuln_soft>
      <prod name="enterpriseone" vendor="jdedwards">
        <vers num="8.9"/>
        <vers num="9.0"/>
      </prod>
      <prod name="peoplesoft_hcm_eperformance" vendor="oracle">
        <vers num="8.9"/>
        <vers num="9.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1831" seq="2008-1831" published="2008-04-16" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple unspecified vulnerabilities in the Siebel SimBuilder component in Oracle Siebel Enterprise 7.8.2 and 7.8.5 have unknown impact and remote or local attack vectors, aka (1) SEBL01, (2) SEBL02, (3) SEBL03, (4) SEBL04, (5) SEBL05, and (6) SEBL06.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpuapr2008-082075.html">http://www.oracle.com/technetwork/topics/security/cpuapr2008-082075.html</ref>
      <ref source="HP" url="http://www.securityfocus.com/archive/1/491024/100/0/threaded">HPSBMA02133</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019855">1019855</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1233/references">ADV-2008-1233</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1267/references">ADV-2008-1267</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41858">oracle-cpu-april-2008(41858)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42068">oracle-siebel-simbuilder-unspecified(42068)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42069">oracle-siebel-simbuilder-unspecified2(42069)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42070">oracle-siebel-simbuilder-unspecified3(42070)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42071">oracle-siebel-simbuilder-unspecified4(42071)</ref>
    </refs>
    <vuln_soft>
      <prod name="siebel_enterprise" vendor="oracle">
        <vers num="7.8.2"/>
        <vers num="7.8.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1832" seq="2008-1832" published="2008-04-16" modified="2017-08-07" severity="Low" CVSS_version="2.0" CVSS_score="3.3" CVSS_base_score="3.3" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:N/I:P/A:P)">
    <desc>
      <descript source="cve">lib/prefs.tcl in Cecilia 2.0.5 allows local users to overwrite arbitrary files via a symlink attack on the csvers temporary file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476321">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476321</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28805">28805</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41837">cecilia-locatecsound-symlink(41837)</ref>
    </refs>
    <vuln_soft>
      <prod name="cecilia" vendor="cecilia">
        <vers num="2.0.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1833" seq="2008-1833" published="2008-04-16" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in pe.c in libclamav in ClamAV 0.92.1 allows remote attackers to execute arbitrary code via a crafted WWPack compressed PE binary.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://kolab.org/security/kolab-vendor-notice-20.txt">http://kolab.org/security/kolab-vendor-notice-20.txt</ref>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=687">20080414 ClamAV libclamav PE WWPack Heap Overflow Vulnerability</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html">APPLE-SA-2008-09-15</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00009.html">SUSE-SA:2008:024</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200805-19.xml">GLSA-200805-19</ref>
      <ref source="CONFIRM" url="http://svn.clamav.net/svn/clamav-devel/trunk/ChangeLog">http://svn.clamav.net/svn/clamav-devel/trunk/ChangeLog</ref>
      <ref source="CONFIRM" url="http://up2date.astaro.com/2008/08/up2date_asg_v7300_ga_released.html">http://up2date.astaro.com/2008/08/up2date_asg_v7300_ga_released.html</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1549">DSA-1549</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:088">MDVSA-2008:088</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28784">28784</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28798">28798</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019850">1019850</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-260A.html">TA08-260A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1227/references">ADV-2008-1227</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2584">ADV-2008-2584</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41833">clamav-wwpack-pe-bo(41833)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00576.html">FEDORA-2008-3358</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00625.html">FEDORA-2008-3420</ref>
      <ref source="CONFIRM" url="https://wwws.clamav.net/bugzilla/show_bug.cgi?id=877">https://wwws.clamav.net/bugzilla/show_bug.cgi?id=877</ref>
    </refs>
    <vuln_soft>
      <prod name="clamav" vendor="clam_anti-virus">
        <vers num="0.92.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1834" seq="2008-1834" published="2008-04-16" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">swfdec_load_object.c in Swfdec before 0.6.4 does not properly restrict local file access from untrusted sandboxes, which allows remote attackers to read arbitrary files via a crafted Flash file.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://gitweb.freedesktop.org/?p=swfdec/swfdec.git;a=commit;h=326ee4ff631ecc11605f1251e1923a94561a3823">http://gitweb.freedesktop.org/?p=swfdec/swfdec.git;a=commit;h=326ee4ff631ecc11605f1251e1923a94561a3823</ref>
      <ref source="MLIST" url="http://lists.freedesktop.org/archives/swfdec/2008-April/001321.html" patch="1">[Swfdec] 20080409 Swfdec 0.6.4 released</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28881">28881</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41887">swfdec-swfdecloadobject-info-disclosure(41887)</ref>
    </refs>
    <vuln_soft>
      <prod name="swfdec" vendor="swfdec">
        <vers num="0.4.0"/>
        <vers num="0.4.1"/>
        <vers num="0.4.2"/>
        <vers num="0.4.3"/>
        <vers num="0.4.4"/>
        <vers num="0.4.5"/>
        <vers num="0.5.0"/>
        <vers num="0.5.1"/>
        <vers num="0.5.2"/>
        <vers num="0.5.3"/>
        <vers num="0.5.4"/>
        <vers num="0.5.5"/>
        <vers num="0.5.90"/>
        <vers num="0.6.0"/>
        <vers num="0.6.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1835" seq="2008-1835" published="2008-04-16" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">ClamAV before 0.93 allows remote attackers to bypass the scanning enging via a RAR file with an invalid version number, which cannot be parsed by ClamAV but can be extracted by Winrar.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html">APPLE-SA-2008-09-15</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00009.html">SUSE-SA:2008:024</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200805-19.xml">GLSA-200805-19</ref>
      <ref source="CONFIRM" url="http://up2date.astaro.com/2008/08/up2date_asg_v7300_ga_released.html">http://up2date.astaro.com/2008/08/up2date_asg_v7300_ga_released.html</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:088">MDVSA-2008:088</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28784">28784</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-260A.html">TA08-260A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2584">ADV-2008-2584</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41874">clamav-rar-weak-security(41874)</ref>
      <ref source="CONFIRM" url="https://wwws.clamav.net/bugzilla/show_bug.cgi?id=541">https://wwws.clamav.net/bugzilla/show_bug.cgi?id=541</ref>
    </refs>
    <vuln_soft>
      <prod name="clamav" vendor="clam_anti-virus">
        <vers num="0.15"/>
        <vers num="0.20"/>
        <vers num="0.21"/>
        <vers num="0.22"/>
        <vers num="0.23"/>
        <vers num="0.24"/>
        <vers num="0.51"/>
        <vers num="0.52"/>
        <vers num="0.53"/>
        <vers num="0.54"/>
        <vers num="0.60"/>
        <vers num="0.60p"/>
        <vers num="0.65"/>
        <vers num="0.67"/>
        <vers num="0.68"/>
        <vers num="0.68.1"/>
        <vers num="0.70"/>
        <vers num="0.71"/>
        <vers num="0.72"/>
        <vers num="0.73"/>
        <vers num="0.74"/>
        <vers num="0.75"/>
        <vers num="0.75.1"/>
        <vers num="0.80"/>
        <vers num="0.80_rc1"/>
        <vers num="0.80_rc2"/>
        <vers num="0.80_rc3"/>
        <vers num="0.80_rc4"/>
        <vers num="0.81"/>
        <vers num="0.81_rc1"/>
        <vers num="0.82"/>
        <vers num="0.83"/>
        <vers num="0.84"/>
        <vers num="0.84_rc1"/>
        <vers num="0.84_rc2"/>
        <vers num="0.85"/>
        <vers num="0.85.1"/>
        <vers num="0.86"/>
        <vers num="0.86.1"/>
        <vers num="0.86.2"/>
        <vers num="0.86_rc1"/>
        <vers num="0.87"/>
        <vers num="0.87.1"/>
        <vers num="0.88"/>
        <vers num="0.88.1"/>
        <vers num="0.88.3"/>
        <vers num="0.88.4"/>
        <vers num="0.88.5"/>
        <vers num="0.88.6"/>
        <vers num="0.88.7"/>
        <vers num="0.90"/>
        <vers num="0.90.1"/>
        <vers num="0.90.2"/>
        <vers num="0.90_rc1.1"/>
        <vers num="0.90_rc2"/>
        <vers num="0.90_rc3"/>
        <vers num="0.90rc1"/>
        <vers num="0.91"/>
        <vers num="0.91.1"/>
        <vers num="0.91.2"/>
        <vers num="0.91rc1"/>
        <vers num="0.91rc2"/>
        <vers num="0.92"/>
        <vers num="0.92.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1836" seq="2008-1836" published="2008-04-16" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The rfc2231 function in message.c in libclamav in ClamAV before 0.93 allows remote attackers to cause a denial of service (crash) via a crafted message that produces a string that is not null terminated, which triggers a buffer over-read.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html">APPLE-SA-2008-09-15</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00009.html">SUSE-SA:2008:024</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200805-19.xml">GLSA-200805-19</ref>
      <ref source="CONFIRM" url="http://up2date.astaro.com/2008/08/up2date_asg_v7300_ga_released.html">http://up2date.astaro.com/2008/08/up2date_asg_v7300_ga_released.html</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:088">MDVSA-2008:088</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28784">28784</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-260A.html">TA08-260A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2584">ADV-2008-2584</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41868">clamav-rfc2231-dos(41868)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00249.html">FEDORA-2008-3900</ref>
      <ref source="CONFIRM" url="https://wwws.clamav.net/bugzilla/show_bug.cgi?id=881">https://wwws.clamav.net/bugzilla/show_bug.cgi?id=881</ref>
    </refs>
    <vuln_soft>
      <prod name="clamav" vendor="clam_anti-virus">
        <vers num="0.90"/>
        <vers num="0.90.1"/>
        <vers num="0.90_rc1.1"/>
        <vers num="0.90_rc2"/>
        <vers num="0.90_rc3"/>
        <vers num="0.90rc1"/>
        <vers num="0.91"/>
        <vers num="0.92"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1837" seq="2008-1837" published="2008-04-16" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">libclamunrar in ClamAV before 0.93 allows remote attackers to cause a denial of service (crash) via crafted RAR files that trigger "memory problems," as demonstrated by the PROTOS GENOME test suite for Archive Formats.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html">APPLE-SA-2008-09-15</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00009.html">SUSE-SA:2008:024</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200805-19.xml">GLSA-200805-19</ref>
      <ref source="CONFIRM" url="http://up2date.astaro.com/2008/08/up2date_asg_v7300_ga_released.html">http://up2date.astaro.com/2008/08/up2date_asg_v7300_ga_released.html</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:088">MDVSA-2008:088</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28784">28784</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-260A.html">TA08-260A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1227/references">ADV-2008-1227</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2584">ADV-2008-2584</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41870">clamav-libclamunrar-dos(41870)</ref>
      <ref source="CONFIRM" url="https://wwws.clamav.net/bugzilla/show_bug.cgi?id=898">https://wwws.clamav.net/bugzilla/show_bug.cgi?id=898</ref>
    </refs>
    <vuln_soft>
      <prod name="clamav" vendor="clam_anti-virus">
        <vers num="0.15"/>
        <vers num="0.20"/>
        <vers num="0.21"/>
        <vers num="0.22"/>
        <vers num="0.23"/>
        <vers num="0.24"/>
        <vers num="0.51"/>
        <vers num="0.52"/>
        <vers num="0.53"/>
        <vers num="0.54"/>
        <vers num="0.60"/>
        <vers num="0.60p"/>
        <vers num="0.65"/>
        <vers num="0.67"/>
        <vers num="0.68"/>
        <vers num="0.68.1"/>
        <vers num="0.70"/>
        <vers num="0.71"/>
        <vers num="0.72"/>
        <vers num="0.73"/>
        <vers num="0.74"/>
        <vers num="0.75"/>
        <vers num="0.75.1"/>
        <vers num="0.80"/>
        <vers num="0.80_rc1"/>
        <vers num="0.80_rc2"/>
        <vers num="0.80_rc3"/>
        <vers num="0.80_rc4"/>
        <vers num="0.81"/>
        <vers num="0.81_rc1"/>
        <vers num="0.82"/>
        <vers num="0.83"/>
        <vers num="0.84"/>
        <vers num="0.84_rc1"/>
        <vers num="0.84_rc2"/>
        <vers num="0.85"/>
        <vers num="0.85.1"/>
        <vers num="0.86"/>
        <vers num="0.86.1"/>
        <vers num="0.86.2"/>
        <vers num="0.86_rc1"/>
        <vers num="0.87"/>
        <vers num="0.87.1"/>
        <vers num="0.88"/>
        <vers num="0.88.1"/>
        <vers num="0.88.3"/>
        <vers num="0.88.4"/>
        <vers num="0.88.5"/>
        <vers num="0.88.6"/>
        <vers num="0.88.7"/>
        <vers num="0.90"/>
        <vers num="0.90.1"/>
        <vers num="0.90.2"/>
        <vers num="0.90_rc1.1"/>
        <vers num="0.90_rc2"/>
        <vers num="0.90_rc3"/>
        <vers num="0.90rc1"/>
        <vers num="0.91"/>
        <vers num="0.91.1"/>
        <vers num="0.91.2"/>
        <vers num="0.91rc1"/>
        <vers num="0.91rc2"/>
        <vers num="0.92"/>
        <vers num="0.92.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1838" seq="2008-1838" published="2008-04-16" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in BosClassifieds Classified Ads System 3.0 allows remote attackers to execute arbitrary SQL commands via the cat parameter to index.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28760">28760</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41799">bosclassifieds-index-sql-injection(41799)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5444">5444</ref>
    </refs>
    <vuln_soft>
      <prod name="bosclassifieds_ads_systems" vendor="bosdev">
        <vers num="3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1839" seq="2008-1839" published="2008-04-16" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multgiple cross-site scripting (XSS) vulnerabilities in module/main.php in WORK system e-commerce 4.0.9 allow remote attackers to inject arbitrary web script or HTML via the (1) day, (2) month, and (3) year parameters.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28785">28785</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41811">work-systemecommerce-main-xss(41811)</ref>
    </refs>
    <vuln_soft>
      <prod name="work_system_e-commerce" vendor="work_system_e-commerce">
        <vers num="4.0.9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1840" seq="2008-1840" published="2008-04-16" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in upload.php in Coppermine Photo Gallery (CPG) 1.4.16 and earlier allows remote authenticated users or user-assisted remote HTTP servers to execute arbitrary SQL commands via the Content-Type HTTP response header provided by the HTTP server that is used for an upload.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://forum.coppermine-gallery.net/index.php/topic,51787,0.html">http://forum.coppermine-gallery.net/index.php/topic,51787,0.html</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?group_id=89658&amp;release_id=592069" patch="1">http://sourceforge.net/project/shownotes.php?group_id=89658&amp;release_id=592069</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28766" patch="1">28766</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41784">coppermine-upload-sql-injection(41784)</ref>
    </refs>
    <vuln_soft>
      <prod name="coppermine_photo_gallery" vendor="coppermine">
        <vers num="1.4"/>
        <vers num="1.4.1"/>
        <vers num="1.4.2"/>
        <vers num="1.4.3"/>
        <vers num="1.4.4"/>
        <vers num="1.4.5"/>
        <vers num="1.4.6"/>
        <vers num="1.4.7"/>
        <vers num="1.4.8"/>
        <vers num="1.4.9"/>
        <vers num="1.4.10"/>
        <vers num="1.4.11"/>
        <vers num="1.4.12"/>
        <vers num="1.4.13"/>
        <vers num="1.4.14"/>
        <vers num="1.4.16" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1841" seq="2008-1841" published="2008-04-16" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the session handling functionality in bridge/coppermine.inc.php in Coppermine Photo Gallery (CPG) 1.4.17 and earlier allows remote attackers to execute arbitrary SQL commands via an input field associated with the session_id variable, as exploited in the wild in April 2008.  NOTE: the fix for CVE-2008-1840 was intended to address this vulnerability, but is actually inapplicable.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://coppermine.svn.sourceforge.net/viewvc/coppermine/trunk/cpg1.4.x/bridge/coppermine.inc.php?r1=4380&amp;r2=4381">http://coppermine.svn.sourceforge.net/viewvc/coppermine/trunk/cpg1.4.x/bridge/coppermine.inc.php?r1=4380&amp;r2=4381</ref>
      <ref source="CONFIRM" url="http://coppermine.svn.sourceforge.net/viewvc/coppermine/trunk/cpg1.4.x/bridge/coppermine.inc.php?view=log">http://coppermine.svn.sourceforge.net/viewvc/coppermine/trunk/cpg1.4.x/bridge/coppermine.inc.php?view=log</ref>
      <ref source="CONFIRM" url="http://forum.coppermine-gallery.net/index.php/topic,51882.0.html" patch="1">http://forum.coppermine-gallery.net/index.php/topic,51882.0.html</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?group_id=89658&amp;release_id=592069">http://sourceforge.net/project/shownotes.php?group_id=89658&amp;release_id=592069</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28767" patch="1">28767</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41788">coppermine-coppermineinc-sql-injection(41788)</ref>
    </refs>
    <vuln_soft>
      <prod name="coppermine_photo_gallery" vendor="coppermine">
        <vers num="1.2.0"/>
        <vers num="1.2.0rc2"/>
        <vers num="1.2.1"/>
        <vers num="1.3.0"/>
        <vers num="1.3.1"/>
        <vers num="1.3.2"/>
        <vers num="1.3.3"/>
        <vers num="1.3.5"/>
        <vers num="1.4.2"/>
        <vers num="1.4.4"/>
        <vers num="1.4.5"/>
        <vers num="1.4.6"/>
        <vers num="1.4.7"/>
        <vers num="1.4.8"/>
        <vers num="1.4.9"/>
        <vers num="1.4.10"/>
        <vers num="1.4.11"/>
        <vers num="1.4.12"/>
        <vers num="1.4.13"/>
        <vers num="1.4.14"/>
        <vers num="1.4.16"/>
        <vers num="1.4.17"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1842" seq="2008-1842" published="2008-04-16" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Integer signedness error in ovspmd.exe in HP OpenView Network Node Manager (OV NNM) 8.01, and 7.53 and earlier, allows remote attackers to cause a denial of service (daemon crash) or execute arbitrary code via a long request to TCP port 8886 that begins with a certain negative integer, which passes a signed comparison and triggers a heap-based buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/closedview-adv.txt">http://aluigi.altervista.org/adv/closedview-adv.txt</ref>
      <ref source="MISC" url="http://aluigi.org/poc/closedview.zip">http://aluigi.org/poc/closedview.zip</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=121321155405849&amp;w=2">SSRT080024</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019821">1019821</ref>
      <ref source="HP" url="http://www.securityfocus.com/archive/1/493781/100/0/threaded">HPSBMA02338</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28689">28689</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1159" adv="1">ADV-2008-1159</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41737">hp-nnm-ovspmd-bo(41737)</ref>
    </refs>
    <vuln_soft>
      <prod name="openview_network_node_manager" vendor="hp">
        <vers num="4.11"/>
        <vers num="5.0.1"/>
        <vers num="5.01"/>
        <vers num="6.0.1"/>
        <vers num="6.1"/>
        <vers num="6.2"/>
        <vers num="6.4"/>
        <vers num="6.10"/>
        <vers num="6.20"/>
        <vers num="6.31"/>
        <vers num="6.41"/>
        <vers num="7.0.1"/>
        <vers num="7.01"/>
        <vers num="7.50"/>
        <vers num="7.51"/>
        <vers num="7.53" prev="1"/>
        <vers num="8.01"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1843" seq="2008-1843" published="2008-04-16" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in browse.php in W2B DatingClub (aka Dating Club) allows remote attackers to execute arbitrary SQL commands via the age_to parameter in a browsebyCat action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://forum.aria-security.com/showthread.php?p=70">http://forum.aria-security.com/showthread.php?p=70</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=120792465631586&amp;w=2">20080410 w2b.ru multiple products SQL Injection</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28737">28737</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41792">datingclub-browse-sql-injection(41792)</ref>
    </refs>
    <vuln_soft>
      <prod name="dating_club" vendor="w2b">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1844" seq="2008-1844" published="2008-04-16" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in cat.php in W2B phpHotResources allows remote attackers to execute arbitrary SQL commands via the kind parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://forum.aria-security.com/showthread.php?p=70">http://forum.aria-security.com/showthread.php?p=70</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=120792465631586&amp;w=2">20080410 w2b.ru multiple products SQL Injection</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28736">28736</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41793">phphotresources-cat-sql-injection(41793)</ref>
    </refs>
    <vuln_soft>
      <prod name="phphotresources" vendor="w2b">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1845" seq="2008-1845" published="2008-04-16" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The Korn shell (aka mksh) before R33d on MirOS (aka MirBSD) does not flush the tty's I/O when invoking mksh in a new terminal, which allows local users to gain privileges by opening a virtual terminal and entering command sequences, which might later be executed in opportunistic circumstances by a different user who launches mksh and specifies that terminal with the -T option.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.mirbsd.org/mksh.htm#clog">http://www.mirbsd.org/mksh.htm#clog</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28768">28768</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41794">mirbsd-tty-privilege-escalation(41794)</ref>
    </refs>
    <vuln_soft>
      <prod name="miros" vendor="mirbsd">
        <vers num="33" prev="1" edition="a"/>
        <vers num="33" prev="1" edition="b"/>
        <vers num="33" prev="1" edition="c"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1846" seq="2008-1846" published="2008-04-16" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The default configuration of SAP NetWeaver before 7.0 SP15 does not enable the "Always Use Secure HTML Editor" (aka Editor Security or Secure Editing) parameter, which allows remote attackers to conduct cross-site scripting (XSS) attacks by entering feedback for a file.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3812">3812</ref>
      <ref source="MISC" url="http://www.aitsec.com/vulnerability-SAP-Netweaver-6.40-7.0-Cross-Site-Scripting.php">http://www.aitsec.com/vulnerability-SAP-Netweaver-6.40-7.0-Cross-Site-Scripting.php</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490625/100/0/threaded">20080409 SAP Netweaver 6.40-7.0 Cross-Site-Scripting</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28699">28699</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019822">1019822</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41735">netweaver-feedbacksform-xss(41735)</ref>
    </refs>
    <vuln_soft>
      <prod name="netweaver" vendor="sap">
        <vers num="7.0" prev="1" edition="sp8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1847" seq="2008-1847" published="2008-04-16" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in view.php in CoronaMatrix phpAddressBook 2.11 allows remote attackers to execute arbitrary SQL commands via the id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28750">28750</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41498">phpaddressbook-index-sql-injection(41498)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5432">5432</ref>
    </refs>
    <vuln_soft>
      <prod name="phpaddressbook" vendor="coronamatrix">
        <vers num="2.11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1848" seq="2008-1848" published="2008-04-16" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the joomlaXplorer (com_joomlaxplorer) Mambo/Joomla! component 1.6.2 and earlier allows remote attackers to inject arbitrary web script or HTML via the error parameter in a show_error action to index.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28746">28746</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41779">joomlaxplorer-index-xss(41779)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5431">5431</ref>
    </refs>
    <vuln_soft>
      <prod name="joomlaexplorer" vendor="joomlacode">
        <vers num="1.6.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1849" seq="2008-1849" published="2008-04-16" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in index.php in the joomlaXplorer (com_joomlaxplorer) Mambo/Joomla! component 1.6.2 and earlier allows remote attackers to list arbitrary directories via a .. (dot dot) in the dir parameter in a show_error action.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28746">28746</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41778">joomlaxplorer-index-directory-traversal(41778)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5431">5431</ref>
    </refs>
    <vuln_soft>
      <prod name="joomlaexplorer" vendor="joomlacode">
        <vers num="1.6.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1850" seq="2008-1850" published="2008-04-16" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in login.php in Omnistar Interactive OSI Affiliate allow remote attackers to inject arbitrary web script or HTML via the (1) login, (2) profile, (3) profile2, and (4) ref parameters.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.mrzayas.es/2008/04/11/xss-en-osiaffiliate/">http://www.mrzayas.es/2008/04/11/xss-en-osiaffiliate/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28785">28785</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28793">28793</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41811">work-systemecommerce-main-xss(41811)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41825">osi-affiliate-login-xss(41825)</ref>
    </refs>
    <vuln_soft>
      <prod name="osiaffiliate" vendor="osiaffiliate">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1851" seq="2008-1851" published="2008-04-16" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">ovalarmsrv in HP OpenView Network Node Manager (OV NNM) 7.51, 7.53, and possibly other versions allows remote attackers to cause a denial of service (hang) via certain requests that do not provide all required arguments.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/closedviewx-adv.txt">http://aluigi.altervista.org/adv/closedviewx-adv.txt</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490771">20080411 Directory traversal and multiple Denials of Service in HP OpenView NNM 7.53</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28745">28745</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019839">1019839</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1214/references">ADV-2008-1214</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41694">hp-nnm-ovalarmsrv-bo(41694)</ref>
    </refs>
    <vuln_soft>
      <prod name="openview_network_node_manager" vendor="hp">
        <vers num="7.51"/>
        <vers num="7.53"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1852" seq="2008-1852" published="2008-04-16" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">ovalarmsrv in HP OpenView Network Node Manager (OV NNM) 7.51, 7.53, and possibly other versions allows remote attackers to cause a denial of service (crash) via certain requests that specify a large number of sub-arguments, which triggers a NULL pointer dereference due to memory allocation failure.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/closedviewx-adv.txt">http://aluigi.altervista.org/adv/closedviewx-adv.txt</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490771">20080411 Directory traversal and multiple Denials of Service in HP OpenView NNM 7.53</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28745">28745</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019839">1019839</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1214/references">ADV-2008-1214</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41695">hp-nnm-ovalarmsrv-dos(41695)</ref>
    </refs>
    <vuln_soft>
      <prod name="openview_network_node_manager" vendor="hp">
        <vers num="7.51"/>
        <vers num="7.53"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1853" seq="2008-1853" published="2008-04-16" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The ovtopmd service in HP OpenView Network Node Manager (OV NNM) 7.51, 7.53, and possibly other versions allows remote attackers to cause a denial of service (exit) by sending a 0x36 packet (exit request).</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/closedviewx-adv.txt">http://aluigi.altervista.org/adv/closedviewx-adv.txt</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490771">20080411 Directory traversal and multiple Denials of Service in HP OpenView NNM 7.53</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28745">28745</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019839">1019839</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1214/references">ADV-2008-1214</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41693">hp-nnm-ovalarmsrv-format-string(41693)</ref>
    </refs>
    <vuln_soft>
      <prod name="openview_network_node_manager" vendor="hp">
        <vers num="7.51"/>
        <vers num="7.53"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1854" seq="2008-1854" published="2008-04-16" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in SmarterMail Web Server (SMWebSvr.exe) in SmarterMail 5.0.2999 allows remote attackers to cause a denial of service (service termination) via a long HTTP (1) GET, (2) HEAD, (3) PUT, (4) POST, or (5) TRACE request.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28610">28610</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41710">smartermail-webserver-smwebsvr-dos(41710)</ref>
    </refs>
    <vuln_soft>
      <prod name="smartermail" vendor="smartertools">
        <vers num="5.0.2999"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1855" seq="2008-1855" published="2008-04-16" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">FrameworkService.exe in McAfee Common Management Agent (CMA) 3.6.0.574 Patch 3 and earlier, as used by ePolicy Orchestrator (ePO) and ProtectionPilot (PrP), allows remote attackers to corrupt memory and cause a denial of service (CMA Framework service crash) via a long invalid method in requests for the /spin//AVClient//AVClient.csp URI, a different vulnerability than CVE-2006-5274.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.offensive-security.com/0day/mcafee_again.py.txt">http://www.offensive-security.com/0day/mcafee_again.py.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28573">28573</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019794">1019794</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1122/references">ADV-2008-1122</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41597">mcafee-cma-frameworkservice-dos(41597)</ref>
      <ref source="CONFIRM" url="https://knowledge.mcafee.com/article/219/615324_f.SAL_Public.html">https://knowledge.mcafee.com/article/219/615324_f.SAL_Public.html</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5343">5343</ref>
    </refs>
    <vuln_soft>
      <prod name="cma" vendor="mcafee">
        <vers num="3.6.0.574" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1856" seq="2008-1856" published="2008-04-16" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="5.1" CVSS_base_score="5.1" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">plugins/maps/db_handler.php in LinPHA 1.3.3 and earlier does not require authentication for a settings action that modifies the configuration file, which allows remote attackers to conduct directory traversal attacks and execute arbitrary local files by placing directory traversal sequences into the maps_type configuration setting, and then sending a request to maps_view.php, which causes plugins/maps/map.main.class.php to use the modified configuration.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=595725">http://sourceforge.net/project/shownotes.php?release_id=595725</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28654">28654</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1136">ADV-2008-1136</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41676">linpha-mapmainclass-file-include(41676)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5392">5392</ref>
    </refs>
    <vuln_soft>
      <prod name="linpha" vendor="linpha">
        <vers num="0.9.0"/>
        <vers num="0.9.1"/>
        <vers num="0.9.2"/>
        <vers num="0.9.3"/>
        <vers num="0.9.4"/>
        <vers num="1.0" edition="beta1"/>
        <vers num="1.0" edition="beta2"/>
        <vers num="1.0" edition="beta3"/>
        <vers num="1.0" edition="rc1"/>
        <vers num="1.1.0"/>
        <vers num="1.1.1"/>
        <vers num="1.2.0"/>
        <vers num="1.3.0"/>
        <vers num="1.3.1"/>
        <vers num="1.3.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1857" seq="2008-1857" published="2008-04-16" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple directory traversal vulnerabilities in viewsource.php in Make our Life Easy (Mole) 2.1.0 allow remote attackers to read arbitrary files via directory traversal sequences in the (1) dirn and (2) fname parameters.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28659">28659</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1141/references">ADV-2008-1141</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41681">mole-viewsource-file-include(41681)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5394">5394</ref>
    </refs>
    <vuln_soft>
      <prod name="make_our_life_easy" vendor="mole">
        <vers num="2.1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1858" seq="2008-1858" published="2008-04-16" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in 724Networks 724CMS 4.01 and earlier allows remote attackers to execute arbitrary SQL commands via the ID parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28672">28672</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1139/references">ADV-2008-1139</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41700">724cms-index-sql-injection(41700)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5400">5400</ref>
    </refs>
    <vuln_soft>
      <prod name="724cms" vendor="724cms">
        <vers num="4.01" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1859" seq="2008-1859" published="2008-04-16" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in events.php in iScripts SocialWare allows remote attackers to execute arbitrary SQL commands via the id parameter in a show action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28669">28669</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1137/references">ADV-2008-1137</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41697">socialware-events-sql-injection(41697)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5402">5402</ref>
    </refs>
    <vuln_soft>
      <prod name="socialware" vendor="iscripts">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1860" seq="2008-1860" published="2008-04-17" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Static code injection vulnerability in admin.php in LokiCMS 0.3.3 and earlier allows remote attackers to inject arbitrary PHP code into includes/Config.php via the default parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492877/100/0/threaded">20080531 LokiCMS Multiple Vulnerabilities through Authorization weakness</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1162/references">ADV-2008-1162</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41736">lokicms-admin-code-execution(41736)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5408">5408</ref>
    </refs>
    <vuln_soft>
      <prod name="lokicms" vendor="lokicms">
        <vers num="0.1.0"/>
        <vers num="0.1.0rc1"/>
        <vers num="0.2.0"/>
        <vers num="0.3.0"/>
        <vers num="0.3.1b1"/>
        <vers num="0.3.1b2"/>
        <vers num="0.3.2b1"/>
        <vers num="0.3.3" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1861" seq="2008-1861" published="2008-04-17" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="5.1" CVSS_base_score="5.1" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in modules/threadstop/threadstop.php in ExBB Italia 0.22 and earlier, when register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the exbb[default_lang] parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28686">28686</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41707">exbb-exbbdefaultlang-file-include(41707)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5405">5405</ref>
    </refs>
    <vuln_soft>
      <prod name="exbb_italia" vendor="exbb">
        <vers num="0.2.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1862" seq="2008-1862" published="2008-04-17" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">ExBB Italia 0.22 and earlier only checks GET requests that use the QUERY_STRING for certain path manipulations, which allows remote attackers to bypass this check via (1) POST or (2) COOKIE variables, a different vector than CVE-2006-4488.  NOTE: this can be leveraged to conduct PHP remote file inclusion attacks via a URL in the (a) new_exbb[home_path] or (b) exbb[home_path] parameter to modules/threadstop/threadstop.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41708">exbb-threadstop-file-include(41708)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5405">5405</ref>
    </refs>
    <vuln_soft>
      <prod name="exbb_italia" vendor="exbb">
        <vers num="0.2.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1863" seq="2008-1863" published="2008-04-17" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in view_reviews.php in Prozilla Cheat Script (aka Cheats) 2.0 allows remote attackers to execute arbitrary SQL commands via the id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28640">28640</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1116/references">ADV-2008-1116</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41673">prozillacheats-viewreviews-sql-injection(41673)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5389">5389</ref>
    </refs>
    <vuln_soft>
      <prod name="cheats" vendor="prozilla">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1864" seq="2008-1864" published="2008-04-17" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in project.php in Prozilla Freelancers allows remote attackers to execute arbitrary SQL commands via the project parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28653">28653</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41705">prozillafreelancers-project-sql-injection(41705)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5390">5390</ref>
    </refs>
    <vuln_soft>
      <prod name="prozilla_freelancers" vendor="prozilla">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1865" seq="2008-1865" published="2008-04-17" modified="2018-10-11" severity="Low" CVSS_version="2.0" CVSS_score="1.9" CVSS_base_score="1.9" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the msx_readnode function in libmosix.c in openmosix-tools (aka userspace-tools) in openMosix might allow local users to cause a denial of service (application crash) via a third-party program that calls this function with a long item argument.  NOTE: the vendor does not provide any program that is capable of causing this overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3813">3813</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490534/100/0/threaded">20080406 openMosix userspace library stack-based buffer overflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28663">28663</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41691">openmosix-msxreadnode-bo(41691)</ref>
    </refs>
    <vuln_soft>
      <prod name="openmosix" vendor="openmosix_project">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1866" seq="2008-1866" published="2008-04-17" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="9.0" CVSS_base_score="9.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">admin/modif_config.php in Blog Pixel Motion (aka PixelMotion) does not require admin authentication, which allows remote authenticated users to upload arbitrary PHP scripts in a ZIP archive, which is written to templateZip/ and then automatically extracted under templates/ for execution via a direct request.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28646">28646</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1121/references">ADV-2008-1121</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41670">blogpixelmotion-modifconfig-file-upload(41670)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5381">5381</ref>
    </refs>
    <vuln_soft>
      <prod name="pixel_motion_blog" vendor="pixel_motion">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1867" seq="2008-1867" published="2008-04-17" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in Blog Pixel Motion (aka Blog PixelMotion) allows remote attackers to execute arbitrary SQL commands via the categorie parameter to index.php, possibly related to include/requetesIndex.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28645">28645</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1121/references">ADV-2008-1121</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41668">blogpixelmotion-index-sql-injection(41668)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5382">5382</ref>
    </refs>
    <vuln_soft>
      <prod name="pixel_motion_blog" vendor="pixel_motion">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1868" seq="2008-1868" published="2008-04-17" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">admin/sauvBase.php in Blog Pixel Motion (aka Blog PixelMotion) does not require authentication, which allows remote attackers to trigger a database backup dump, and obtain the resulting blogPM.sql file that contains sensitive information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1121/references">ADV-2008-1121</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41671">blogpixelmotion-sauvbase-info-disclosure(41671)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5380">5380</ref>
    </refs>
    <vuln_soft>
      <prod name="pixel_motion_blog" vendor="pixel_motion">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1869" seq="2008-1869" published="2008-04-17" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in Site Sift Listings allows remote attackers to execute arbitrary SQL commands via the id parameter in a detail action to index.php.  NOTE: this issue might be site-specific.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28644">28644</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1120/references">ADV-2008-1120</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41662">sitesiftlistings-index-sql-injection(41662)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5383">5383</ref>
    </refs>
    <vuln_soft>
      <prod name="site_sift_listings" vendor="site_sift_media">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1870" seq="2008-1870" published="2008-04-17" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in getdata.php in PIGMy-SQL 1.4.1 and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28634">28634</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1135/references">ADV-2008-1135</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41657">pigmysql-getdata-sql-injection(41657)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5367">5367</ref>
    </refs>
    <vuln_soft>
      <prod name="pigmy-sql" vendor="geek247">
        <vers num="1.4"/>
        <vers num="1.4.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1871" seq="2008-1871" published="2008-04-17" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in links.php in Scriptsagent.com Links Directory 1.1 allows remote authenticated users to execute arbitrary SQL commands via the cat_id parameter in a list action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28655">28655</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1126/references">ADV-2008-1126</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41661">linksdirectory-links-sql-injection(41661)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5377">5377</ref>
    </refs>
    <vuln_soft>
      <prod name="links_directory" vendor="scriptsagent">
        <vers num="1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1872" seq="2008-1872" published="2008-04-17" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in home.news.php in Comdev News Publisher 4.1.2 allows remote attackers to execute arbitrary SQL commands via the arcmonth parameter.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28622">28622</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41663">newspublisher-index-sql-injection(41663)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5362">5362</ref>
    </refs>
    <vuln_soft>
      <prod name="comdev_news_publisher" vendor="comdev">
        <vers num="4.1.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1873" seq="2008-1873" published="2008-04-17" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the private message feature in Nuke ET 3.2 and 3.4, when using Internet Explorer, allows remote authenticated users to inject arbitrary web script or HTML via a CSS property in the STYLE attribute of a DIV element in the mensaje parameter.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://mrzayas.es/wp-content/poc/nukeet.txt">http://mrzayas.es/wp-content/poc/nukeet.txt</ref>
      <ref source="MISC" url="http://www.mrzayas.es/2008/04/04/xploitnukeet3/">http://www.mrzayas.es/2008/04/04/xploitnukeet3/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28614">28614</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41646">nukeet-messages-xss(41646)</ref>
    </refs>
    <vuln_soft>
      <prod name="nukeet" vendor="tru-zone">
        <vers num="3.2"/>
        <vers num="3.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1874" seq="2008-1874" published="2008-04-17" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in account/user/mail.html in Xpoze Pro 3.05 and earlier allows remote authenticated users to execute arbitrary SQL commands via the reed parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28618">28618</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41656">xpoze-mail-sql-injection(41656)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5358">5358</ref>
    </refs>
    <vuln_soft>
      <prod name="xpoze_pro" vendor="xpoze">
        <vers num="3.05" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1875" seq="2008-1875" published="2008-04-17" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in Terong PHP Photo Gallery (aka Advanced Web Photo Gallery) 1.0 allows remote attackers to execute arbitrary SQL commands via the photo_id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28626">28626</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41665">photogallery-index-sql-injection(41665)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5364">5364</ref>
    </refs>
    <vuln_soft>
      <prod name="advanced_web_photo_gallery" vendor="terong">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1876" seq="2008-1876" published="2008-04-17" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in index.php in VisualPic 0.3.1 allows remote attackers to execute arbitrary PHP code via a URL in the _CONFIG[files][functions_page] parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1127/references">ADV-2008-1127</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41667">visualpic-index-file-include(41667)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5375">5375</ref>
    </refs>
    <vuln_soft>
      <prod name="visualpic" vendor="snarky">
        <vers num="0.3.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1877" seq="2008-1877" published="2008-04-17" modified="2017-08-07" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">tss 0.8.1 allows local users to read arbitrary files via the -a parameter, which is processed while tss is running with privileges.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=475747">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=475747</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41929">tss-file-information-disclosure(41929)</ref>
    </refs>
    <vuln_soft>
      <prod name="tss" vendor="debian">
        <vers num="0.8.1"/>
        <vers num="0.8.2"/>
        <vers num="0.8.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1878" seq="2008-1878" published="2008-04-17" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the demux_nsf_send_chunk function in src/demuxers/demux_nsf.c in xine-lib 1.1.12 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long NSF title.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00001.html">SUSE-SR:2008:012</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200808-01.xml">GLSA-200808-01</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1586">DSA-1586</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:177">MDVSA-2008:177</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:178">MDVSA-2008:178</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28816">28816</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-635-1">USN-635-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1247/references">ADV-2008-1247</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41865">xinelib-demuxnsfsendchunk-bo(41865)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5458">5458</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00536.html">FEDORA-2008-3326</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00571.html">FEDORA-2008-3353</ref>
    </refs>
    <vuln_soft>
      <prod name="xine-lib" vendor="xine">
        <vers num="1.1.0"/>
        <vers num="1.1.1"/>
        <vers num="1.1.9"/>
        <vers num="1.1.10"/>
        <vers num="1.1.10.1"/>
        <vers num="1.1.11"/>
        <vers num="1.1.11.1"/>
        <vers num="1.1.12" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1880" seq="2008-1880" published="2008-05-12" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The default configuration of Firebird before 2.0.3.12981.0-r6 on Gentoo Linux sets the ISC_PASSWORD environment variable before starting Firebird, which allows remote attackers to bypass SYSDBA authentication and obtain sensitive database information via an empty password.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.gentoo.org/show_bug.cgi?id=216158">http://bugs.gentoo.org/show_bug.cgi?id=216158</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200805-06.xml">GLSA-200805-06</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29123">29123</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42299">firebird-sysdba-unath-access(42299)</ref>
    </refs>
    <vuln_soft>
      <prod name="firebird" vendor="firebird">
        <vers num="2.0.3.12981.0" prev="1" edition="r5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1881" seq="2008-1881" published="2008-04-17" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the ParseSSA function (modules/demux/subtitle.c) in VLC 0.8.6e allows remote attackers to execute arbitrary code via a long subtitle in an SSA file.  NOTE: this issue is due to an incomplete fix for CVE-2007-6681.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/vlcboffs-adv.txt">http://aluigi.altervista.org/adv/vlcboffs-adv.txt</ref>
      <ref source="MISC" url="http://aluigi.org/adv/vlcboffs-adv.txt">http://aluigi.org/adv/vlcboffs-adv.txt</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200804-25.xml">GLSA-200804-25</ref>
      <ref source="CONFIRM" url="http://wiki.videolan.org/Changelog/0.8.6f">http://wiki.videolan.org/Changelog/0.8.6f</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489698">20080317 VLC highlander bug</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28251">28251</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28274">28274</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41237">vlcmediaplayer-subtitle-bo(41237)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41936">vlc-parsessa-bo(41936)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14872">oval:org.mitre.oval:def:14872</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5250">5250</ref>
    </refs>
    <vuln_soft>
      <prod name="vlc" vendor="videolan">
        <vers num="0.8.6e"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1883" seq="2008-1883" published="2008-04-18" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The server in Blackboard Academic Suite 7.x stores MD5 password hashes that are provided directly by clients, which makes it easier for remote attackers to access accounts via a modified client that skips the javascript/md5.js hash calculation, and instead sends an arbitrary MD5 string.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://secskill.wordpress.com/2008/03/27/hacking-blackboard-academic-suite-2/">http://secskill.wordpress.com/2008/03/27/hacking-blackboard-academic-suite-2/</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3810">3810</ref>
      <ref source="MISC" url="http://www.scribd.com/doc/2363025/Hacking-Blackboard-Academic-Suite">http://www.scribd.com/doc/2363025/Hacking-Blackboard-Academic-Suite</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490096/100/0/threaded">20080326 Blackboard Academic Suite Multiple XSS Vulnerabilities</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41935">blackboard-client-information-disclosure(41935)</ref>
    </refs>
    <vuln_soft>
      <prod name="blackboard_academic_suite" vendor="blackboard">
        <vers num="7" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1884" seq="2008-1884" published="2008-04-18" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in index.php in Wikepage Opus 13 2007.2 allows remote attackers to read arbitrary files via directory traversal sequences in the wiki parameter, a different vector than CVE-2006-4418.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2008-04/0082.html">20080407 Wikepage Opus 13 2007.2 Directory Traversal Vulnerbility</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28664">28664</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41688">wikepage-index-multiple-file-include(41688)</ref>
    </refs>
    <vuln_soft>
      <prod name="opus" vendor="wikepage">
        <vers num="13_2007.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1885" seq="2008-1885" published="2008-04-18" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in the NeffyLauncher 1.0.5 ActiveX control (NeffyLauncher.dll) in CDNetworks Nefficient Download allows remote attackers to download arbitrary code onto a client system via a .. (dot dot) in the SkinPath parameter and a .zip URL in the HttpSkin parameter.  NOTE: this can be leveraged for code execution by writing to a Startup folder.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://seclists.org/bugtraq/2008/Apr/0065.html">20080407 CDNetworks Nefficient Download(NeffyLauncher.dll) Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28666">28666</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1186">ADV-2008-1186</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41743">nefficientdload-neffylauncher-dir-traversal(41743)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5397">5397</ref>
    </refs>
    <vuln_soft>
      <prod name="download_client" vendor="cdnetworks">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1886" seq="2008-1886" published="2008-04-18" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The NeffyLauncher 1.0.5 ActiveX control (NeffyLauncher.dll) in CDNetworks Nefficient Download uses weak cryptography for a KeyCode that blocks unauthorized use of the control, which allows remote attackers to bypass this protection mechanism by calculating the required KeyCode.  NOTE: this can be used by arbitrary web sites to host exploit code that targets this control.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://seclists.org/bugtraq/2008/Apr/0065.html">20080407 CDNetworks Nefficient Download(NeffyLauncher.dll) Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28666">28666</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41933">nefficientdownload-keycode-security-bypass(41933)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5397">5397</ref>
    </refs>
    <vuln_soft>
      <prod name="download_client" vendor="cdnetworks">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1887" seq="2008-1887" published="2008-04-18" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Python 2.5.2 and earlier allows context-dependent attackers to execute arbitrary code via multiple vectors that cause a negative size value to be provided to the PyString_FromStringAndSize function, which allocates less memory than expected when assert() is disabled and triggers a buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.python.org/issue2587">http://bugs.python.org/issue2587</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html">APPLE-SA-2009-02-12</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html">SUSE-SR:2008:017</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200807-01.xml">GLSA-200807-01</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3438">http://support.apple.com/kb/HT3438</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0122">http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0122</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1551" patch="1">DSA-1551</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1620" patch="1">DSA-1620</ref>
      <ref source="CONFIRM" url="http://www.novell.com/support/search.do?cmd=displayKC&amp;docType=kc&amp;externalId=InfoDocument-patchbuilder-readme5032900">http://www.novell.com/support/search.do?cmd=displayKC&amp;docType=kc&amp;externalId=InfoDocument-patchbuilder-readme5032900</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490776">20080411 IOActive Security Advisory: Incorrect input validation in PyString_FromStringAndSize() leads to multiple buffer overflows</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/506056/100/0/threaded">20090824 rPSA-2009-0122-1 idle python</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/507985/100/0/threaded">20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28749" patch="1">28749</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-632-1">USN-632-1</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2009-0016.html">http://www.vmware.com/security/advisories/VMSA-2009-0016.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/3316">ADV-2009-3316</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41944">python-pystringfromstringandsize-bo(41944)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10407">oval:org.mitre.oval:def:10407</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8624">oval:org.mitre.oval:def:8624</ref>
    </refs>
    <vuln_soft>
      <prod name="python" vendor="python_software_foundation">
        <vers num="1.5.2"/>
        <vers num="1.6"/>
        <vers num="1.6.1"/>
        <vers num="2.0"/>
        <vers num="2.0.1"/>
        <vers num="2.1"/>
        <vers num="2.1.1"/>
        <vers num="2.1.2"/>
        <vers num="2.1.3"/>
        <vers num="2.2"/>
        <vers num="2.2.1"/>
        <vers num="2.2.2"/>
        <vers num="2.2.3"/>
        <vers num="2.3"/>
        <vers num="2.3.1"/>
        <vers num="2.3.2"/>
        <vers num="2.3.3"/>
        <vers num="2.3.4"/>
        <vers num="2.3.5"/>
        <vers num="2.3.6"/>
        <vers num="2.4"/>
        <vers num="2.4.1"/>
        <vers num="2.4.2"/>
        <vers num="2.4.3"/>
        <vers num="2.4.4"/>
        <vers num="2.5"/>
        <vers num="2.5.1"/>
        <vers num="2.5.2" prev="1"/>
        <vers num="2.5_alpha_1"/>
        <vers num="2.5_alpha_2"/>
        <vers num="2.5_beta_1"/>
        <vers num="2.5_beta_2"/>
        <vers num="2.5_beta_3"/>
        <vers num="2.5_final"/>
        <vers num="2.5_release_candidate_1"/>
        <vers num="2.5_release_candidate_2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1888" seq="2008-1888" published="2008-04-18" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Microsoft Windows SharePoint Services 2.0 allows remote attackers to inject arbitrary web script or HTML via the Picture Source (aka picture object source) field in the Rich Text Editor.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490624/100/0/threaded">20080409 CAU-2008-0002: Microsoft Windows SharePoint Services PictureSource XSS</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28706">28706</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41934">microsoft-sharepoint-picturesource-xss(41934)</ref>
    </refs>
    <vuln_soft>
      <prod name="sharepoint_server" vendor="microsoft">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1889" seq="2008-1889" published="2008-04-18" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in viewcat.php in XplodPHP AutoTutorials 2.1 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28808">28808</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1244/references">ADV-2008-1244</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41855">autotutorials-viewcat-sql-injection(41855)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5457">5457</ref>
    </refs>
    <vuln_soft>
      <prod name="autotutorials" vendor="xplodphp">
        <vers num="2.1" edition=":7_day_trial_license"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1890" seq="2008-1890" published="2008-04-18" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the Jom Comment 2.0 build 345 component for Joomla! allows remote attackers to execute arbitrary SQL commands via unspecified vectors.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28812">28812</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41866">jomcomment-unspecified-sql-injection(41866)</ref>
    </refs>
    <vuln_soft>
      <prod name="jom_comment" vendor="azrul">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1891" seq="2008-1891" published="2008-04-18" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in WEBrick in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2, when using NTFS or FAT filesystems, allows remote attackers to read arbitrary CGI files via a trailing (1) + (plus), (2) %2b (encoded plus), (3) . (dot), (4) %2e (encoded dot), or (5) %20 (encoded space) character in the URI, possibly related to the WEBrick::HTTPServlet::FileHandler and WEBrick::HTTPServer.new functionality and the :DocumentRoot option.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/webrickcgi-adv.txt">http://aluigi.altervista.org/adv/webrickcgi-adv.txt</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html">SUSE-SR:2008:017</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:140">MDVSA-2008:140</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:141">MDVSA-2008:141</ref>
      <ref source="CONFIRM" url="http://www.ruby-lang.org/en/news/2008/06/20/arbitrary-code-execution-vulnerabilities/">http://www.ruby-lang.org/en/news/2008/06/20/arbitrary-code-execution-vulnerabilities/</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1245/references">ADV-2008-1245</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41824">ruby-webrick-cgi-info-disclosure(41824)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00937.html">FEDORA-2008-5649</ref>
    </refs>
    <vuln_soft>
      <prod name="ruby" vendor="ruby-lang">
        <vers num="1.8.5"/>
        <vers num="1.8.6"/>
        <vers num="1.9.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1892" seq="2008-1892" published="2008-04-18" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in bs_auth.php in Blogator-script 0.95 and 1.01 allows remote attackers to inject arbitrary web script or HTML via the msg parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28810">28810</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41930">blogatorscript-bsauth-xss(41930)</ref>
    </refs>
    <vuln_soft>
      <prod name="blogator_script" vendor="blogator_script">
        <vers num="0.95"/>
        <vers num="1.01"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1893" seq="2008-1893" published="2008-04-18" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in index.php in W2B Online Banking allows remote attackers to execute arbitrary PHP code via a URL in the ilang parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=120829213903472&amp;w=2">20080415 remote file include</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28796">28796</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41931">w2bonline-index-file-include(41931)</ref>
    </refs>
    <vuln_soft>
      <prod name="online_banking" vendor="w2b">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1894" seq="2008-1894" published="2008-04-18" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in desktoplaunch/InfoView/logon/logon.object in BusinessObjects InfoView XI R2 SP1, SP2, and SP3 Java version before FixPack 3.5 allows remote attackers to inject arbitrary web script or HTML via the cms parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2008-April/061428.html">20080413 DOINGSOFT-2008-03-10-001 -  XSS issue in BOXiR2</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=120818789018302&amp;w=2">20080413 DOINGSOFT-2008-03-10-001 -  XSS issue in BOXiR2</ref>
      <ref source="CONFIRM" url="http://resources.businessobjects.com/support/communitycs/FilesAndUpdates/boxir2_en_FixPack3.5_readme.pdf?recDnlReq=Record&amp;dnlPath=boxir2_en_FixPack3.5_readme.pdf">http://resources.businessobjects.com/support/communitycs/FilesAndUpdates/boxir2_en_FixPack3.5_readme.pdf?recDnlReq=Record&amp;dnlPath=boxir2_en_FixPack3.5_readme.pdf</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28762">28762</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41875">businessobjects-cms-xss(41875)</ref>
    </refs>
    <vuln_soft>
      <prod name="infoview" vendor="businessobjects">
        <vers num="xi_r2" prev="1" edition="sp1"/>
        <vers num="xi_r2" prev="1" edition="sp2"/>
        <vers num="xi_r2" prev="1" edition="sp3_fp3.4"/>
        <vers num="xi_r2" prev="1" edition="sp3_ft3.0"/>
        <vers num="xi_r2" prev="1" edition="sp3_ft3.1"/>
        <vers num="xi_r2" prev="1" edition="sp3_ft3.2"/>
        <vers num="xi_r2" prev="1" edition="sp3_ft3.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1895" seq="2008-1895" published="2008-04-18" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in Carbon Communities 2.4 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) ID parameter to events.asp, the (2) UserName parameter to getpassword.asp, and possibly an unspecified parameter to (3) option_Update.asp in an edit action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugreport.ir/index.php?/35">http://bugreport.ir/index.php?/35</ref>
      <ref source="MISC" url="http://bugreport.ir/index.php?/35/exploit">http://bugreport.ir/index.php?/35/exploit</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490923/100/0/threaded">20080416 Carbon Communities forum Multiple Vulnerabilities.</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28806">28806</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41845">carboncommunities-id-sql-injection(41845)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5456">5456</ref>
    </refs>
    <vuln_soft>
      <prod name="carbon_communities" vendor="carboncommunities">
        <vers num="1.0"/>
        <vers num="1.1"/>
        <vers num="2.1"/>
        <vers num="2.2"/>
        <vers num="2.3"/>
        <vers num="2.4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1896" seq="2008-1896" published="2008-04-18" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in Carbon Communities 2.4 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) Redirect parameter to login.asp and the (2) OrderBy parameter to member_send.asp.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugreport.ir/index.php?/35">http://bugreport.ir/index.php?/35</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490923/100/0/threaded">20080416 Carbon Communities forum Multiple Vulnerabilities.</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28806">28806</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41846">carboncommunities-login-membersend-xss(41846)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5456">5456</ref>
    </refs>
    <vuln_soft>
      <prod name="carbon_communities" vendor="carboncommunities">
        <vers num="1.0"/>
        <vers num="1.1"/>
        <vers num="2.1"/>
        <vers num="2.2"/>
        <vers num="2.3"/>
        <vers num="2.4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1897" seq="2008-1897" published="2008-04-23" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The IAX2 channel driver (chan_iax2) in Asterisk Open Source 1.0.x, 1.2.x before 1.2.28, and 1.4.x before 1.4.19.1; Business Edition A.x.x, B.x.x before B.2.5.2, and C.x.x before C.1.8.1; AsteriskNOW before 1.0.3; Appliance Developer Kit 0.x.x; and s800i before 1.1.0.3, when configured to allow unauthenticated calls, does not verify that an ACK response contains a call number matching the server's reply to a NEW message, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed ACK response that does not complete a 3-way handshake.  NOTE: this issue exists because of an incomplete fix for CVE-2008-1923.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.digium.com/view.php?id=10078">http://bugs.digium.com/view.php?id=10078</ref>
      <ref source="CONFIRM" url="http://downloads.digium.com/pub/security/AST-2008-006.html">http://downloads.digium.com/pub/security/AST-2008-006.html</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200905-01.xml">GLSA-200905-01</ref>
      <ref source="MISC" url="http://www.altsci.com/concepts/page.php?s=asteri&amp;p=2">http://www.altsci.com/concepts/page.php?s=asteri&amp;p=2</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1563">DSA-1563</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491220/100/0/threaded">20080422 AST-2008-006 - 3-way handshake in IAX2 incomplete</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28901">28901</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019918">1019918</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1324">ADV-2008-1324</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41966">asterisk-iax2protocol-ack-dos(41966)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00581.html">FEDORA-2008-3365</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00600.html">FEDORA-2008-3390</ref>
    </refs>
    <vuln_soft>
      <prod name="asterisk_appliance_developer_kit" vendor="asterisk">
        <vers num="0.2"/>
        <vers num="0.3"/>
        <vers num="0.4"/>
        <vers num="0.5"/>
        <vers num="0.6"/>
        <vers num="0.6.0"/>
        <vers num="0.7"/>
        <vers num="0.8"/>
      </prod>
      <prod name="asterisk_business_edition" vendor="asterisk">
        <vers num="a"/>
        <vers num="b.1.3.2"/>
        <vers num="b.1.3.3"/>
        <vers num="b.2.2.0"/>
        <vers num="b.2.2.1"/>
        <vers num="b.2.3.1"/>
        <vers num="b.2.3.2"/>
        <vers num="b.2.3.3"/>
        <vers num="b.2.3.4"/>
        <vers num="b.2.3.6"/>
        <vers num="b.2.5.0"/>
        <vers num="b.2.5.1" prev="1"/>
        <vers num="c.1.0" edition="beta7"/>
        <vers num="c.1.0" edition="beta8"/>
        <vers num="c.1.6"/>
        <vers num="c.1.6.1"/>
        <vers num="c.1.6.2"/>
        <vers num="c1.8.0" prev="1"/>
      </prod>
      <prod name="asterisknow" vendor="asterisk">
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2" prev="1"/>
      </prod>
      <prod name="open_source" vendor="asterisk">
        <vers num="1.0" edition="rc1"/>
        <vers num="1.0" edition="rc2"/>
        <vers num="1.0.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.3.4"/>
        <vers num="1.0.4"/>
        <vers num="1.0.5"/>
        <vers num="1.0.6"/>
        <vers num="1.0.7"/>
        <vers num="1.0.8"/>
        <vers num="1.0.9"/>
        <vers num="1.0.11" edition="patch"/>
        <vers num="1.0.11.1" edition="patch"/>
        <vers num="1.0.12" edition="patch"/>
        <vers num="1.2.0" edition="beta1"/>
        <vers num="1.2.0" edition="beta2"/>
        <vers num="1.2.0" edition="rc1"/>
        <vers num="1.2.0" edition="rc2"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2" edition="netsec"/>
        <vers num="1.2.3" edition="netsec"/>
        <vers num="1.2.4" edition="netsec"/>
        <vers num="1.2.5" edition="netsec"/>
        <vers num="1.2.6" edition="netsec"/>
        <vers num="1.2.7" edition="netsec"/>
        <vers num="1.2.7.1" edition="netsec"/>
        <vers num="1.2.8" edition="netsec"/>
        <vers num="1.2.9"/>
        <vers num="1.2.9.1" edition="netsec"/>
        <vers num="1.2.10" edition="netsec"/>
        <vers num="1.2.11" edition="netsec"/>
        <vers num="1.2.12" edition="netsec"/>
        <vers num="1.2.12.1" edition="netsec"/>
        <vers num="1.2.13" edition="netsec"/>
        <vers num="1.2.14" edition="netsec"/>
        <vers num="1.2.15" edition="netsec"/>
        <vers num="1.2.16" edition="netsec"/>
        <vers num="1.2.17" edition="netsec"/>
        <vers num="1.2.18" edition="netsec"/>
        <vers num="1.2.19" edition="netsec"/>
        <vers num="1.2.20" edition="netsec"/>
        <vers num="1.2.21" edition="netsec"/>
        <vers num="1.2.21.1" edition="netsec"/>
        <vers num="1.2.22" edition="netsec"/>
        <vers num="1.2.23" edition="netsec"/>
        <vers num="1.2.24" edition="netsec"/>
        <vers num="1.2.25" edition="netsec"/>
        <vers num="1.2.26" edition="netsec"/>
        <vers num="1.2.26.1" edition="netsec"/>
        <vers num="1.2.26.2" edition="netsec"/>
        <vers num="1.2.27" prev="1"/>
        <vers num="1.4.0" edition="beta2"/>
        <vers num="1.4.0" edition="beta3"/>
        <vers num="1.4.0" edition="beta4"/>
        <vers num="1.4.1"/>
        <vers num="1.4.10"/>
        <vers num="1.4.10.1"/>
        <vers num="1.4.11"/>
        <vers num="1.4.12"/>
        <vers num="1.4.12.1"/>
        <vers num="1.4.13"/>
        <vers num="1.4.14"/>
        <vers num="1.4.15"/>
        <vers num="1.4.16"/>
        <vers num="1.4.16.1"/>
        <vers num="1.4.16.2"/>
        <vers num="1.4.17"/>
        <vers num="1.4.18"/>
        <vers num="1.4.18.1"/>
        <vers num="1.4.19" prev="1"/>
      </prod>
      <prod name="s800i" vendor="asterisk">
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.3.3"/>
        <vers num="1.1.0"/>
        <vers num="1.1.0.1"/>
        <vers num="1.1.0.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1898" seq="2008-1898" published="2008-04-21" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">A certain ActiveX control in WkImgSrv.dll 7.03.0616.0, as distributed in Microsoft Works 7 and Microsoft Office 2003 and 2007, allows remote attackers to execute arbitrary code or cause a denial of service (browser crash) via an invalid WksPictureInterface property value, which triggers an improper function call.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2008-05/0029.html">20080502 Microsoft Work ActiveX Insecure Method Exploit</ref>
      <ref source="MISC" url="http://blogs.technet.com/swi/archive/2008/06/05/why-there-wont-be-a-security-update-for-wkimgsrv-dll.aspx">http://blogs.technet.com/swi/archive/2008/06/05/why-there-wont-be-a-security-update-for-wkimgsrv-dll.aspx</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491027/100/0/threaded">20080417 Microsoft Works 7 WkImgSrv.dll crash POC</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28820">28820</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41876">microsoft-works-wkimgsrv-dos(41876)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5460">5460</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5530">5530</ref>
    </refs>
    <vuln_soft>
      <prod name="office" vendor="microsoft">
        <vers num="2003"/>
        <vers num="2007"/>
      </prod>
      <prod name="works" vendor="microsoft">
        <vers num="7.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1900" seq="2008-1900" published="2008-04-22" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">option_Update.asp in Carbon Communities 2.4 and earlier allows remote attackers to edit arbitrary member information via a modified ID field.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490923/100/0/threaded">20080416 Carbon Communities forum Multiple Vulnerabilities.</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41961">carbon-optionupdate-sql-injection(41961)</ref>
    </refs>
    <vuln_soft>
      <prod name="carbon_communities" vendor="carbon_communities">
        <vers num="2.4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1901" seq="2008-1901" published="2008-04-22" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">aptlinex before 0.91 allows local users to overwrite arbitrary files via a symlink attack on the gambas-apt.lock temporary file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476588">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476588</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41956">aptlinex-gambasaptlock-symlink(41956)</ref>
    </refs>
    <vuln_soft>
      <prod name="aptlinex" vendor="debian">
        <vers num="0.6-1"/>
        <vers num="0.7-1"/>
        <vers num="0.8-1"/>
        <vers num="0.8-2"/>
        <vers num="0.9-1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1902" seq="2008-1902" published="2008-04-22" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The GUI for aptlinex before 0.91 does not sufficiently warn the user of potentially dangerous actions, which allows remote attackers to remove or modify packages via an apt:// URL.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476572">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476572</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41954">aptlinex-gui-security-bypass(41954)</ref>
    </refs>
    <vuln_soft>
      <prod name="aptlinex" vendor="debian">
        <vers num="0.6-1"/>
        <vers num="0.7-1"/>
        <vers num="0.8-1"/>
        <vers num="0.8-2"/>
        <vers num="0.9-1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1903" seq="2008-1903" published="2008-04-22" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in news_show.php in Newanz NewsOffice 1.0 and 1.1, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the newsoffice_directory parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28748">28748</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41770">newsoffice-newsshow-file-include(41770)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5429">5429</ref>
    </refs>
    <vuln_soft>
      <prod name="newsoffice" vendor="newanz">
        <vers num="1.0"/>
        <vers num="1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1904" seq="2008-1904" published="2008-04-22" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cicoandcico CcMail 1.0.1 and earlier does not verify that the this_cookie cookie corresponds to an authenticated session, which allows remote attackers to obtain access to the "admin area" via a modified this_cookie cookie.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28751">28751</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41797">ccmail-admin-security-bypass(41797)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5433">5433</ref>
    </refs>
    <vuln_soft>
      <prod name="ccmail" vendor="cicoandcico">
        <vers num="1.0"/>
        <vers num="1.0.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1905" seq="2008-1905" published="2008-04-22" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">NMMediaServer.exe in Nero MediaHome 3.3.3.0 and earlier, as used in Nero 8.3.2.1 and earlier, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a long HTTP request to TCP port 54444, a different vector than CVE-2007-2322.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/neromedia-adv.txt">http://aluigi.altervista.org/adv/neromedia-adv.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28775">28775</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1216/references">ADV-2008-1216</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41795">nero-nmmediaserver-dos(41795)</ref>
    </refs>
    <vuln_soft>
      <prod name="mediahome" vendor="nero">
        <vers num="3.3.3.0" prev="1"/>
      </prod>
      <prod name="nero" vendor="nero">
        <vers num="8.3.2.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1906" seq="2008-1906" published="2008-04-22" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in calendar.php in cpCommerce 1.1.0 allows remote attackers to inject arbitrary web script or HTML via the year parameter in a view.year action.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugreport.ir/index.php?/34">http://bugreport.ir/index.php?/34</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28755">28755</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1213/references">ADV-2008-1213</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41780">cpcommerce-calendar-xss(41780)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5437">5437</ref>
    </refs>
    <vuln_soft>
      <prod name="cpcommerce" vendor="cpcommerce">
        <vers num="1.1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1907" seq="2008-1907" published="2008-04-22" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in functions/display_page.func.php in cpCommerce 1.1.0 allow remote attackers to execute arbitrary SQL commands via the (1) id_product, (2) id_manufacturer, and (3) id_category parameters to unspecified components.  NOTE: this probably overlaps CVE-2007-2959 and CVE-2007-2890.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugreport.ir/index.php?/34">http://bugreport.ir/index.php?/34</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28755">28755</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41781">cpcommerce-index-sql-injection(41781)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5437">5437</ref>
    </refs>
    <vuln_soft>
      <prod name="cpcommerce" vendor="cpcommerce">
        <vers num="1.1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1908" seq="2008-1908" published="2008-04-22" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple directory traversal vulnerabilities in cpCommerce 1.1.0 allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in (1) the language parameter in a language action to the default URI, which is not properly handled in actions/language.act.php, or (2) the action parameter to category.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugreport.ir/index.php?/34">http://bugreport.ir/index.php?/34</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28755">28755</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1213/references">ADV-2008-1213</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41783">cpcommerce-multiple-file-include(41783)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5437">5437</ref>
    </refs>
    <vuln_soft>
      <prod name="cpcommerce" vendor="cpcommerce">
        <vers num="1.1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1909" seq="2008-1909" published="2008-04-22" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in comment.php in PHP Knowledge Base (PHPKB) 1.5 and 2.0 allows remote attackers to execute arbitrary SQL commands via the ID parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28739">28739</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41769">phpkb-comment-sql-injection(41769)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5428">5428</ref>
    </refs>
    <vuln_soft>
      <prod name="phpkb_knowledge_base" vendor="chadha_software_technologies">
        <vers num="1.5"/>
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1910" seq="2008-1910" published="2008-04-22" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the database service (ibserver.exe) in Borland InterBase 2007 SP2 allows remote attackers to execute arbitrary code via a malformed opcode 0x52 request to TCP port 3050. NOTE: this might overlap CVE-2007-5243 or CVE-2007-5244.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490752/100/0/threaded">20080411 Borland InterBase 2007 "ibserver.exe" Buffer Overflow Vulnerability POC</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28730">28730</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019834">1019834</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41932">borland-ibserver-bo(41932)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5427">5427</ref>
    </refs>
    <vuln_soft>
      <prod name="interbase" vendor="borland">
        <vers num="2007" edition="sp2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1911" seq="2008-1911" published="2008-04-22" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in includes/system.php in 1024 CMS 1.4.2 beta and earlier, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via a cookpass cookie.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28754">28754</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41785">1024cms-system-sql-injection(41785)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5434">5434</ref>
    </refs>
    <vuln_soft>
      <prod name="1024_cms" vendor="1024_cms">
        <vers num="1.4.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1912" seq="2008-1912" published="2008-04-22" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in DivX Player 6.7 build 6.7.0.22 and earlier allows user-assisted remote attackers to cause a denial of service (application crash) or execute arbitrary code via a long subtitle in a .SRT file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490898/100/0/threaded">20080415 DIVX Player &lt;= 6.7.0 Buffer Overflow PoC ( .SRT )</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28799">28799</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019921">1019921</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1235/references">ADV-2008-1235</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5453">5453</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5492">5492</ref>
    </refs>
    <vuln_soft>
      <prod name="divx_player" vendor="divx">
        <vers num="6.7" prev="1" edition="build_6.7.0.22"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1913" seq="2008-1913" published="2008-04-22" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in Lasernet CMS 1.5 and 1.11, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the new parameter in a new action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28804">28804</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1239/references">ADV-2008-1239</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41838">lasernet-index-sql-injection(41838)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5454">5454</ref>
    </refs>
    <vuln_soft>
      <prod name="lasernet_cms" vendor="lasernet_cms">
        <vers num="1.5"/>
        <vers num="1.11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1914" seq="2008-1914" published="2008-04-22" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the AntServer module (AntServer.exe) in BigAnt IM Server in BigAnt Messenger 2.2 allows remote attackers to execute arbitrary code via a long URI in a request to TCP port 6080. NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490916/100/0/threaded">20080415 BigAnt Server 2.2 PreAuth Remote SEH Overflow Exploit (0day)</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491035/100/0/threaded">20080417 Re: BigAnt Server 2.2 PreAuth Remote SEH Overflow Exploit (0day)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28795">28795</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1238/references">ADV-2008-1238</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41830">bigantmessenger-antserver-bo(41830)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5451">5451</ref>
    </refs>
    <vuln_soft>
      <prod name="bigant_messenger" vendor="bigantsoft">
        <vers num="2.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1915" seq="2008-1915" published="2008-04-23" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in view.asp in DevWorx BlogWorx 1.0 allows remote attackers to execute arbitrary SQL commands via the id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28776">28776</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1305/references" adv="1">ADV-2008-1305</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41808">blogworx-view-sql-injection(41808)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5480">5480</ref>
    </refs>
    <vuln_soft>
      <prod name="blogworx" vendor="devworx">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1916" seq="2008-1916" published="2008-04-23" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in the Ubercart 5.x before 5.x-1.0-rc1 module for Drupal allow remote attackers to inject arbitrary web script or HTML via text fields intended for the (1) address and (2) order information, which are later displayed on the order view page and unspecified other administrative pages, a different vulnerability than CVE-2008-1428.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://drupal.org/node/241944" adv="1" patch="1">http://drupal.org/node/241944</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1083/references">ADV-2008-1083</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41624">ubercart-orders-xss(41624)</ref>
    </refs>
    <vuln_soft>
      <prod name="ubercart_module" vendor="drupal">
        <vers num="5-1.0" edition="rc1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1917" seq="2008-1917" published="2008-04-23" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in AMFPHP 1.2 allow remote attackers to inject arbitrary web script or HTML via the (1) class parameter to (a) methodTable.php, (b) code.php, and (c) details.php in browser/; and the (2) location parameter to browser/code.php.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28789">28789</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41835">amfphp-multiple-xss(41835)</ref>
    </refs>
    <vuln_soft>
      <prod name="amfphp" vendor="amfphp">
        <vers num="1.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1918" seq="2008-1918" published="2008-04-23" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.0" CVSS_base_score="6.0" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="6.8" CVSS_vector="(AV:N/AC:M/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in submit.php in PHP-Fusion 6.01.14 and 6.00.307, when magic_quotes_gpc is disabled and the database table prefix is known, allows remote authenticated users to execute arbitrary SQL commands via the submit_info[] parameter in a link submission action.  NOTE: it was later reported that 7.00.2 is also affected.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.php-fusion.co.uk/news.php" adv="1" patch="1">http://www.php-fusion.co.uk/news.php</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28855" patch="1">28855</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1318/references">ADV-2008-1318</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41914">phpfusion-submit-sql-injection(41914)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/47610">phpfusion-submitinfo-sql-injection(47610)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5470">5470</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/7576">7576</ref>
    </refs>
    <vuln_soft>
      <prod name="php-fusion" vendor="php-fusion">
        <vers num="6.00.307"/>
        <vers num="6.01.14"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1919" seq="2008-1919" published="2008-04-23" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in listtest.php in YourFreeWorld Apartment Search Script allows remote attackers to execute arbitrary SQL commands via the r parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28853">28853</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1339/references">ADV-2008-1339</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41902">apartment-listtest-sql-injection(41902)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5471">5471</ref>
    </refs>
    <vuln_soft>
      <prod name="apartment_search_script" vendor="yourfreeworld">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1920" seq="2008-1920" published="2008-04-23" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in the boxelyRenderer module in the Personal Status Manager feature in ICQ 6.0 build 6043 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted personal status message.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.infigo.hr/en/in_focus/advisories/INFIGO-2008-04-08">http://www.infigo.hr/en/in_focus/advisories/INFIGO-2008-04-08</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490921/100/0/threaded">20080416 [INFIGO-2008-04-08]: ICQ 6 remote buffer overflow vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28803">28803</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1299/references">ADV-2008-1299</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41852">icq-boxelyrenderer-bo(41852)</ref>
    </refs>
    <vuln_soft>
      <prod name="mirabilis_icq" vendor="icq">
        <vers num="6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1921" seq="2008-1921" published="2008-04-23" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in store_pages/category_list.php in 5th Avenue Shopping Cart 1.2 trial edition allows remote attackers to execute arbitrary SQL commands via the category_ID parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://forum.aria-security.com/showthread.php?p=76">http://forum.aria-security.com/showthread.php?p=76</ref>
      <ref source="MISC" url="http://forum.aria-security.net/showthread.php?p=2233">http://forum.aria-security.net/showthread.php?p=2233</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491069/100/0/threaded">20080418 5th avenue Shopping Cart SQL Injection</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28841">28841</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41885">5thavenue-categorylist-sql-injection(41885)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5464">5464</ref>
    </refs>
    <vuln_soft>
      <prod name="5th_avenue_shopping_cart" vendor="5th_avenue_software">
        <vers num="1.2" edition=":trial"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1922" seq="2008-1922" published="2008-05-13" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple stack-based buffer overflows in Sarg might allow attackers to execute arbitrary code via unknown vectors, probably a crafted Squid log file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html">SUSE-SR:2008:011</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2009:073">MDVSA-2009:073</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29141">29141</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42321">sarg-unspecified-bo(42321)</ref>
    </refs>
    <vuln_soft>
      <prod name="squid_analysis_report_generator" vendor="sarg">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1923" seq="2008-1923" published="2008-04-23" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.1" CVSS_base_score="7.1" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">The IAX2 channel driver (chan_iax2) in Asterisk 1.2 before revision 72630 and 1.4 before revision 65679, when configured to allow unauthenticated calls, sends "early audio" to an unverified source IP address of a NEW message, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed NEW message.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.digium.com/view.php?id=10078">http://bugs.digium.com/view.php?id=10078</ref>
      <ref source="CONFIRM" url="http://downloads.digium.com/pub/security/AST-2008-006.html">http://downloads.digium.com/pub/security/AST-2008-006.html</ref>
      <ref source="MISC" url="http://www.altsci.com/concepts/page.php?s=asteri&amp;p=1">http://www.altsci.com/concepts/page.php?s=asteri&amp;p=1</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42049">asterisk-new-dos(42049)</ref>
    </refs>
    <vuln_soft>
      <prod name="asterisk_appliance_developer_kit" vendor="asterisk">
        <vers num=""/>
      </prod>
      <prod name="asterisk_business_edition" vendor="asterisk">
        <vers num="a"/>
        <vers num="b.1.3.2"/>
        <vers num="b.1.3.3"/>
        <vers num="b.2.2.0"/>
        <vers num="b.2.2.1"/>
        <vers num="b.2.3.1"/>
        <vers num="b.2.3.2"/>
        <vers num="b.2.3.3"/>
        <vers num="b.2.3.4"/>
        <vers num="b.2.5.0"/>
        <vers num="b2.5.1" prev="1"/>
        <vers num="c.1.0-beta7"/>
        <vers num="c.1.0-beta8"/>
        <vers num="c.1.0beta7"/>
        <vers num="c.1.6.1"/>
        <vers num="c1.8.0" prev="1"/>
      </prod>
      <prod name="asterisknow" vendor="asterisk">
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2" prev="1"/>
      </prod>
      <prod name="open_source" vendor="asterisk">
        <vers num="1.0"/>
        <vers num="1.0.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.4"/>
        <vers num="1.0.5"/>
        <vers num="1.0.6"/>
        <vers num="1.0.7"/>
        <vers num="1.0.8"/>
        <vers num="1.0.9"/>
        <vers num="1.0.11"/>
        <vers num="1.0.11.1"/>
        <vers num="1.0.12"/>
        <vers num="1.2.0"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2"/>
        <vers num="1.2.3" edition="netsec"/>
        <vers num="1.2.4" edition="netsec"/>
        <vers num="1.2.5" edition="netsec"/>
        <vers num="1.2.6" edition="netsec"/>
        <vers num="1.2.7" edition="netsec"/>
        <vers num="1.2.7.1" edition="netsec"/>
        <vers num="1.2.8" edition="netsec"/>
        <vers num="1.2.9"/>
        <vers num="1.2.9.1" edition="netsec"/>
        <vers num="1.2.10" edition="netsec"/>
        <vers num="1.2.11" edition="netsec"/>
        <vers num="1.2.12" edition="netsec"/>
        <vers num="1.2.12.1"/>
        <vers num="1.2.13" edition="netsec"/>
        <vers num="1.2.14" edition="netsec"/>
        <vers num="1.2.15" edition="netsec"/>
        <vers num="1.2.16" edition="netsec"/>
        <vers num="1.2.17" edition="netsec"/>
        <vers num="1.2.18" edition="netsec"/>
        <vers num="1.2.19" edition="netsec"/>
        <vers num="1.2.20" edition="netsec"/>
        <vers num="1.2.21" edition="netsec"/>
        <vers num="1.2.21.1" edition="netsec"/>
        <vers num="1.2.22" edition="netsec"/>
        <vers num="1.2.23" edition="netsec"/>
        <vers num="1.2.24" edition="netsec"/>
        <vers num="1.2.25" edition="netsec"/>
        <vers num="1.2.26" edition="netsec"/>
        <vers num="1.2.26.1" edition="netsec"/>
        <vers num="1.2.26.2" edition="netsec"/>
        <vers num="1.2.27"/>
        <vers num="1.2.28"/>
        <vers num="1.4.0" edition="beta2"/>
        <vers num="1.4.0" edition="beta3"/>
        <vers num="1.4.0" edition="beta4"/>
        <vers num="1.4.1"/>
        <vers num="1.4.2"/>
        <vers num="1.4.3"/>
        <vers num="1.4.4"/>
        <vers num="1.4.5"/>
        <vers num="1.4.6"/>
        <vers num="1.4.7"/>
        <vers num="1.4.7.1"/>
        <vers num="1.4.8"/>
        <vers num="1.4.9"/>
        <vers num="1.4.10"/>
        <vers num="1.4.10.1"/>
        <vers num="1.4.11"/>
        <vers num="1.4.12"/>
        <vers num="1.4.12.1"/>
        <vers num="1.4.13"/>
        <vers num="1.4.14"/>
        <vers num="1.4.15"/>
        <vers num="1.4.16"/>
        <vers num="1.4.16.1"/>
        <vers num="1.4.16.2"/>
        <vers num="1.4.17"/>
        <vers num="1.4.18"/>
        <vers num="1.4.18.1"/>
        <vers num="1.4.19" edition="rc1"/>
        <vers num="1.4.19" edition="rc2"/>
        <vers num="1.4.19" edition="rc3"/>
        <vers num="1.4.19" edition="rc4"/>
      </prod>
      <prod name="s800i" vendor="asterisk">
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.3.3"/>
        <vers num="1.1.0"/>
        <vers num="1.1.0.1"/>
        <vers num="1.1.0.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1924" seq="2008-1924" published="2008-04-23" modified="2017-08-07" severity="Low" CVSS_version="2.0" CVSS_score="3.5" CVSS_base_score="3.5" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="6.8" CVSS_vector="(AV:N/AC:M/Au:S/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in phpMyAdmin before 2.11.5.2, when running on shared hosts, allows remote authenticated users with CREATE table permissions to read arbitrary files via a crafted HTTP POST request, related to use of an undefined UploadDir variable.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html">SUSE-SR:2008:026</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html">SUSE-SR:2009:003</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200805-02.xml">GLSA-200805-02</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1557">DSA-1557</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:131">MDVSA-2008:131</ref>
      <ref source="CONFIRM" url="http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2008-3" adv="1">http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2008-3</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28906" patch="1">28906</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1328/references" adv="1">ADV-2008-1328</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41964">phpmyadmin-unspecified-info-disclosure(41964)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpmyadmin" vendor="phpmyadmin">
        <vers num="2.10.0"/>
        <vers num="2.10.0.1"/>
        <vers num="2.10.0.2"/>
        <vers num="2.10.1"/>
        <vers num="2.10.2"/>
        <vers num="2.10.3"/>
        <vers num="2.10.3rc1"/>
        <vers num="2.11.0"/>
        <vers num="2.11.0beta1"/>
        <vers num="2.11.0rc1"/>
        <vers num="2.11.1"/>
        <vers num="2.11.1.1"/>
        <vers num="2.11.1.2"/>
        <vers num="2.11.1rc1"/>
        <vers num="2.11.2"/>
        <vers num="2.11.2.1"/>
        <vers num="2.11.2.2"/>
        <vers num="2.11.3"/>
        <vers num="2.11.3rc1"/>
        <vers num="2.11.4"/>
        <vers num="2.11.4rc1"/>
        <vers num="2.11.5"/>
        <vers num="2.11.5.1" prev="1"/>
        <vers num="2.11.6rc1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1925" seq="2008-1925" published="2008-04-24" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in InspIRCd before 1.1.18, when using the namesx and uhnames modules, allows remote attackers to cause a denial of service (daemon crash) via a large number of channel users with crafted nicknames, idents, and long hostnames.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200805-08.xml">GLSA-200805-08</ref>
      <ref source="MISC" url="http://www.inspircd.org/bugtrack/view_bug.php?bug_id=438">http://www.inspircd.org/bugtrack/view_bug.php?bug_id=438</ref>
      <ref source="CONFIRM" url="http://www.inspircd.org/forum/showthread.php?t=2945">http://www.inspircd.org/forum/showthread.php?t=2945</ref>
      <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/04/22/3">[oss-security] 20080422 CVE Request: inspircd</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28506">28506</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1041/references">ADV-2008-1041</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41543">inspircd-multiple-dos(41543)</ref>
    </refs>
    <vuln_soft>
      <prod name="inspircd" vendor="inspire_ircd">
        <vers num="1.1.17" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1926" seq="2008-1926" published="2008-04-24" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Argument injection vulnerability in login (login-utils/login.c) in util-linux-ng 2.14 and earlier makes it easier for remote attackers to hide activities by modifying portions of log events, as demonstrated by appending an "addr=" statement to the login name, aka "audit log injection."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://git.kernel.org/?p=utils/util-linux-ng/util-linux-ng.git;a=blobdiff;f=login-utils/login.c;h=230121316d953c59e7842c1325f6e9f326a37608;hp=aad27794327c60391b5148b367d2c79338fc6ee4;hb=8ccf0b253ac0f4f58d64bc9674de18bff5a88782;hpb=3a4a13b12a8065b0b5354686d2807cce421a9973">http://git.kernel.org/?p=utils/util-linux-ng/util-linux-ng.git;a=blobdiff;f=login-utils/login.c;h=230121316d953c59e7842c1325f6e9f326a37608;hp=aad27794327c60391b5148b367d2c79338fc6ee4;hb=8ccf0b253ac0f4f58d64bc9674de18bff5a88782;hpb=3a4a13b12a8065b0b5354686d2807cce421a9973</ref>
      <ref source="CONFIRM" url="http://git.kernel.org/?p=utils/util-linux-ng/util-linux-ng.git;a=commit;h=8ccf0b253ac0f4f58d64bc9674de18bff5a88782">http://git.kernel.org/?p=utils/util-linux-ng/util-linux-ng.git;a=commit;h=8ccf0b253ac0f4f58d64bc9674de18bff5a88782</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2009-0143">http://wiki.rpath.com/Advisories:rPSA-2009-0143</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:114">MDVSA-2008:114</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2009-0981.html">RHSA-2009:0981</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/507854/100/0/threaded">20091112 rPSA-2009-0143-1 util-linux util-linux-extras</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28983">28983</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1022256">1022256</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1392/references">ADV-2008-1392</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41987">utillinuxng-login-data-manipulation(41987)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9833">oval:org.mitre.oval:def:9833</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00624.html">FEDORA-2008-3419</ref>
    </refs>
    <vuln_soft>
      <prod name="util-linux" vendor="linux">
        <vers num="2.13"/>
        <vers num="2.13.0.1"/>
        <vers num="2.13.1"/>
        <vers num="2.13.1.1"/>
        <vers num="2.14" edition="rc1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1927" seq="2008-1927" published="2008-04-24" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Double free vulnerability in Perl 5.8.8 allows context-dependent attackers to cause a denial of service (memory corruption and crash) via a crafted regular expression containing UTF8 characters.  NOTE: this issue might only be present on certain operating systems.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=454792">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=454792</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html">APPLE-SA-2009-02-12</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html">SUSE-SR:2008:017</ref>
      <ref source="MISC" url="http://rt.perl.org/rt3/Public/Bug/Display.html?id=48156">http://rt.perl.org/rt3/Public/Bug/Display.html?id=48156</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3438">http://support.apple.com/kb/HT3438</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2008-317.htm">http://support.avaya.com/elmodocs2/security/ASA-2008-317.htm</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2008-361.htm">http://support.avaya.com/elmodocs2/security/ASA-2008-361.htm</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2009-0011">http://wiki.rpath.com/Advisories:rPSA-2009-0011</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1556">DSA-1556</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200805-17.xml">GLSA-200805-17</ref>
      <ref source="CONFIRM" url="http://www.ipcop.org/index.php?name=News&amp;file=article&amp;sid=41">http://www.ipcop.org/index.php?name=News&amp;file=article&amp;sid=41</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:100">MDVSA-2008:100</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0522.html">RHSA-2008:0522</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0532.html">RHSA-2008:0532</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/500210/100/0/threaded">20090120 rPSA-2009-0011-1 perl</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28928">28928</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020253">1020253</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-700-1">USN-700-1</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-700-2">USN-700-2</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2008-0013.html">http://www.vmware.com/security/advisories/VMSA-2008-0013.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2265/references">ADV-2008-2265</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2361">ADV-2008-2361</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2424">ADV-2008-2424</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/0422">ADV-2009-0422</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41996">perl-utf8-dos(41996)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10579">oval:org.mitre.oval:def:10579</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00601.html">FEDORA-2008-3392</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00607.html">FEDORA-2008-3399</ref>
    </refs>
    <vuln_soft>
      <prod name="perl" vendor="perl">
        <vers num="5.8.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1928" seq="2008-1928" published="2008-04-24" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in Imager 0.42 through 0.63 allows attackers to cause a denial of service (crash) via an image based fill in which the number of input channels is different from the number of output channels.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://imager.perl.org/i/release064/Imager_0_64">http://imager.perl.org/i/release064/Imager_0_64</ref>
      <ref source="CONFIRM" url="http://rt.cpan.org/Public/Bug/Display.html?id=35324">http://rt.cpan.org/Public/Bug/Display.html?id=35324</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28980">28980</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1387/references">ADV-2008-1387</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41986">imager-doubleprecisionimage-bo(41986)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00569.html">FEDORA-2008-3352</ref>
    </refs>
    <vuln_soft>
      <prod name="imager" vendor="imager">
        <vers num="0.42"/>
        <vers num="0.43"/>
        <vers num="0.43_03"/>
        <vers num="0.44"/>
        <vers num="0.44_01"/>
        <vers num="0.45"/>
        <vers num="0.45_02"/>
        <vers num="0.46"/>
        <vers num="0.47"/>
        <vers num="0.48"/>
        <vers num="0.49"/>
        <vers num="0.49_01"/>
        <vers num="0.50"/>
        <vers num="0.51"/>
        <vers num="0.51_01"/>
        <vers num="0.51_02"/>
        <vers num="0.51_03"/>
        <vers num="0.52"/>
        <vers num="0.53"/>
        <vers num="0.55"/>
        <vers num="0.56"/>
        <vers num="0.57"/>
        <vers num="0.58"/>
        <vers num="0.59"/>
        <vers num="0.60"/>
        <vers num="0.61"/>
        <vers num="0.62"/>
        <vers num="0.63"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1930" seq="2008-1930" published="2008-04-28" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The cookie authentication method in WordPress 2.5 relies on a hash of a concatenated string containing USERNAME and EXPIRY_TIME, which allows remote attackers to forge cookies by registering a username that results in the same concatenated string, as demonstrated by registering usernames beginning with "admin" to obtain administrator privileges, aka a "cryptographic splicing" issue.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2007-6013.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://wordpress.org/development/2008/04/wordpress-251/" patch="1">http://wordpress.org/development/2008/04/wordpress-251/</ref>
      <ref source="MISC" url="http://www.cl.cam.ac.uk/users/sjm217/advisories/wordpress-cookie-integrity.txt">http://www.cl.cam.ac.uk/users/sjm217/advisories/wordpress-cookie-integrity.txt</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491356/100/0/threaded">20080425 Wordpress 2.5 Cookie Integrity Protection Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28935" patch="1">28935</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019923">1019923</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1372/references">ADV-2008-1372</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42027">wordpress-cookie-security-bypass(42027)</ref>
    </refs>
    <vuln_soft>
      <prod name="wordpress" vendor="wordpress">
        <vers num="2.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1931" seq="2008-1931" published="2008-04-25" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.1" CVSS_vector="(AV:L/AC:L/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Realtek HD Audio Codec Drivers RTKVHDA.sys and RTKVHDA64.sys before 6.0.1.5605 on Windows Vista allow local users to create, write, and read registry keys via a crafted IOCTL request.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491249/100/0/threaded">20080423 [W01-0408] Realtek HD Audio Codec Drivers (Vista) - Local Privilege Escalation</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28909">28909</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1350/references">ADV-2008-1350</ref>
      <ref source="MISC" url="http://www.wintercore.com/advisories/advisory_W010408.html">http://www.wintercore.com/advisories/advisory_W010408.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41976">realtek-ioctl-privilege-escalation(41976)</ref>
    </refs>
    <vuln_soft>
      <prod name="hd_audio_codec_drivers" vendor="realtek">
        <vers num="6.0.1.5604" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1932" seq="2008-1932" published="2008-04-25" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.1" CVSS_vector="(AV:L/AC:L/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Integer overflow in Realtek HD Audio Codec Drivers RTKVHDA.sys and RTKVHDA64.sys before 6.0.1.5605 on Windows Vista allows local users to execute arbitrary code via a crafted IOCTL request.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491249/100/0/threaded">20080423 [W01-0408] Realtek HD Audio Codec Drivers (Vista) - Local Privilege Escalation</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28909">28909</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1350/references">ADV-2008-1350</ref>
      <ref source="MISC" url="http://www.wintercore.com/advisories/advisory_W010408.html">http://www.wintercore.com/advisories/advisory_W010408.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42079">realtek-ioctl-overflow(42079)</ref>
    </refs>
    <vuln_soft>
      <prod name="hd_audio_codec_drivers" vendor="realtek">
        <vers num="6.0.1.5604" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1933" seq="2008-1933" published="2008-04-25" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Absolute path traversal vulnerability in a certain ActiveX control in Zune allows user-assisted remote attackers to overwrite arbitrary files via the SaveToFile method.  NOTE: the victim must explicitly allow the code to run.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491231/100/0/threaded">20080423 Zune software - arbitrary file overwrite</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42028">zune-activex-file-overwrite(42028)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5489">5489</ref>
    </refs>
    <vuln_soft>
      <prod name="zune_software" vendor="microsoft">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1934" seq="2008-1934" published="2008-04-25" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in commentaires.php in Crazy Goomba 1.2.1 allows remote attackers to execute arbitrary SQL commands via the id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28880">28880</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1304/references">ADV-2008-1304</ref>
      <ref source="MISC" url="http://www.z0rlu.ownspace.org/index.php?/archives/58-Crazy-Goomba-1.2.1-SQL-inj.html">http://www.z0rlu.ownspace.org/index.php?/archives/58-Crazy-Goomba-1.2.1-SQL-inj.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42023">crazygoomba-id-sql-injection(42023)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5481">5481</ref>
    </refs>
    <vuln_soft>
      <prod name="crazy_goomba" vendor="crazy_goomba">
        <vers num="1.2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1935" seq="2008-1935" published="2008-04-25" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the Filiale 1.0.4 component for Joomla! allows remote attackers to execute arbitrary SQL commands via the idFiliale parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28900">28900</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1346/references">ADV-2008-1346</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41980">filiale-index-sql-injection(41980)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5488">5488</ref>
    </refs>
    <vuln_soft>
      <prod name="joomla" vendor="joomla">
        <vers num="1.0.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1936" seq="2008-1936" published="2008-04-25" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in Classifieds Caffe allows remote attackers to execute arbitrary SQL commands via the cat_id parameter in an add action.  NOTE: this issue might be site-specific.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490985/100/0/threaded">20080416 Classifieds Caffe (index.php cat_id) Remote SQL Injection</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28800">28800</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1240/references">ADV-2008-1240</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42121">classifiedcaffe-index-sql-injection(42121)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5450">5450</ref>
    </refs>
    <vuln_soft>
      <prod name="classifieds_caffe" vendor="classifieds_caffe">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1937" seq="2008-1937" published="2008-04-25" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The user form processing (userform.py) in MoinMoin before 1.6.3, when using ACLs or a non-empty superusers list, does not properly manage users, which allows remote attackers to gain privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://hg.moinmo.in/moin/1.6/rev/f405012e67af">http://hg.moinmo.in/moin/1.6/rev/f405012e67af</ref>
      <ref source="CONFIRM" url="http://moinmo.in/SecurityFixes">http://moinmo.in/SecurityFixes</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200805-09.xml">GLSA-200805-09</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28869" patch="1">28869</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1307/references">ADV-2008-1307</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41909">moinmoin-userform-security-bypass(41909)</ref>
    </refs>
    <vuln_soft>
      <prod name="moinmoin" vendor="moinmoin">
        <vers num="1.6.0"/>
        <vers num="1.6.1"/>
        <vers num="1.6.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1938" seq="2008-1938" published="2008-04-25" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:P)">
    <desc>
      <descript source="cve">Sony Mylo COM-2 Japanese model firmware before 1.002 does not properly verify web server SSL certificates, which allows remote attackers to obtain sensitive information and conduct spoofing attacks.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://esupport.sony.com/perl/news-item.pl?news_id=262&amp;mdl=COM2">http://esupport.sony.com/perl/news-item.pl?news_id=262&amp;mdl=COM2</ref>
      <ref source="JVN" url="http://jvn.jp/jp/JVN%2376788395/index.html">JVN#76788395</ref>
      <ref source="CONFIRM" url="http://mylo.nccl.sony.co.jp/download/M-W002-001-02/index.html">http://mylo.nccl.sony.co.jp/download/M-W002-001-02/index.html</ref>
      <ref source="CONFIRM" url="http://mylo.nccl.sony.co.jp/hotnews/2008/04/01/index.html">http://mylo.nccl.sony.co.jp/hotnews/2008/04/01/index.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28905">28905</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1349/references">ADV-2008-1349</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41971">sony-mylo-ssl-spoofing(41971)</ref>
    </refs>
    <vuln_soft>
      <prod name="mylo_com_2" vendor="sony">
        <vers num="1.001" prev="1" edition="::ja"/>
        <vers num="1.100" prev="1" edition="::en"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1939" seq="2008-1939" published="2008-04-25" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in W1L3D4 Philboard 1.0 allow remote attackers to execute arbitrary SQL commands via the (1) id and (2) topic parameters to (a) philboard_reply.asp, and the (3) forumid parameter to (b) philboard_newtopic.asp, different vectors than CVE-2007-2641 and CVE-2007-0920.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28871">28871</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1340/references">ADV-2008-1340</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41957">philboard-philboardreply-sql-injection(41957)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5475">5475</ref>
    </refs>
    <vuln_soft>
      <prod name="philboard" vendor="aspindir">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1940" seq="2008-1940" published="2008-04-25" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The RBAC functionality in grsecurity before 2.1.11-2.6.24.5 and 2.1.11-2.4.36.2 does not enforce user_transition_deny and user_transition_allow rules for the (1) sys_setfsuid and (2) sys_setfsgid calls, which allows local users to bypass restrictions for those calls.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.grsecurity.org/news.php#grsec21113">http://www.grsecurity.org/news.php#grsec21113</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28889" patch="1">28889</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019919">1019919</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1323/references">ADV-2008-1323</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41952">grsecurity-rbac-security-bypass(41952)</ref>
    </refs>
    <vuln_soft>
      <prod name="grsecurity_kernel_patch" vendor="grsecurity">
        <vers num="2.4.33"/>
        <vers num="2.4.33.2"/>
        <vers num="2.4.33.3"/>
        <vers num="2.4.33.4"/>
        <vers num="2.4.34"/>
        <vers num="2.6.18"/>
        <vers num="2.6.24.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1941" seq="2008-1941" published="2008-04-25" modified="2017-08-07" severity="Low" CVSS_version="2.0" CVSS_score="3.5" CVSS_base_score="3.5" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="6.8" CVSS_vector="(AV:N/AC:M/Au:S/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the profile update feature in Akiva WebBoard 8.0 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors in the form field.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28895">28895</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41969">webboard-profile-page-xss(41969)</ref>
    </refs>
    <vuln_soft>
      <prod name="webboard" vendor="akiva">
        <vers num="8.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1942" seq="2008-1942" published="2008-04-25" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Foxit Reader 2.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a PDF file with (1) a malformed ExtGState resource containing a /Font resource, or (2) an XObject resource with a Rotate setting, which triggers memory corruption.  NOTE: this is probably a different vulnerability than CVE-2007-2186.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28890">28890</ref>
      <ref source="MISC" url="http://www.vallejo.cc/proyectos/foxitreader1.htm">http://www.vallejo.cc/proyectos/foxitreader1.htm</ref>
      <ref source="MISC" url="http://www.vallejo.cc/proyectos/foxitreader2.htm">http://www.vallejo.cc/proyectos/foxitreader2.htm</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1327/references">ADV-2008-1327</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41972">foxitreader-pdf-xobject-code-execution(41972)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41973">foxitreader-extgstate-code-execution(41973)</ref>
    </refs>
    <vuln_soft>
      <prod name="reader" vendor="foxit_software">
        <vers num="2.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1943" seq="2008-1943" published="2008-05-14" modified="2017-09-28" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in the backend of XenSource Xen Para Virtualized Frame Buffer (PVFB) 3.0 through 3.1.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted description of a shared framebuffer.</descript>
      <descript source="nvd">Possible solution and more infomation located here: http://rhn.redhat.com/errata/RHSA-2008-0194.html</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0194.html">RHSA-2008:0194</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29183">29183</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020008">1020008</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1900/references">ADV-2008-1900</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=443078">https://bugzilla.redhat.com/show_bug.cgi?id=443078</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42387">xen-pvfb-description-dos(42387)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10338">oval:org.mitre.oval:def:10338</ref>
    </refs>
    <vuln_soft>
      <prod name="xen" vendor="xensource">
        <vers num="3.0"/>
        <vers num="3.0.2"/>
        <vers num="3.0.3"/>
        <vers num="3.0.4"/>
        <vers num="3.1.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1944" seq="2008-1944" published="2008-05-14" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the backend framebuffer of XenSource Xen Para-Virtualized Framebuffer (PVFB) Message 3.0 through 3.0.3 allows local users to cause a denial of service (SDL crash) and possibly execute arbitrary code via "bogus screen updates," related to missing validation of the "format of messages."</descript>
    </desc>
    <impacts>
      <impact source="nvd">https://bugzilla.redhat.com/show_bug.cgi?id=443078
"The PVFB backend is a user space program running as root in dom0"</impact>
    </impacts>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0194.html">RHSA-2008:0194</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29186">29186</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020009">1020009</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=443390">https://bugzilla.redhat.com/show_bug.cgi?id=443390</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42388">xen-pvfb-message-dos(42388)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10868">oval:org.mitre.oval:def:10868</ref>
    </refs>
    <vuln_soft>
      <prod name="xen" vendor="xensource">
        <vers num="3.0"/>
        <vers num="3.0.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1945" seq="2008-1945" published="2008-08-08" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.9" CVSS_base_score="4.9" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:N/A:N)">
    <desc>
      <descript source="cve">QEMU 0.9.0 does not properly handle changes to removable media, which allows guest OS users to read arbitrary files on the host OS by using the diskformat: parameter in the -usbdevice option to modify the disk-image header to identify a different format, a related issue to CVE-2008-2004.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html">SUSE-SR:2009:008</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2009/dsa-1799">DSA-1799</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:162">MDVSA-2008:162</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30604">30604</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020959">1020959</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-776-1">USN-776-1</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/44269">qemu-image-security-bypass(44269)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9905">oval:org.mitre.oval:def:9905</ref>
      <ref source="REDHAT" url="https://rhn.redhat.com/errata/RHSA-2008-0892.html">RHSA-2008:0892</ref>
    </refs>
    <vuln_soft>
      <prod name="qemu" vendor="mandriva">
        <vers num="0.9.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1946" seq="2008-1946" published="2008-07-28" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.4" CVSS_base_score="4.4" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The default configuration of su in /etc/pam.d/su in GNU coreutils 5.2.1 allows local users to gain the privileges of a (1) locked or (2) expired account by entering the account name on the command line, related to improper use of the pam_succeed_if.so module.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2008-0780.html">RHSA-2008:0780</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020552">1020552</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30363">30363</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43993">coreutils-pamsucceedif-security-bypass(43993)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10029">oval:org.mitre.oval:def:10029</ref>
    </refs>
    <vuln_soft>
      <prod name="coreutils" vendor="gnu">
        <vers num="5.2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1947" seq="2008-1947" published="2008-06-04" modified="2019-03-25" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Apache Tomcat 5.5.9 through 5.5.26 and 6.0.0 through 6.0.16 allows remote attackers to inject arbitrary web script or HTML via the name parameter (aka the hostname attribute) to host-manager/html/add.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html">APPLE-SA-2008-10-09</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html">SUSE-SR:2008:014</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html">SUSE-SR:2009:004</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=123376588623823&amp;w=2">HPSBUX02401</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=139344343412337&amp;w=2">HPSBST02955</ref>
      <ref source="MLIST" url="http://marc.info/?l=tomcat-user&amp;m=121244319501278&amp;w=2">[tomcat-user] 20080602 [SECURITY] CVE-2008-1947: Tomcat host-manager XSS vulnerability</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3216">http://support.apple.com/kb/HT3216</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm">http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm</ref>
      <ref source="CONFIRM" url="http://tomcat.apache.org/security-5.html">http://tomcat.apache.org/security-5.html</ref>
      <ref source="CONFIRM" url="http://tomcat.apache.org/security-6.html">http://tomcat.apache.org/security-6.html</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1593">DSA-1593</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:188">MDVSA-2008:188</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0648.html">RHSA-2008:0648</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0862.html">RHSA-2008:0862</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0864.html">RHSA-2008:0864</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492958/100/0/threaded">20080602 [SECURITY] CVE-2008-1947: Tomcat host-manager XSS vulnerability</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/507985/100/0/threaded">20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29502">29502</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/31681">31681</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020624">1020624</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2009-0002.html">http://www.vmware.com/security/advisories/VMSA-2009-0002.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2009-0016.html">http://www.vmware.com/security/advisories/VMSA-2009-0016.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1725">ADV-2008-1725</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2780">ADV-2008-2780</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2823">ADV-2008-2823</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/0320">ADV-2009-0320</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/0503">ADV-2009-0503</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/3316">ADV-2009-3316</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42816">apache-tomcat-hostmanager-xss(42816)</ref>
      <ref source="MLIST" url="https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E">[tomcat-dev] 20190319 svn commit: r1855831 [22/30] - in /tomcat/site/trunk: ./ docs/ xdocs/</ref>
      <ref source="MLIST" url="https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa@%3Cdev.tomcat.apache.org%3E">[tomcat-dev] 20190325 svn commit: r1856174 [20/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11534">oval:org.mitre.oval:def:11534</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6009">oval:org.mitre.oval:def:6009</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00712.html">FEDORA-2008-7977</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00859.html">FEDORA-2008-8113</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00889.html">FEDORA-2008-8130</ref>
    </refs>
    <vuln_soft>
      <prod name="tomcat" vendor="apache">
        <vers num="5.5.9"/>
        <vers num="5.5.10"/>
        <vers num="5.5.11"/>
        <vers num="5.5.12"/>
        <vers num="5.5.13"/>
        <vers num="5.5.14"/>
        <vers num="5.5.15"/>
        <vers num="5.5.16"/>
        <vers num="5.5.17"/>
        <vers num="5.5.18"/>
        <vers num="5.5.19"/>
        <vers num="5.5.20"/>
        <vers num="5.5.21"/>
        <vers num="5.5.22"/>
        <vers num="5.5.23"/>
        <vers num="5.5.24"/>
        <vers num="5.5.25"/>
        <vers num="5.5.26"/>
        <vers num="6.0.0"/>
        <vers num="6.0.1"/>
        <vers num="6.0.2"/>
        <vers num="6.0.3"/>
        <vers num="6.0.4"/>
        <vers num="6.0.5"/>
        <vers num="6.0.6"/>
        <vers num="6.0.7"/>
        <vers num="6.0.8"/>
        <vers num="6.0.9"/>
        <vers num="6.0.10"/>
        <vers num="6.0.11"/>
        <vers num="6.0.12"/>
        <vers num="6.0.13"/>
        <vers num="6.0.14"/>
        <vers num="6.0.15"/>
        <vers num="6.0.16"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1948" seq="2008-1948" published="2008-05-21" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The _gnutls_server_name_recv_params function in lib/ext_server_name.c in libgnutls in gnutls-serv in GnuTLS before 2.2.4 does not properly calculate the number of Server Names in a TLS 1.0 Client Hello message during extension handling, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a zero value for the length of Server Names, which leads to a buffer overflow in session resumption data in the pack_security_parameters function, aka GNUTLS-SA-2008-1-1.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b">http://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b</ref>
      <ref source="MLIST" url="http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00051.html">[gnutls-devel] 20080519 GnuTLS 2.2.4 - Security release [GNUTLS-SA-2008-1]</ref>
      <ref source="MLIST" url="http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00055.html">[gnutls-devel] 20080519 Re: GnuTLS 2.2.4 - Security release [GNUTLS-SA-2008-1]</ref>
      <ref source="MLIST" url="http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00060.html">[gnutls-devel] 20080519 GnuTLS 2.2.5 - Brown paper bag release</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00003.html">SUSE-SA:2008:046</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200805-20.xml">GLSA-200805-20</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3902">3902</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=600646&amp;group_id=21558">http://sourceforge.net/project/shownotes.php?release_id=600646&amp;group_id=21558</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0174">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0174</ref>
      <ref source="MISC" url="http://www.cert.fi/haavoittuvuudet/advisory-gnutls.html">http://www.cert.fi/haavoittuvuudet/advisory-gnutls.html</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1581">DSA-1581</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/111034">VU#111034</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:106">MDVSA-2008:106</ref>
      <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/05/20/1">[oss-security] 20080520 Re: CVE ID request: GNUTLS</ref>
      <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/05/20/2" patch="1">[oss-security] 20080520 Re: CVE ID request: GNUTLS</ref>
      <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/05/20/3">[oss-security] 20080520 Re: CVE ID request: GNUTLS</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0489.html">RHSA-2008:0489</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0492.html">RHSA-2008:0492</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492282/100/0/threaded">20080520 Vulnerability Advisory on GnuTLS</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492464/100/0/threaded">20080522 rPSA-2008-0174-1 gnutls</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29292" patch="1">29292</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020057">1020057</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-613-1">USN-613-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1582/references">ADV-2008-1582</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1583/references">ADV-2008-1583</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42532">gnutls-gnutlsservernamerecvparams-bo(42532)</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2552">https://issues.rpath.com/browse/RPL-2552</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10935">oval:org.mitre.oval:def:10935</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00487.html">FEDORA-2008-4183</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00590.html">FEDORA-2008-4259</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00615.html">FEDORA-2008-4274</ref>
    </refs>
    <vuln_soft>
      <prod name="gnutls" vendor="gnu">
        <vers num="1.0.18"/>
        <vers num="1.0.19"/>
        <vers num="1.0.20"/>
        <vers num="1.0.21"/>
        <vers num="1.0.22"/>
        <vers num="1.0.23"/>
        <vers num="1.0.24"/>
        <vers num="1.0.25"/>
        <vers num="1.1.13"/>
        <vers num="1.1.14"/>
        <vers num="1.1.15"/>
        <vers num="1.1.16"/>
        <vers num="1.1.17"/>
        <vers num="1.1.18"/>
        <vers num="1.1.19"/>
        <vers num="1.1.20"/>
        <vers num="1.1.21"/>
        <vers num="1.1.22"/>
        <vers num="1.1.23"/>
        <vers num="1.2.0"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2"/>
        <vers num="1.2.3"/>
        <vers num="1.2.4"/>
        <vers num="1.2.5"/>
        <vers num="1.2.6"/>
        <vers num="1.2.7"/>
        <vers num="1.2.8"/>
        <vers num="1.2.9"/>
        <vers num="1.2.10"/>
        <vers num="1.2.11"/>
        <vers num="1.3.0"/>
        <vers num="1.3.1"/>
        <vers num="1.3.2"/>
        <vers num="1.3.3"/>
        <vers num="1.3.4"/>
        <vers num="1.3.5"/>
        <vers num="1.4.0"/>
        <vers num="1.4.1"/>
        <vers num="1.4.2"/>
        <vers num="1.4.3"/>
        <vers num="1.4.4"/>
        <vers num="1.4.5"/>
        <vers num="1.5.0"/>
        <vers num="1.5.1"/>
        <vers num="1.5.2"/>
        <vers num="1.5.3"/>
        <vers num="1.5.4"/>
        <vers num="1.5.5"/>
        <vers num="1.6.0"/>
        <vers num="1.6.1"/>
        <vers num="1.6.2"/>
        <vers num="1.6.3"/>
        <vers num="1.7.0"/>
        <vers num="1.7.1"/>
        <vers num="1.7.2"/>
        <vers num="1.7.3"/>
        <vers num="1.7.4"/>
        <vers num="1.7.5"/>
        <vers num="1.7.6"/>
        <vers num="1.7.7"/>
        <vers num="1.7.8"/>
        <vers num="1.7.9"/>
        <vers num="1.7.10"/>
        <vers num="1.7.11"/>
        <vers num="1.7.12"/>
        <vers num="1.7.13"/>
        <vers num="1.7.14"/>
        <vers num="1.7.15"/>
        <vers num="1.7.16"/>
        <vers num="1.7.17"/>
        <vers num="1.7.18"/>
        <vers num="1.7.19"/>
        <vers num="2.0.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
        <vers num="2.0.4"/>
        <vers num="2.1.0"/>
        <vers num="2.1.1"/>
        <vers num="2.1.2"/>
        <vers num="2.1.3"/>
        <vers num="2.1.4"/>
        <vers num="2.1.5"/>
        <vers num="2.1.6"/>
        <vers num="2.1.7"/>
        <vers num="2.1.8"/>
        <vers num="2.2.0"/>
        <vers num="2.2.1"/>
        <vers num="2.2.2"/>
        <vers num="2.2.3"/>
        <vers num="2.2.4"/>
        <vers num="2.2.5"/>
        <vers num="2.3.0"/>
        <vers num="2.3.1"/>
        <vers num="2.3.2"/>
        <vers num="2.3.3"/>
        <vers num="2.3.4"/>
        <vers num="2.3.5"/>
        <vers num="2.3.6"/>
        <vers num="2.3.7"/>
        <vers num="2.3.8"/>
        <vers num="2.3.9"/>
        <vers num="2.3.10"/>
        <vers num="2.3.11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1949" seq="2008-1949" published="2008-05-21" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The _gnutls_recv_client_kx_message function in lib/gnutls_kx.c in libgnutls in gnutls-serv in GnuTLS before 2.2.4 continues to process Client Hello messages within a TLS message after one has already been processed, which allows remote attackers to cause a denial of service (NULL dereference and crash) via a TLS message containing multiple Client Hello messages, aka GNUTLS-SA-2008-1-2.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b">http://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b</ref>
      <ref source="MLIST" url="http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00051.html">[gnutls-devel] 20080519 GnuTLS 2.2.4 - Security release [GNUTLS-SA-2008-1]</ref>
      <ref source="MLIST" url="http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00055.html">[gnutls-devel] 20080519 Re: GnuTLS 2.2.4 - Security release [GNUTLS-SA-2008-1]</ref>
      <ref source="MLIST" url="http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00060.html">[gnutls-devel] 20080519 GnuTLS 2.2.5 - Brown paper bag release</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00003.html">SUSE-SA:2008:046</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200805-20.xml">GLSA-200805-20</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3902">3902</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=600646&amp;group_id=21558">http://sourceforge.net/project/shownotes.php?release_id=600646&amp;group_id=21558</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0174">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0174</ref>
      <ref source="MISC" url="http://www.cert.fi/haavoittuvuudet/advisory-gnutls.html">http://www.cert.fi/haavoittuvuudet/advisory-gnutls.html</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1581">DSA-1581</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/252626">VU#252626</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:106">MDVSA-2008:106</ref>
      <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/05/20/1">[oss-security] 20080520 Re: CVE ID request: GNUTLS</ref>
      <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/05/20/2">[oss-security] 20080520 Re: CVE ID request: GNUTLS</ref>
      <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/05/20/3">[oss-security] 20080520 Re: CVE ID request: GNUTLS</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0489.html">RHSA-2008:0489</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0492.html">RHSA-2008:0492</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492282/100/0/threaded">20080520 Vulnerability Advisory on GnuTLS</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492464/100/0/threaded">20080522 rPSA-2008-0174-1 gnutls</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29292" patch="1">29292</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020058">1020058</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-613-1">USN-613-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1582/references">ADV-2008-1582</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1583/references">ADV-2008-1583</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42530">gnutls-gnutlsrecvclientkxmessage-bo(42530)</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2552">https://issues.rpath.com/browse/RPL-2552</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9519">oval:org.mitre.oval:def:9519</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00487.html">FEDORA-2008-4183</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00590.html">FEDORA-2008-4259</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00615.html">FEDORA-2008-4274</ref>
    </refs>
    <vuln_soft>
      <prod name="gnutls" vendor="gnu">
        <vers num="1.0.18"/>
        <vers num="1.0.19"/>
        <vers num="1.0.20"/>
        <vers num="1.0.21"/>
        <vers num="1.0.22"/>
        <vers num="1.0.23"/>
        <vers num="1.0.24"/>
        <vers num="1.0.25"/>
        <vers num="1.1.13"/>
        <vers num="1.1.14"/>
        <vers num="1.1.15"/>
        <vers num="1.1.16"/>
        <vers num="1.1.17"/>
        <vers num="1.1.18"/>
        <vers num="1.1.19"/>
        <vers num="1.1.20"/>
        <vers num="1.1.21"/>
        <vers num="1.1.22"/>
        <vers num="1.1.23"/>
        <vers num="1.2.0"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2"/>
        <vers num="1.2.3"/>
        <vers num="1.2.4"/>
        <vers num="1.2.5"/>
        <vers num="1.2.6"/>
        <vers num="1.2.7"/>
        <vers num="1.2.8"/>
        <vers num="1.2.9"/>
        <vers num="1.2.10"/>
        <vers num="1.2.11"/>
        <vers num="1.3.0"/>
        <vers num="1.3.1"/>
        <vers num="1.3.2"/>
        <vers num="1.3.3"/>
        <vers num="1.3.4"/>
        <vers num="1.3.5"/>
        <vers num="1.4.0"/>
        <vers num="1.4.1"/>
        <vers num="1.4.2"/>
        <vers num="1.4.3"/>
        <vers num="1.4.4"/>
        <vers num="1.4.5"/>
        <vers num="1.5.0"/>
        <vers num="1.5.1"/>
        <vers num="1.5.2"/>
        <vers num="1.5.3"/>
        <vers num="1.5.4"/>
        <vers num="1.5.5"/>
        <vers num="1.6.0"/>
        <vers num="1.6.1"/>
        <vers num="1.6.2"/>
        <vers num="1.6.3"/>
        <vers num="1.7.0"/>
        <vers num="1.7.1"/>
        <vers num="1.7.2"/>
        <vers num="1.7.3"/>
        <vers num="1.7.4"/>
        <vers num="1.7.5"/>
        <vers num="1.7.6"/>
        <vers num="1.7.7"/>
        <vers num="1.7.8"/>
        <vers num="1.7.9"/>
        <vers num="1.7.10"/>
        <vers num="1.7.11"/>
        <vers num="1.7.12"/>
        <vers num="1.7.13"/>
        <vers num="1.7.14"/>
        <vers num="1.7.15"/>
        <vers num="1.7.16"/>
        <vers num="1.7.17"/>
        <vers num="1.7.18"/>
        <vers num="1.7.19"/>
        <vers num="2.0.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
        <vers num="2.0.4"/>
        <vers num="2.1.0"/>
        <vers num="2.1.1"/>
        <vers num="2.1.2"/>
        <vers num="2.1.3"/>
        <vers num="2.1.4"/>
        <vers num="2.1.5"/>
        <vers num="2.1.6"/>
        <vers num="2.1.7"/>
        <vers num="2.1.8"/>
        <vers num="2.2.0"/>
        <vers num="2.2.1"/>
        <vers num="2.2.2"/>
        <vers num="2.2.3"/>
        <vers num="2.2.4"/>
        <vers num="2.2.5"/>
        <vers num="2.3.0"/>
        <vers num="2.3.1"/>
        <vers num="2.3.2"/>
        <vers num="2.3.3"/>
        <vers num="2.3.4"/>
        <vers num="2.3.5"/>
        <vers num="2.3.6"/>
        <vers num="2.3.7"/>
        <vers num="2.3.8"/>
        <vers num="2.3.9"/>
        <vers num="2.3.10"/>
        <vers num="2.3.11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1950" seq="2008-1950" published="2008-05-21" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record with an invalid Record Length, which leads to an invalid cipher padding length, aka GNUTLS-SA-2008-1-3.</descript>
    </desc>
    <sols>
      <sol source="nvd">The vendor has released a statement regarding this issue:

http://lists.gnupg.org/pipermail/gnutls-dev/2006-September/001208.html</sol>
    </sols>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b">http://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b</ref>
      <ref source="MLIST" url="http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00051.html" patch="1">[gnutls-devel] 20080519 GnuTLS 2.2.4 - Security release [GNUTLS-SA-2008-1]</ref>
      <ref source="MLIST" url="http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00055.html">[gnutls-devel] 20080519 Re: GnuTLS 2.2.4 - Security release [GNUTLS-SA-2008-1]</ref>
      <ref source="MLIST" url="http://lists.gnu.org/archive/html/gnutls-devel/2008-05/msg00060.html">[gnutls-devel] 20080519 GnuTLS 2.2.5 - Brown paper bag release</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00003.html">SUSE-SA:2008:046</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200805-20.xml">GLSA-200805-20</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3902">3902</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=600646&amp;group_id=21558">http://sourceforge.net/project/shownotes.php?release_id=600646&amp;group_id=21558</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0174">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0174</ref>
      <ref source="MISC" url="http://www.cert.fi/haavoittuvuudet/advisory-gnutls.html">http://www.cert.fi/haavoittuvuudet/advisory-gnutls.html</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1581">DSA-1581</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/659209">VU#659209</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:106">MDVSA-2008:106</ref>
      <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/05/20/1">[oss-security] 20080520 Re: CVE ID request: GNUTLS</ref>
      <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/05/20/2" patch="1">[oss-security] 20080520 Re: CVE ID request: GNUTLS</ref>
      <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/05/20/3">[oss-security] 20080520 Re: CVE ID request: GNUTLS</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0489.html">RHSA-2008:0489</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0492.html">RHSA-2008:0492</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492282/100/0/threaded">20080520 Vulnerability Advisory on GnuTLS</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492464/100/0/threaded">20080522 rPSA-2008-0174-1 gnutls</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29292">29292</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020059">1020059</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-613-1">USN-613-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1582/references">ADV-2008-1582</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1583/references">ADV-2008-1583</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42533">gnutls-gnutlsciphertext2compressed-bo(42533)</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2552">https://issues.rpath.com/browse/RPL-2552</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11393">oval:org.mitre.oval:def:11393</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00487.html">FEDORA-2008-4183</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00590.html">FEDORA-2008-4259</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00615.html">FEDORA-2008-4274</ref>
    </refs>
    <vuln_soft>
      <prod name="gnutls" vendor="gnu">
        <vers num="1.0.18"/>
        <vers num="1.0.19"/>
        <vers num="1.0.20"/>
        <vers num="1.0.21"/>
        <vers num="1.0.22"/>
        <vers num="1.0.23"/>
        <vers num="1.0.24"/>
        <vers num="1.0.25"/>
        <vers num="1.1.13"/>
        <vers num="1.1.14"/>
        <vers num="1.1.15"/>
        <vers num="1.1.16"/>
        <vers num="1.1.17"/>
        <vers num="1.1.18"/>
        <vers num="1.1.19"/>
        <vers num="1.1.20"/>
        <vers num="1.1.21"/>
        <vers num="1.1.22"/>
        <vers num="1.1.23"/>
        <vers num="1.2.0"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2"/>
        <vers num="1.2.3"/>
        <vers num="1.2.4"/>
        <vers num="1.2.5"/>
        <vers num="1.2.6"/>
        <vers num="1.2.7"/>
        <vers num="1.2.8"/>
        <vers num="1.2.9"/>
        <vers num="1.2.10"/>
        <vers num="1.2.11"/>
        <vers num="1.3.0"/>
        <vers num="1.3.1"/>
        <vers num="1.3.2"/>
        <vers num="1.3.3"/>
        <vers num="1.3.4"/>
        <vers num="1.3.5"/>
        <vers num="1.4.0"/>
        <vers num="1.4.1"/>
        <vers num="1.4.2"/>
        <vers num="1.4.3"/>
        <vers num="1.4.4"/>
        <vers num="1.4.5"/>
        <vers num="1.5.0"/>
        <vers num="1.5.1"/>
        <vers num="1.5.2"/>
        <vers num="1.5.3"/>
        <vers num="1.5.4"/>
        <vers num="1.5.5"/>
        <vers num="1.6.0"/>
        <vers num="1.6.1"/>
        <vers num="1.6.2"/>
        <vers num="1.6.3"/>
        <vers num="1.7.0"/>
        <vers num="1.7.1"/>
        <vers num="1.7.2"/>
        <vers num="1.7.3"/>
        <vers num="1.7.4"/>
        <vers num="1.7.5"/>
        <vers num="1.7.6"/>
        <vers num="1.7.7"/>
        <vers num="1.7.8"/>
        <vers num="1.7.9"/>
        <vers num="1.7.10"/>
        <vers num="1.7.11"/>
        <vers num="1.7.12"/>
        <vers num="1.7.13"/>
        <vers num="1.7.14"/>
        <vers num="1.7.15"/>
        <vers num="1.7.16"/>
        <vers num="1.7.17"/>
        <vers num="1.7.18"/>
        <vers num="1.7.19"/>
        <vers num="2.0.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
        <vers num="2.0.4"/>
        <vers num="2.1.0"/>
        <vers num="2.1.1"/>
        <vers num="2.1.2"/>
        <vers num="2.1.3"/>
        <vers num="2.1.4"/>
        <vers num="2.1.5"/>
        <vers num="2.1.6"/>
        <vers num="2.1.7"/>
        <vers num="2.1.8"/>
        <vers num="2.2.0"/>
        <vers num="2.2.1"/>
        <vers num="2.2.2"/>
        <vers num="2.2.3"/>
        <vers num="2.2.4"/>
        <vers num="2.2.5"/>
        <vers num="2.3.0"/>
        <vers num="2.3.1"/>
        <vers num="2.3.2"/>
        <vers num="2.3.3"/>
        <vers num="2.3.4"/>
        <vers num="2.3.5"/>
        <vers num="2.3.6"/>
        <vers num="2.3.7"/>
        <vers num="2.3.8"/>
        <vers num="2.3.9"/>
        <vers num="2.3.10"/>
        <vers num="2.3.11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1951" seq="2008-1951" published="2008-06-25" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Untrusted search path vulnerability in a certain Red Hat build script for Standards Based Linux Instrumentation for Manageability (sblim) libraries before 1-13a.el4_6.1 in Red Hat Enterprise Linux (RHEL) 4, and before 1-31.el5_2.1 in RHEL 5, allows local users to gain privileges via a malicious library in a certain subdirectory of /var/tmp, related to an incorrect RPATH setting, as demonstrated by a malicious libc.so library for tog-pegasus.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29913" adv="1">29913</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020354" adv="1">1020354</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=447705">https://bugzilla.redhat.com/show_bug.cgi?id=447705</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43315">redhat-sblim-privilege-escalation(43315)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9635">oval:org.mitre.oval:def:9635</ref>
      <ref source="REDHAT" url="https://rhn.redhat.com/errata/RHSA-2008-0497.html">RHSA-2008:0497</ref>
    </refs>
    <vuln_soft>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="4"/>
        <vers num="5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1952" seq="2008-1952" published="2008-06-23" modified="2017-09-28" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The backend for XenSource Xen Para Virtualized Frame Buffer (PVFB) in Xen ioemu does not properly restrict the frame buffer size, which allows attackers to cause a denial of service (crash) by mapping an arbitrary amount of guest memory.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MLIST" url="http://lists.xensource.com/archives/html/xen-devel/2008-05/msg00421.html">[Xen-devel] 20080521 [PATCH] ioemu: Fix PVFB backend to limit frame buffer size</ref>
      <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/05/21/9" patch="1">[oss-security] 20080521 New Xen ioemu: PVFB backend issue</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30646">30646</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020957">1020957</ref>
      <ref source="CONFIRM" url="http://xenbits.xensource.com/xen-unstable.hg?rev/9044705960cb30cec385bdca7305bcf7db096721" patch="1">http://xenbits.xensource.com/xen-unstable.hg?rev/9044705960cb30cec385bdca7305bcf7db096721</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43362">xen-pvfb-ioemu-dos(43362)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11189">oval:org.mitre.oval:def:11189</ref>
      <ref source="REDHAT" url="https://rhn.redhat.com/errata/RHSA-2008-0892.html">RHSA-2008:0892</ref>
    </refs>
    <vuln_soft>
      <prod name="xen_para_virtualized_frame_buffer" vendor="xensource">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1953" seq="2008-1953" published="2008-04-25" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the Sitedesigner before 1.1.5 search template in Magnolia Enterprise Edition allows remote attackers to inject arbitrary web script or HTML via the query parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://jira.magnolia.info/browse/MGNLSD-175">http://jira.magnolia.info/browse/MGNLSD-175</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28897">28897</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41962">magnolia-search-template-xss(41962)</ref>
    </refs>
    <vuln_soft>
      <prod name="site_designer" vendor="magnolia">
        <vers num="1.0.13" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1954" seq="2008-1954" published="2008-04-25" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in one_day.php in Web Calendar Pro 4.1 and earlier allows remote attackers to execute arbitrary SQL commands via the user_id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28921">28921</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1343/references">ADV-2008-1343</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41963">webcalendarpro-oneday-sql-injection(41963)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5485">5485</ref>
    </refs>
    <vuln_soft>
      <prod name="web_calendar_pro" vendor="webcalendar">
        <vers num="4.0"/>
        <vers num="4.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1955" seq="2008-1955" published="2008-04-25" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in rep.php in Martin BOUCHER MyBoard 1.0.12 allows remote attackers to inject arbitrary web script or HTML via the id parameter. information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28823">28823</ref>
      <ref source="MISC" url="http://www.z0rlu.ownspace.org/index.php?/archives/52-MyBoard-1.0.12-XSS.html">http://www.z0rlu.ownspace.org/index.php?/archives/52-MyBoard-1.0.12-XSS.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42024">myboard-rep-xss(42024)</ref>
    </refs>
    <vuln_soft>
      <prod name="myboard" vendor="toocharger">
        <vers num="1.0.12"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1956" seq="2008-1956" published="2008-04-25" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php in Wikepage Opus 13 2007.2 allows remote attackers to inject arbitrary web script or HTML via the wiki parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://sourceforge.net/tracker/index.php?func=detail&amp;aid=1938445&amp;group_id=128991&amp;atid=713448">http://sourceforge.net/tracker/index.php?func=detail&amp;aid=1938445&amp;group_id=128991&amp;atid=713448</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491065/100/0/threaded">20080418 Wikepage Wiki v.2007-2 Cross-Site Scripting</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28842">28842</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42058">wikepage-wiki-xss(42058)</ref>
    </refs>
    <vuln_soft>
      <prod name="opus" vendor="wikepage">
        <vers num="13_2007.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1957" seq="2008-1957" published="2008-04-25" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in news.php in Tr Script News 2.1 allows remote attackers to execute arbitrary SQL commands via the nb parameter in voir mode.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28876">28876</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1319/references">ADV-2008-1319</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41946">trscriptnews-news-sql-injection(41946)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5483">5483</ref>
    </refs>
    <vuln_soft>
      <prod name="tr_script_news" vendor="easyscripts">
        <vers num="2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1958" seq="2008-1958" published="2008-04-25" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unrestricted file upload vulnerability in the ajout_cat mode in admin/main.php in Tr Script News 2.1 allows remote authenticated users to execute arbitrary code by uploading a file with a .php extension.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41953">trscriptnews-main-file-upload(41953)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5483">5483</ref>
    </refs>
    <vuln_soft>
      <prod name="tr_script_news" vendor="easyscripts">
        <vers num="2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1959" seq="2008-1959" published="2008-04-25" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the get_remote_video_port_media function in call.cpp in SIPp 3.0 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted SIP message.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=593806&amp;group_id=104305">http://sourceforge.net/project/shownotes.php?release_id=593806&amp;group_id=104305</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28884">28884</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1322/references">ADV-2008-1322</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41945">sipp-getremotevideoportmedia-bo(41945)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00001.html">FEDORA-2008-3508</ref>
    </refs>
    <vuln_soft>
      <prod name="sipp" vendor="sipp">
        <vers num="3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1960" seq="2008-1960" published="2008-04-25" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in cgi-bin/contray/search.cgi in ContRay 3.x allows remote attackers to inject arbitrary web script or HTML via the search parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28883">28883</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41937">contray-search-xss(41937)</ref>
    </refs>
    <vuln_soft>
      <prod name="contray" vendor="contray">
        <vers num="3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1961" seq="2008-1961" published="2008-04-25" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in Voice Of Web AllMyGuests 0.4.1 allows remote attackers to execute arbitrary SQL commands via the AMG_id parameter in a comments action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28850">28850</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41910">allmyguests-index-sql-injection(41910)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5469">5469</ref>
    </refs>
    <vuln_soft>
      <prod name="voice_of_web_allmyguests" vendor="php_resource">
        <vers num="0.4.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1962" seq="2008-1962" published="2008-04-25" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple directory traversal vulnerabilities in Aterr 0.9.1 allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the (1) class parameter to include/functions.inc.php and the (2) file parameter to include/common.inc.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28861">28861</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41903">aterr-functions-common-file-include(41903)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5474">5474</ref>
    </refs>
    <vuln_soft>
      <prod name="aterr" vendor="chimaera">
        <vers num="0.9.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1963" seq="2008-1963" published="2008-04-25" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in includes/functions.php in Quate Grape Web Statistics 0.2a allows remote attackers to execute arbitrary PHP code via a URL in the location parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28838">28838</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41883">grapewebstatistics-functions-file-include(41883)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5463">5463</ref>
    </refs>
    <vuln_soft>
      <prod name="grape_web_statistics" vendor="quate">
        <vers num="0.2a"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1964" seq="2008-1964" published="2008-04-25" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">** DISPUTED **  Stack-based buffer overflow in the demux_nsf_send_headers function in src/demuxers/demux_nsf.c in xine-lib allows remote attackers to have an unknown impact via a long copyright field in an NSF header in an NES Sound file, a different issue than CVE-2008-1878.  NOTE: a third party claims that the copyright field always has a safe length.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491248/100/0/threaded">20080423 xine-lib NES Sound Format Demuxer Buffer Overflow</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491274/100/0/threaded">20080423 Re: xine-lib NES Sound Format Demuxer Buffer Overflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28908">28908</ref>
    </refs>
    <vuln_soft>
      <prod name="xine_lib" vendor="xinehq">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1965" seq="2008-1965" published="2008-04-25" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Argument injection vulnerability in the cai: URI handler in rcplauncher in IBM Lotus Expeditor Client for Desktop 6.1.1 and 6.1.2, as used by Lotus Symphony and possibly other products, allows remote attackers to execute arbitrary code by injecting a -launcher option via a cai: URI, as demonstrated by a reference to a UNC share pathname.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2008-04/0640.html">20080424 Lotus expeditor rcplauncher uri handler vulnerability</ref>
      <ref source="MISC" url="http://thomas.pollet.googlepages.com/lotusexpeditorurihandlervulnerability">http://thomas.pollet.googlepages.com/lotusexpeditorurihandlervulnerability</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491343/100/0/threaded">20080425 Lotus expeditor rcplauncher uri handler vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28926">28926</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019951">1019951</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019952">1019952</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1394/references">ADV-2008-1394</ref>
      <ref source="CONFIRM" url="http://www-1.ibm.com/support/docview.wss?uid=swg21303813">http://www-1.ibm.com/support/docview.wss?uid=swg21303813</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41990">ibm-lotussymphony-rcplauncher-code-execution(41990)</ref>
    </refs>
    <vuln_soft>
      <prod name="lotus_expeditor_client" vendor="ibm">
        <vers num="6.1.1" edition=":desktop"/>
        <vers num="6.1.2" edition=":desktop"/>
      </prod>
      <prod name="lotus_symphany" vendor="ibm">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1966" seq="2008-1966" published="2008-04-27" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.0" CVSS_base_score="4.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Multiple buffer overflows in the JAR file administration routines in the BSU JAVA subcomponent in IBM DB2 8 before FP16, 9.1 before FP4a, and 9.5 before FP1 allow remote authenticated users to cause a denial of service (instance crash) via a call to the (1) RECOVERJAR or (2) REMOVE_JAR procedure with a crafted parameter, related to (a) sqlj.install_jar and (b) sqlj.replace_jar.</descript>
    </desc>
    <sols>
      <sol source="nvd">http://www-1.ibm.com/support/docview.wss?uid=swg21255572http://www-1.ibm.com/support/docview.wss?uid=swg21287889
http://www-1.ibm.com/support/docview.wss?uid=swg21256235</sol>
    </sols>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.appsecinc.com/resources/alerts/db2/2008-04.shtml">http://www.appsecinc.com/resources/alerts/db2/2008-04.shtml</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491071/100/0/threaded">20080418 Team SHATTER Security Advisory: Multiple DoS in JAR files manipulation procedures</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28835">28835</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29601">29601</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/docview.wss?uid=swg1IZ08512">IZ08512</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/docview.wss?uid=swg1IZ08945">IZ08945</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/docview.wss?uid=swg1IZ15496">IZ15496</ref>
      <ref source="CONFIRM" url="http://www-1.ibm.com/support/docview.wss?uid=swg21255607">http://www-1.ibm.com/support/docview.wss?uid=swg21255607</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41955">ibm-db2-recoverjar-removejar-dos(41955)</ref>
    </refs>
    <vuln_soft>
      <prod name="db2" vendor="ibm">
        <vers num="8.0" edition="fp1"/>
        <vers num="8.0" edition="fp10"/>
        <vers num="8.0" edition="fp11"/>
        <vers num="8.0" edition="fp12"/>
        <vers num="8.0" edition="fp13"/>
        <vers num="8.0" edition="fp14"/>
        <vers num="8.0" edition="fp15"/>
        <vers num="8.0" edition="fp2"/>
        <vers num="8.0" edition="fp3"/>
        <vers num="8.0" edition="fp4"/>
        <vers num="8.0" edition="fp4a"/>
        <vers num="8.0" edition="fp5"/>
        <vers num="8.0" edition="fp6"/>
        <vers num="8.0" edition="fp6a"/>
        <vers num="8.0" edition="fp6b"/>
        <vers num="8.0" edition="fp6c"/>
        <vers num="8.0" edition="fp7"/>
        <vers num="8.0" edition="fp7a"/>
        <vers num="8.0" edition="fp7b"/>
        <vers num="8.0" edition="fp8"/>
        <vers num="8.0" edition="fp8a"/>
        <vers num="8.0" edition="fp9"/>
        <vers num="8.0" edition="fp9a"/>
        <vers num="9.1" edition="fp1"/>
        <vers num="9.1" edition="fp2"/>
        <vers num="9.1" edition="fp2a"/>
        <vers num="9.1" edition="fp3"/>
        <vers num="9.1" edition="fp3a"/>
        <vers num="9.1" edition="fp4"/>
        <vers num="9.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1967" seq="2008-1967" published="2008-04-27" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in CFLogon/CFLogon.asp in Cezanne 6.5.1 and 7 allows remote attackers to inject arbitrary web script or HTML via the SleUserName parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3828">3828</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490842/100/0/threaded">20080414 S21SEC-041-en:Cezanne SW Cross-Site Scripting</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28774">28774</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41813">cezanne-cflogon-xss(41813)</ref>
    </refs>
    <vuln_soft>
      <prod name="cezanne" vendor="cezannesw">
        <vers num="6.5.1"/>
        <vers num="7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1968" seq="2008-1968" published="2008-04-27" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.0" CVSS_base_score="6.0" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="6.8" CVSS_vector="(AV:N/AC:M/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in Cezanne 7 allow remote authenticated users to execute arbitrary SQL commands via the FUNID parameter to (1) CFLookup.asp and (2) CznCommon/CznCustomContainer.asp.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3830">3830</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490843/100/0/threaded">20080414 S21SEC-043-en:Cezanne SW Blind SQL Injection</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28773">28773</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41816">cezanne-funid-sql-injection(41816)</ref>
    </refs>
    <vuln_soft>
      <prod name="cezanne" vendor="cezannesw">
        <vers num="7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1969" seq="2008-1969" published="2008-04-27" modified="2018-10-11" severity="Low" CVSS_version="2.0" CVSS_score="3.5" CVSS_base_score="3.5" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="6.8" CVSS_vector="(AV:N/AC:M/Au:S/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in Cezanne 6.5.1 and 7 allow remote attackers to inject arbitrary web script or HTML via the (1) LookUPId and (2) CbFun parameters to (a) CFLookUP.asp; (3) TitleParms, (4) WidgetsHeights, (5) WidgetsLinks, and (6) WidgetsTitles parameters to (b) CznCommon/CznCustomContainer.asp, (7) CFTARGET parameter to (c) home.asp, (8) PersonOid parameter to (d) PeopleWeb/Cards/CVCard.asp, (9) DESTLINKOID and PersonOID parameters to (e) PeopleWeb/Cards/PayrollCard.asp, and the (10) FolderTemplateId and (11) FolderTemplateName parameters to (f) PeopleWeb/CznDocFolder/CznDFStartProcess.asp.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3829">3829</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490846/100/0/threaded">20080414 S21SEC-042-en:Cezanne SW Cross-Site Scripting (login required)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28772">28772</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41821">cezanne-multiple-xss(41821)</ref>
    </refs>
    <vuln_soft>
      <prod name="cezanne" vendor="cezannesw">
        <vers num="6.5.1"/>
        <vers num="7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1970" seq="2008-1970" published="2008-04-27" modified="2017-08-07" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">muCommander before 0.8.2 stores credentials.xml with insecure permissions, which allows local users to obtain credentials.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.mucommander.com/changes.php">http://www.mucommander.com/changes.php</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28875">28875</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41908">mucommander-credentials-info-disclosure(41908)</ref>
    </refs>
    <vuln_soft>
      <prod name="mucommander" vendor="mucommander">
        <vers num="0.1"/>
        <vers num="0.2"/>
        <vers num="0.3"/>
        <vers num="0.4"/>
        <vers num="0.5"/>
        <vers num="0.6"/>
        <vers num="0.7"/>
        <vers num="0.8" prev="1" edition="beta1"/>
        <vers num="0.8" prev="1" edition="beta2"/>
        <vers num="0.8" prev="1" edition="beta3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1971" seq="2008-1971" published="2008-04-27" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">phShoutBox Final 1.5 and earlier only checks passwords when specified in $_POST, which allows remote attackers to gain privileges by setting the (1) phadmin cookie to admin.php, or (2) in 1.4 and earlier, the ssbadmin cookie to shoutadmin.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28856">28856</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41901">phshoutbox-admin-security-bypass(41901)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5467">5467</ref>
    </refs>
    <vuln_soft>
      <prod name="phshoutbox_final" vendor="phphq">
        <vers num="1.5" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1972" seq="2008-1972" published="2008-04-27" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in the user account creation feature in Exponent CMS 0.96.6-GA20071003 and earlier, when the Allow Registration? configuration option is enabled, allow remote attackers to inject arbitrary web script or HTML via the (1) username, (2) firstname, (3) lastname, and (4) e-mail address fields.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <sols>
      <sol source="nvd">Patch Link: http://www.exponentcms.org/index.php?action=view&amp;id=64&amp;module=newsmodule&amp;src=%40random44fe03276195</sol>
    </sols>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=592961&amp;group_id=118524">http://sourceforge.net/project/shownotes.php?release_id=592961&amp;group_id=118524</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28834">28834</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41878">exponentcms-newaccount-xss(41878)</ref>
    </refs>
    <vuln_soft>
      <prod name="exponent_cms" vendor="oicgroup">
        <vers num="0.94"/>
        <vers num="0.95"/>
        <vers num="0.96.1"/>
        <vers num="0.96.3"/>
        <vers num="0.96.4"/>
        <vers num="0.96.5" edition="rc1"/>
        <vers num="0.96.6" edition="alpha"/>
        <vers num="0.96.6-ga20071003" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1973" seq="2008-1973" published="2008-04-27" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in SubEdit Player build 4056 and 4066 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a long subtitle file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28858">28858</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1306">ADV-2008-1306</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41913">subeditplayer-subtitle-bo(41913)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5472">5472</ref>
    </refs>
    <vuln_soft>
      <prod name="subedit_player" vendor="artur_sikora">
        <vers num="4056"/>
        <vers num="4066"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1974" seq="2008-1974" published="2008-04-27" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in addevent.php in Horde Kronolith 2.1.7, Groupware Webmail Edition 1.0.6, and Groupware 1.0.5 allows remote attackers to inject arbitrary web script or HTML via the url parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://forum.aria-security.com/showthread.php?t=49">http://forum.aria-security.com/showthread.php?t=49</ref>
      <ref source="MLIST" url="http://lists.horde.org/archives/kronolith/Week-of-Mon-20080421/006807.html">[kronolith] 20080427 Kronolith H3 (2.1.8) (final)</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3831">3831</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491230/100/0/threaded">20080422 Horde Webmail XSS [Aria-Security]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28898">28898</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019934">1019934</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1373/references">ADV-2008-1373</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41974">horde-webmail-addevent-xss(41974)</ref>
      <ref source="DEBIAN" url="https://www.debian.org/security/2008/dsa-1560">DSA-1560</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00427.html">FEDORA-2008-3543</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00444.html">FEDORA-2008-3460</ref>
    </refs>
    <vuln_soft>
      <prod name="groupware" vendor="horde">
        <vers num="1.0.5"/>
      </prod>
      <prod name="groupware_webmail_edition" vendor="horde">
        <vers num="1.0.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1975" seq="2008-1975" published="2008-04-27" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in E-RESERV 2.1 allows remote attackers to execute arbitrary SQL commands via the ID_loc parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28899">28899</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1345/references">ADV-2008-1345</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41970">ereserv-idloc-sql-injection(41970)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5487">5487</ref>
    </refs>
    <vuln_soft>
      <prod name="e_reserve" vendor="cogites">
        <vers num="2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1976" seq="2008-1976" published="2008-04-27" modified="2019-08-01" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in the Drupal modules (1) Internationalization (i18n) 5.x before 5.x-2.3 and 5.x-1.1 and 6.x before 6.x-1.0 beta 1; and (2) Localizer 5.x before 5.x-3.4, 5.x-2.1, and 5.x-1.11; allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://drupal.org/node/250344" adv="1" patch="1">http://drupal.org/node/250344</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28916" adv="1">28916</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1352/references">ADV-2008-1352</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41977" adv="1">internationalization-localizer-xss(41977)</ref>
    </refs>
    <vuln_soft>
      <prod name="internationalization" vendor="internationalization_project">
        <vers num="5.x-1.0" edition=":~~~drupal~~"/>
        <vers num="5.x-1.x" edition="dev:~~~drupal~~"/>
        <vers num="5.x-2.0" edition=":~~~drupal~~"/>
        <vers num="5.x-2.1" edition=":~~~drupal~~"/>
        <vers num="5.x-2.2" edition=":~~~drupal~~"/>
        <vers num="6.x-1.x" edition="dev:~~~drupal~~"/>
      </prod>
      <prod name="localizer" vendor="localizer_project">
        <vers num="5.x-1.0" edition=":~~~drupal~~"/>
        <vers num="5.x-1.1" edition=":~~~drupal~~"/>
        <vers num="5.x-1.2" edition=":~~~drupal~~"/>
        <vers num="5.x-1.3" edition=":~~~drupal~~"/>
        <vers num="5.x-1.4" edition=":~~~drupal~~"/>
        <vers num="5.x-1.5" edition=":~~~drupal~~"/>
        <vers num="5.x-1.6" edition=":~~~drupal~~"/>
        <vers num="5.x-1.7" edition=":~~~drupal~~"/>
        <vers num="5.x-1.8" edition=":~~~drupal~~"/>
        <vers num="5.x-1.9" edition=":~~~drupal~~"/>
        <vers num="5.x-1.10" edition=":~~~drupal~~"/>
        <vers num="5.x-1.x" edition="dev:~~~drupal~~"/>
        <vers num="5.x-2.x" edition="dev:~~~drupal~~"/>
        <vers num="5.x-3.0" edition=":~~~drupal~~"/>
        <vers num="5.x-3.1" edition=":~~~drupal~~"/>
        <vers num="5.x-3.2" edition=":~~~drupal~~"/>
        <vers num="5.x-3.3" edition=":~~~drupal~~"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1977" seq="2008-1977" published="2008-04-27" modified="2019-08-01" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site request forgery (CSRF) vulnerability in the Internationalization (i18n) Drupal module 5.x before 5.x-2.3 and 5.x-1.1, and 6.x before 6.x-1.0 beta 1, allows remote attackers to change node translation relationships via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://drupal.org/node/250344" adv="1" patch="1">http://drupal.org/node/250344</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28916" adv="1">28916</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1352/references">ADV-2008-1352</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41982">internationalization-translator-csrf(41982)</ref>
    </refs>
    <vuln_soft>
      <prod name="internationalization" vendor="internationalization_project">
        <vers num="5.x-1.0" edition=":~~~drupal~~"/>
        <vers num="5.x-1.x" edition="dev:~~~drupal~~"/>
        <vers num="5.x-2.0" edition=":~~~drupal~~"/>
        <vers num="5.x-2.1" edition=":~~~drupal~~"/>
        <vers num="5.x-2.2" edition=":~~~drupal~~"/>
        <vers num="6.x-1.x" edition="dev:~~~drupal~~"/>
      </prod>
      <prod name="localizer" vendor="localizer_project">
        <vers num="5.x-1.0" edition=":~~~drupal~~"/>
        <vers num="5.x-1.1" edition=":~~~drupal~~"/>
        <vers num="5.x-1.2" edition=":~~~drupal~~"/>
        <vers num="5.x-1.3" edition=":~~~drupal~~"/>
        <vers num="5.x-1.4" edition=":~~~drupal~~"/>
        <vers num="5.x-1.5" edition=":~~~drupal~~"/>
        <vers num="5.x-1.6" edition=":~~~drupal~~"/>
        <vers num="5.x-1.7" edition=":~~~drupal~~"/>
        <vers num="5.x-1.8" edition=":~~~drupal~~"/>
        <vers num="5.x-1.9" edition=":~~~drupal~~"/>
        <vers num="5.x-1.10" edition=":~~~drupal~~"/>
        <vers num="5.x-1.x" edition="dev:~~~drupal~~"/>
        <vers num="5.x-2.x" edition="dev:~~~drupal~~"/>
        <vers num="5.x-3.0" edition=":~~~drupal~~"/>
        <vers num="5.x-3.1" edition=":~~~drupal~~"/>
        <vers num="5.x-3.2" edition=":~~~drupal~~"/>
        <vers num="5.x-3.3" edition=":~~~drupal~~"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1978" seq="2008-1978" published="2008-04-27" modified="2017-08-07" severity="Low" CVSS_version="2.0" CVSS_score="3.5" CVSS_base_score="3.5" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="6.8" CVSS_vector="(AV:N/AC:M/Au:S/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the Ubercart 5.x before 5.x-1.0 rc3 module for Drupal allows remote authenticated users to inject arbitrary web script or HTML via node titles related to unspecified product features, a different vector than CVE-2008-1428.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://drupal.org/node/250343">http://drupal.org/node/250343</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28914" patch="1">28914</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1351/references">ADV-2008-1351</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41975">ubercart-module-xss(41975)</ref>
    </refs>
    <vuln_soft>
      <prod name="ubercart_module" vendor="drupal">
        <vers num="5-1.0" prev="1" edition="rc3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1979" seq="2008-1979" published="2008-04-27" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The Discovery Service (casdscvc) in CA ARCserve Backup 12.0.5454.0 and earlier allows remote attackers to cause a denial of service (crash) via a packet with a large integer value used in an increment to TCP port 41523, which triggers a buffer over-read.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/carcbackazz-adv.txt">http://aluigi.altervista.org/adv/carcbackazz-adv.txt</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493430/100/0/threaded">20080618 CA ARCserve Backup Discovery Service Denial of Service Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28927">28927</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020324">1020324</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1354" adv="1">ADV-2008-1354</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41869">ca-arcservebackup-casdscvc-dos(41869)</ref>
    </refs>
    <vuln_soft>
      <prod name="brightstor_arcserve_backup" vendor="ca">
        <vers num="12.0.5454.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1980" seq="2008-1980" published="2008-04-27" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in E-Publish 5.x before 5.x-1.1 and 6.x before 6.x-1.0 beta1, a Drupal module, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://drupal.org/node/250408" patch="1">http://drupal.org/node/250408</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1353/references">ADV-2008-1353</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41979">epublish-unspecified-xss(41979)</ref>
    </refs>
    <vuln_soft>
      <prod name="e-publish" vendor="drupal">
        <vers num="5-1.1" prev="1"/>
        <vers num="6-1.0" prev="1" edition="beta1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1981" seq="2008-1981" published="2008-04-27" modified="2019-08-01" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site request forgery (CSRF) vulnerability in E-Publish 5.x before 5.x-1.1 and 6.x before 6.x-1.0 beta1, a Drupal module, allows remote attackers to perform unauthorized actions as other users via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://drupal.org/node/250408" adv="1" patch="1">http://drupal.org/node/250408</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1353/references">ADV-2008-1353</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41978" sig="1">epublish-forms-csrf(41978)</ref>
    </refs>
    <vuln_soft>
      <prod name="e-publish" vendor="e-publish_project">
        <vers num="5.x-1.0" edition=":~~~drupal~~"/>
        <vers num="5.x-1.x" edition="dev:~~~drupal~~"/>
        <vers num="6.x-1.x" edition="dev:~~~drupal~~"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1982" seq="2008-1982" published="2008-04-27" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in ss_load.php in the Spreadsheet (wpSS) 0.6 and earlier plugin for WordPress allows remote attackers to execute arbitrary SQL commands via the ss_id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://timrohrer.com/blog/?p=120" patch="1">http://timrohrer.com/blog/?p=120</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28894">28894</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1344/references">ADV-2008-1344</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41968">spreadsheet-ssload-sql-injection(41968)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5486">5486</ref>
    </refs>
    <vuln_soft>
      <prod name="wpss" vendor="wordpress">
        <vers num="0.6" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1983" seq="2008-1983" published="2008-04-27" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Advanced Electron Forum (AEF) 1.0.6 allows remote attackers to inject arbitrary web script or HTML via the beg parameter in a members action to index.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28865">28865</ref>
      <ref source="MISC" url="http://www.z0rlu.ownspace.org/index.php?/archives/60-Advanced-Electron-Forum-AEF-1.0.6-XSS.html">http://www.z0rlu.ownspace.org/index.php?/archives/60-Advanced-Electron-Forum-AEF-1.0.6-XSS.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41951">advancedelectronforum-beg-xss(41951)</ref>
    </refs>
    <vuln_soft>
      <prod name="advanced_electron_forum" vendor="anelectron">
        <vers num="1.0.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1984" seq="2008-1984" published="2008-04-27" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">The eTrust Common Services (Transport) Daemon (eCSqdmn) in CA Secure Content Manager 8.0.28000.511 and earlier allows remote attackers to cause a denial of service (crash or CPU consumption) via a malformed packet to TCP port 1882.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/ecsqdamn-adv.txt">http://aluigi.altervista.org/adv/ecsqdamn-adv.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28888">28888</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019913">1019913</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1355/references">ADV-2008-1355</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41890">ca-scm-ecsqdmn-dos(41890)</ref>
    </refs>
    <vuln_soft>
      <prod name="secure_content_manager" vendor="ca">
        <vers num="8.0.28000.511" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1985" seq="2008-1985" published="2008-04-27" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in base.php in DigitalHive 2.0 RC2 allows remote attackers to inject arbitrary web script or HTML via the mt parameter, possibly related to membres.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28918">28918</ref>
      <ref source="MISC" url="http://www.z0rlu.ownspace.org/index.php?/archives/65-hive-v2.RC2-XSS.html">http://www.z0rlu.ownspace.org/index.php?/archives/65-hive-v2.RC2-XSS.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42006">digitalhive-base-xss(42006)</ref>
    </refs>
    <vuln_soft>
      <prod name="digitalhive" vendor="digital_hive">
        <vers num="2.0" edition="rc2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1986" seq="2008-1986" published="2008-04-27" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in liste_article.php in Blog Pixel Motion (aka PixelMotion) allows remote attackers to inject arbitrary web script or HTML via the jours parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28920">28920</ref>
      <ref source="MISC" url="http://www.z0rlu.ownspace.org/index.php?/archives/63-Blog-PixelMotion-XSS.html">http://www.z0rlu.ownspace.org/index.php?/archives/63-Blog-PixelMotion-XSS.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42011">blogpixelmotion-listearticle-xss(42011)</ref>
    </refs>
    <vuln_soft>
      <prod name="pixel_motion_blog" vendor="pixel_motion">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1987" seq="2008-1987" published="2008-04-27" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in search.php in EncapsGallery 2.0.2 allows remote attackers to inject arbitrary web script or HTML via the search parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.encaps.net/software/encapsgallery/download-image-album.php" patch="1">http://www.encaps.net/software/encapsgallery/download-image-album.php</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28887">28887</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41948">encapsgallery-search-xss(41948)</ref>
    </refs>
    <vuln_soft>
      <prod name="encapsgallery" vendor="encaps">
        <vers num="2.0.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1988" seq="2008-1988" published="2008-04-27" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="9.0" CVSS_base_score="9.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unrestricted file upload vulnerability in the file_upload function in core/misc.class.php in EncapsGallery 2.0.2 allows remote authenticated administrators to upload and execute arbitrary PHP files by uploading a file with an executable extension, then accessing it via a direct request to the file in the rwx_gallery directory.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28887">28887</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41949">encapsgallery-miscclass-file-upload(41949)</ref>
    </refs>
    <vuln_soft>
      <prod name="encapsgallery" vendor="encaps">
        <vers num="2.0.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1989" seq="2008-1989" published="2008-04-27" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in 123flashchat.php in the 123 Flash Chat 6.8.0 module for e107, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the e107path parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28828">28828</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41867">123flashchat-e107path-file-include(41867)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5459">5459</ref>
    </refs>
    <vuln_soft>
      <prod name="123_flash_chat_module" vendor="123flashchat">
        <vers num="6.8.0"/>
      </prod>
      <prod name="e107" vendor="e107">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1990" seq="2008-1990" published="2008-04-27" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in Acidcat CMS 3.4.1 allow remote attackers to execute arbitrary SQL commands via the (1) cID parameter to default.asp and the (2) username parameter to main_login2.asp.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugreport.ir/index.php?/36">http://bugreport.ir/index.php?/36</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3842">3842</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491129/100/0/threaded">20080420 Acidcat CMS Multiple Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28868">28868</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41918">acidcat-default-sql-injection(41918)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5478">5478</ref>
    </refs>
    <vuln_soft>
      <prod name="acidcat_cms" vendor="acidcat">
        <vers num="3.4.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1991" seq="2008-1991" published="2008-04-27" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in admin_colors_swatch.asp in Acidcat CMS 3.4.1 allows remote attackers to inject arbitrary web script or HTML via the field parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugreport.ir/index.php?/36">http://bugreport.ir/index.php?/36</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3842">3842</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491129/100/0/threaded">20080420 Acidcat CMS Multiple Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28868">28868</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41919">acidcat-admincolorsswatch-xss(41919)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5478">5478</ref>
    </refs>
    <vuln_soft>
      <prod name="acidcat_cms" vendor="acidcat">
        <vers num="3.4.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1992" seq="2008-1992" published="2008-04-27" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Acidcat CMS 3.4.1 does not properly restrict access to (1) default_mail_aspemail.asp, (2) default_mail_cdosys.asp or (3) default_mail_jmail.asp, which allows remote attackers to bypass restrictions and relay email messages with modified From, FromName, and To fields.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugreport.ir/index.php?/36">http://bugreport.ir/index.php?/36</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3842">3842</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491129/100/0/threaded">20080420 Acidcat CMS Multiple Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28868">28868</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41921">acidcat-email-security-bypass(41921)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5478">5478</ref>
    </refs>
    <vuln_soft>
      <prod name="acidcat_cms" vendor="acidcat">
        <vers num="3.4.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1993" seq="2008-1993" published="2008-04-27" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Acidcat CMS 3.4.1 does not restrict access to the FCKEditor component, which allows remote attackers to upload arbitrary files.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugreport.ir/index.php?/36">http://bugreport.ir/index.php?/36</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3842">3842</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491129/100/0/threaded">20080420 Acidcat CMS Multiple Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28868">28868</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41922">acidcat-fckeditor-file-upload(41922)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5478">5478</ref>
    </refs>
    <vuln_soft>
      <prod name="acidcat_cms" vendor="acidcat">
        <vers num="3.4.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1994" seq="2008-1994" published="2008-04-27" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple stack-based buffer overflows in (a) acon.c, (b) menu.c, and (c) child.c in Acon 1.0.5-5 through 1.0.5-7 allow local users to execute arbitrary code via (1) a long HOME environment variable or (2) a large number of terminal columns.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=475733">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=475733</ref>
      <ref source="MISC" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476603">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476603</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28862">28862</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41915">acon-home-bo(41915)</ref>
    </refs>
    <vuln_soft>
      <prod name="acon" vendor="ahmed_abdel-hamid_mohamed">
        <vers num="1.0.5-5"/>
        <vers num="1.0.5-6"/>
        <vers num="1.0.5-7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1995" seq="2008-1995" published="2008-04-28" modified="2011-03-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Sun Java System Directory Proxy Server 6.0, 6.1, and 6.2 classifies a connection using the "bind-dn" criteria, which can cause an incorrect application of policy and allows remote attackers to bypass intended access restrictions for the server.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-235381-1">235381</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28941">28941</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019925">1019925</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1374/references">ADV-2008-1374</ref>
    </refs>
    <vuln_soft>
      <prod name="java_system_directory_server" vendor="sun">
        <vers num="6.0"/>
        <vers num="6.1"/>
        <vers num="6.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1996" seq="2008-1996" published="2008-04-28" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">licq before 1.3.6 allows remote attackers to cause a denial of service (file-descriptor exhaustion and application crash) via a large number of connections.</descript>
      <descript source="nvd">More information located: http://www.securityfocus.com/bid/28679/info</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html">SUSE-SR:2008:010</ref>
      <ref source="BUGTRAQ" url="http://seclists.org/bugtraq/2008/Apr/0100.html">20080410 Re: licq remote DoS?</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3851">3851</ref>
      <ref source="CONFIRM" url="http://www.licq.org/changeset/6146">http://www.licq.org/changeset/6146</ref>
      <ref source="CONFIRM" url="http://www.licq.org/ticket/1623">http://www.licq.org/ticket/1623</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:159">MDVSA-2008:159</ref>
      <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/04/25/1">[oss-security] 20080425 CVE request: licq denial of service</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490563">20080408 licq remote DoS?</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490717">20080410 Re: Re: licq remote DoS?</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28679">28679</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1446/references">ADV-2008-1446</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41732">licq-connections-dos(41732)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00186.html">FEDORA-2008-3812</ref>
    </refs>
    <vuln_soft>
      <prod name="licq" vendor="licq">
        <vers num="0.61"/>
        <vers num="0.71"/>
        <vers num="0.75"/>
        <vers num="0.75.1"/>
        <vers num="0.75.2"/>
        <vers num="0.75.3"/>
        <vers num="0.75.3a"/>
        <vers num="0.75_991219"/>
        <vers num="0.76"/>
        <vers num="0.80"/>
        <vers num="0.81"/>
        <vers num="0.84a"/>
        <vers num="0.84b"/>
        <vers num="0.85"/>
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.4"/>
        <vers num="1.2"/>
        <vers num="1.2.3"/>
        <vers num="1.2.4"/>
        <vers num="1.2.6"/>
        <vers num="1.2.7"/>
        <vers num="1.3.0"/>
        <vers num="1.3.0_pre"/>
        <vers num="1.3.2"/>
        <vers num="1.3.2_rc"/>
        <vers num="1.3.4"/>
        <vers num="1.3.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1997" seq="2008-1997" published="2008-04-28" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.0" CVSS_base_score="9.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the ADMIN_SP_C2 procedure in IBM DB2 8 before FP16, 9.1 before FP4a, and 9.5 before FP1 allows remote authenticated users to execute arbitrary code via unknown vectors. NOTE: the ADMIN_SP_C issue is already covered by CVE-2008-0699.</descript>
      <descript source="nvd">IBM link requires login credentials.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3841">3841</ref>
      <ref source="MISC" url="http://www.appsecinc.com/resources/alerts/db2/2008-02.shtml">http://www.appsecinc.com/resources/alerts/db2/2008-02.shtml</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491075/100/0/threaded">20080418 Team SHATTER Security Advisory: IBM DB2 UDB Arbitrary code execution in ADMIN_SP_C/ADMIN_SP_C2 procedures</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/docview.wss?uid=swg1IZ06972">IZ06972</ref>
    </refs>
    <vuln_soft>
      <prod name="db2_server" vendor="ibm">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1998" seq="2008-1998" published="2008-04-28" modified="2018-10-31" severity="High" CVSS_version="2.0" CVSS_score="8.5" CVSS_base_score="8.5" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="6.8" CVSS_vector="(AV:N/AC:M/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The NNSTAT (aka SYSPROC.NNSTAT) procedure in IBM DB2 8 before FP16, 9.1 before FP4a, and 9.5 before FP1 on Windows allows remote authenticated users to overwrite arbitrary files via the log file parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3840" adv="1">3840</ref>
      <ref source="MISC" url="http://www.appsecinc.com/resources/alerts/db2/2008-03.shtml" adv="1">http://www.appsecinc.com/resources/alerts/db2/2008-03.shtml</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491073/100/0/threaded" adv="1">20080418 Team SHATTER Security Advisory: IBM DB2 UDB Arbitrary file overwrite in SYSPROC.NNSTAT procedure</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28836" adv="1">28836</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/docview.wss?uid=swg1IZ06976" adv="1">IZ06976</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/docview.wss?uid=swg1IZ06977" adv="1">IZ06977</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/docview.wss?uid=swg1IZ10776" adv="1">IZ10776</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41960" adv="1">ibm-db2-nnstat-file-overwrite(41960)</ref>
    </refs>
    <vuln_soft>
      <prod name="db2" vendor="ibm">
        <vers num="8.0" edition="fp1"/>
        <vers num="8.0" edition="fp10"/>
        <vers num="8.0" edition="fp11"/>
        <vers num="8.0" edition="fp12"/>
        <vers num="8.0" edition="fp13"/>
        <vers num="8.0" edition="fp14"/>
        <vers num="8.0" edition="fp15"/>
        <vers num="8.0" edition="fp2"/>
        <vers num="8.0" edition="fp3"/>
        <vers num="8.0" edition="fp4"/>
        <vers num="8.0" edition="fp5"/>
        <vers num="8.0" edition="fp6"/>
        <vers num="8.0" edition="fp6a"/>
        <vers num="8.0" edition="fp6b"/>
        <vers num="8.0" edition="fp6c"/>
        <vers num="8.0" edition="fp7"/>
        <vers num="8.0" edition="fp7a"/>
        <vers num="8.0" edition="fp7b"/>
        <vers num="8.0" edition="fp8"/>
        <vers num="8.0" edition="fp8a"/>
        <vers num="8.0" edition="fp9"/>
        <vers num="8.0" edition="fp9a"/>
        <vers num="9.1" edition="fp1"/>
        <vers num="9.1" edition="fp2"/>
        <vers num="9.1" edition="fp3"/>
        <vers num="9.1" edition="fp3a"/>
        <vers num="9.1" edition="fp4"/>
        <vers num="9.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-1999" seq="2008-1999" published="2008-04-28" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Apple Safari 3.1.1 allows remote attackers to spoof the address bar by placing many "invisible" characters in the userinfo subcomponent of the authority component of the URL (aka the user field), as demonstrated by %E3%80%80 sequences.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://es.geocities.com/jplopezy/pruebasafari3.html">http://es.geocities.com/jplopezy/pruebasafari3.html</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3833">3833</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491192/100/0/threaded">20080422 Safari 3.1.1 Multiple Vulnerabilities for windows</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1347">ADV-2008-1347</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41981">apple-safari-user-addressbar-spoofing(41981)</ref>
    </refs>
    <vuln_soft>
      <prod name="safari" vendor="apple">
        <vers num="3.1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2000" seq="2008-2000" published="2008-04-28" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Apple Safari 3.1.1 allows remote attackers to cause a denial of service (application crash) via JavaScript code that calls document.write in an infinite loop.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://es.geocities.com/jplopezy/pruebasafari3.html">http://es.geocities.com/jplopezy/pruebasafari3.html</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3833">3833</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491192/100/0/threaded">20080422 Safari 3.1.1 Multiple Vulnerabilities for windows</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1347">ADV-2008-1347</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41985">apple-safari-documentwrite-dos(41985)</ref>
    </refs>
    <vuln_soft>
      <prod name="safari" vendor="apple">
        <vers num="3.1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2001" seq="2008-2001" published="2008-04-28" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Apple Safari 3.1.1 allows remote attackers to cause a denial of service (application crash) via a file:///%E2 link that triggers an out-of-bounds access, possibly due to a NULL pointer dereference.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://es.geocities.com/jplopezy/pruebasafari3.html">http://es.geocities.com/jplopezy/pruebasafari3.html</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3833">3833</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491192/100/0/threaded">20080422 Safari 3.1.1 Multiple Vulnerabilities for windows</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1347">ADV-2008-1347</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41984">apple-safari-file-dos(41984)</ref>
    </refs>
    <vuln_soft>
      <prod name="safari" vendor="apple">
        <vers num="3.1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2002" seq="2008-2002" published="2008-04-28" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="7.8" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:C)">
    <desc>
      <descript source="cve">Multiple cross-site request forgery (CSRF) vulnerabilities on Motorola Surfboard with software SB5100-2.3.3.0-SCM00-NOSH allow remote attackers to (1) cause a denial of service (device reboot) via the "Restart Cable Modem" value in the BUTTON_INPUT parameter to configdata.html, and (2) cause a denial of service (hard reset) via the "Reset All Defaults" value in the BUTTON_INPUT parameter to configdata.html.</descript>
    </desc>
    <loss_types>
      <avail/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3839">3839</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/643049">VU#643049</ref>
      <ref source="MISC" url="http://www.rooksecurity.com/blog/?p=4">http://www.rooksecurity.com/blog/?p=4</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491143/100/0/threaded">20080418 Sea-Surfing on the Motorola Surfboard</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1390/references">ADV-2008-1390</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42091">surfboard-configdata-csrf(42091)</ref>
    </refs>
    <vuln_soft>
      <prod name="surfboard" vendor="motorola">
        <vers num="sb5100"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2003" seq="2008-2003" published="2008-04-28" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">BadBlue 2.72 Personal Edition stores multiple programs in the web document root with insufficient access control, which allows remote attackers to (1) cause a denial of service via multiple invocations of uninst.exe, and have an unknown impact via (2) badblue.exe and (3) dyndns.exe.  NOTE: this can be leveraged for arbitrary remote code execution in conjunction with CVE-2007-6378.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3832">3832</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491282/100/0/threaded">20080424 DDIVRT-2008-11 BadBlue uninst.exe DoS</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42090">badblue-multiple-weak-security(42090)</ref>
    </refs>
    <vuln_soft>
      <prod name="badblue" vendor="badblue">
        <vers num="2.72" edition=":personal"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2004" seq="2008-2004" published="2008-05-12" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.9" CVSS_base_score="4.9" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:N/A:N)">
    <desc>
      <descript source="cve">The drive_init function in QEMU 0.9.1 determines the format of a raw disk image based on the header, which allows local guest users to read arbitrary files on the host by modifying the header to identify a different format, which is used when the guest is restarted.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MLIST" url="http://lists.gnu.org/archive/html/qemu-devel/2008-04/msg00675.html">[Qemu-devel] 20080428 [4277] add format= to drive options (CVE-2008-2004)</ref>
      <ref source="CONFIRM" url="http://svn.savannah.gnu.org/viewvc/?view=rev&amp;root=qemu&amp;revision=4277">http://svn.savannah.gnu.org/viewvc/?view=rev&amp;root=qemu&amp;revision=4277</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:162">MDVSA-2008:162</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2008_13_sr.html">SUSE-SR:2008:013</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0194.html">RHSA-2008:0194</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29101">29101</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-776-1">USN-776-1</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42268">qemu-driveinit-security-bypass(42268)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11021">oval:org.mitre.oval:def:11021</ref>
    </refs>
    <vuln_soft>
      <prod name="qemu" vendor="qemu">
        <vers num="0.9.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2005" seq="2008-2005" published="2008-05-06" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The SuiteLink Service (aka slssvc.exe) in WonderWare SuiteLink before 2.0 Patch 01, as used in WonderWare InTouch 8.0, allows remote attackers to cause a denial of service (NULL pointer dereference and service shutdown) and possibly execute arbitrary code via a large length value in a Registration packet to TCP port 5413, which causes a memory allocation failure.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.coresecurity.com/?action=item&amp;id=2187">http://www.coresecurity.com/?action=item&amp;id=2187</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/596268">VU#596268</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491623/100/0/threaded">20080505 CORE-2008-0129 - Wonderware SuiteLink Denial of Service vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28974">28974</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019966">1019966</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42221">suitelinkservice-slssvc-dos(42221)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/6474">6474</ref>
    </refs>
    <vuln_soft>
      <prod name="intouch" vendor="wonderware">
        <vers num="8.0"/>
      </prod>
      <prod name="suitelink" vendor="wonderware">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2006" seq="2008-2006" published="2008-05-22" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Apple iCal 3.0.1 on Mac OS X allows remote CalDAV servers, and user-assisted remote attackers, to cause a denial of service (NULL pointer dereference and application crash) or possibly execute arbitrary code via a .ics file containing (1) a large 16-bit integer on a TRIGGER line, or (2) a large integer in a COUNT field on an RRULE line.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3901">3901</ref>
      <ref source="MISC" url="http://www.coresecurity.com/?action=item&amp;id=2219">http://www.coresecurity.com/?action=item&amp;id=2219</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492414/100/0/threaded">20080521 CORE-2008-0126: Multiple vulnerabilities in iCal</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492638/100/100/threaded">20080527 Re: CORE-2008-0126: Multiple vulnerabilities in iCal</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492682/100/0/threaded">20080528 Re: CORE-2008-0126: Multiple vulnerabilities in iCal</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28629">28629</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28632">28632</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020094">1020094</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1601">ADV-2008-1601</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42569">ical-trigger-dos(42569)</ref>
    </refs>
    <vuln_soft>
      <prod name="ical" vendor="apple">
        <vers num="3.0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2007" seq="2008-2007" published="2008-05-22" modified="2008-06-12" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2008-1035.  Reason: This candidate is a reservation duplicate of CVE-2008-1035.  Notes: All CVE users should reference CVE-2008-1035 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2008-2008" seq="2008-2008" published="2008-04-29" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the Display Names message feature in Cerulean Studios Trillian Basic and Pro 3.1.9.0 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a long nickname in an MSN protocol message.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3849">3849</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491281/100/0/threaded">20080424 Trillian 3.1 basic nick crash</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28925">28925</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1368/references">ADV-2008-1368</ref>
    </refs>
    <vuln_soft>
      <prod name="trillian" vendor="cerulean_studios">
        <vers num="3.1.9.0" edition=":basic"/>
        <vers num="3.1.9.0" edition=":pro"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2009" seq="2008-2009" published="2008-05-16" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Xiph.org libvorbis before 1.0 does not properly check for underpopulated Huffman trees, which allows remote attackers to cause a denial of service (crash) via a crafted OGG file that triggers memory corruption during execution of the _make_decode_tree function.</descript>
      <descript source="nvd">Per http://svn.xiph.org/trunk/vorbis/CHANGES, 1.0 is the first stable release of libvorbis.  No version of libvorbis before 1.0 has been confirmed at this time.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0271.html">RHSA-2008:0271</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020029">1020029</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/USN-861-1">USN-861-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1510/references">ADV-2008-1510</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=444443">https://bugzilla.redhat.com/show_bug.cgi?id=444443</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42521">libvorbis-makedecodetree-dos(42521)</ref>
    </refs>
    <vuln_soft>
      <prod name="libvorbis" vendor="xiph">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2010" seq="2008-2010" published="2008-04-29" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Apple QuickTime Player on Windows XP SP2 and Vista SP1 allows remote attackers to execute arbitrary code via a crafted QuickTime media file.  NOTE: as of 20080429, the only disclosure is a vague pre-advisory with no actionable information. However, because it is from a well-known researcher, it is being assigned a CVE identifier for tracking purposes.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.gnucitizen.org/blog/quicktime-0day-for-vista-and-xp/">http://www.gnucitizen.org/blog/quicktime-0day-for-vista-and-xp/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28959">28959</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019950">1019950</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42098">quicktime-unspecifiedremote-code-execution(42098)</ref>
    </refs>
    <vuln_soft>
      <prod name="quicktime" vendor="apple">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2011" seq="2008-2011" published="2008-04-29" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the National Rail Enquiries Live Departure Boards gadget before 1.1 allows remote National Rail Enquiries servers or man-in-the-middle attackers to inject arbitrary web script or HTML, and execute arbitrary code, via a response body, as demonstrated by a SCRIPT element that references a vbscript: URI.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.mwrinfosecurity.com/news/1690.html">http://www.mwrinfosecurity.com/news/1690.html</ref>
      <ref source="MISC" url="http://www.mwrinfosecurity.com/publications/mwri_national-rail-enquiries-gadget-advisory_2008-04-24.pdf" patch="1">http://www.mwrinfosecurity.com/publications/mwri_national-rail-enquiries-gadget-advisory_2008-04-24.pdf</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28933">28933</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42043">nationalrail-gadget-code-execution(42043)</ref>
    </refs>
    <vuln_soft>
      <prod name="national_rail_enquiries_live_departure_boards" vendor="national_rail_enquiries">
        <vers num="1.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2012" seq="2008-2012" published="2008-04-29" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the PostSchedule 1.0 module for PostNuke allows remote attackers to execute arbitrary SQL commands via the eid parameter in an event action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28931">28931</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42010">postschedule-index-sql-injection(42010)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5495">5495</ref>
    </refs>
    <vuln_soft>
      <prod name="postschedule" vendor="postnuke_software_foundation">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2013" seq="2008-2013" published="2008-04-29" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the pnFlashGames 1.5 through 2.5 module for PostNuke, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the id parameter in a display action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28948">28948</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42019">pnflashgames-id-sql-injection(42019)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5500">5500</ref>
    </refs>
    <vuln_soft>
      <prod name="pnflashgames" vendor="pnflashgames">
        <vers num="1.5"/>
        <vers num="2.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2014" seq="2008-2014" published="2008-04-29" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Mozilla Firefox 3.0 beta 5 allows remote attackers to cause a denial of service (application crash) via JavaScript code that calls document.write in an infinite loop.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3835">3835</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491196/100/0/threaded">20080422 Firefox 3.0 beta 5 crash</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491197/100/0/threaded">20080422 Re: Firefox 3.0 beta 5 crash</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491354/100/0/threaded">20080422 Re: Firefox 3.0 beta 5 crash (Slightly unrelated)</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491355/100/0/threaded">20080423 Re: Firefox 3.0 beta 5 crash</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42154">firefox-documentwrite-dos(42154)</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="3.0" edition="beta5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2015" seq="2008-2015" published="2008-04-29" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple absolute path traversal vulnerabilities in certain ActiveX controls in WatchFire AppScan 7.0 allow remote attackers to create or overwrite arbitrary files via a full pathname in the argument to the (1) CompactSave and (2) SaveSession method in one control, and the (3) saveRecordedExploreToFile method in a different control.  NOTE: this can be leveraged for code execution by writing to a Startup folder.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28940">28940</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019948">1019948</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42077">appscan-activex-file-overwrite(42077)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5496">5496</ref>
    </refs>
    <vuln_soft>
      <prod name="appscan" vendor="watchfire">
        <vers num="7.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2016" seq="2008-2016" published="2008-04-29" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in Chilek Content Management System (aka ChiCoMaS) 2.0.4 allows remote attackers to execute arbitrary PHP code via a URL in the lang parameter to the default URI under install/.  NOTE: this can also be leveraged to include and execute arbitrary local files via directory traversal sequences.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3837">3837</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491369/100/0/threaded">20080427 bug report</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42144">chicomas-multiple-file-include(42144)</ref>
    </refs>
    <vuln_soft>
      <prod name="chicomas" vendor="chilkat_software">
        <vers num="2.0.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2017" seq="2008-2017" published="2008-04-29" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in Chilek Content Management System (aka ChiCoMaS) 2.0.4 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the operation parameter to the default URI under install/.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3837">3837</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491369/100/0/threaded">20080427 bug report</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42144">chicomas-multiple-file-include(42144)</ref>
    </refs>
    <vuln_soft>
      <prod name="chicomas" vendor="chilkat_software">
        <vers num="2.0.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2018" seq="2008-2018" published="2008-04-29" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.0" CVSS_base_score="4.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The AssignUser function in template.class.php in PHPizabi 0.848b C1 HFP3 performs unsafe macro expansions on strings delimited by '{' and '}' characters, which allows remote authenticated users to obtain sensitive information via a comment containing a macro, as demonstrated by a "{user.password}" comment in the profile of the admin user.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28954">28954</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42143">phpizabi-templateclass-info-disclosure(42143)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5506">5506</ref>
    </refs>
    <vuln_soft>
      <prod name="phpizabi" vendor="phpizabi">
        <vers num="0.848b"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2019" seq="2008-2019" published="2008-04-29" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Simple Machines Forum (SMF), probably 1.1.4, relies on "randomly generated static" to hinder brute-force attacks on the WAV file (aka audio) CAPTCHA, which allows remote attackers to pass the CAPTCHA test via an automated attack that considers Hamming distances.  NOTE: this issue reportedly exists because of an insufficient fix for CVE-2007-3308.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3836">3836</ref>
      <ref source="MISC" url="http://www.rooksecurity.com/blog/?p=6">http://www.rooksecurity.com/blog/?p=6</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491128/100/0/threaded">20080419 Deciphering the Simple Machines Forum audio Captcha</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28866">28866</ref>
      <ref source="CONFIRM" url="http://www.simplemachines.org/community/index.php?P=c3696c2022b54fa50c5f341bf5710aa3&amp;topic=236816.0">http://www.simplemachines.org/community/index.php?P=c3696c2022b54fa50c5f341bf5710aa3&amp;topic=236816.0</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42150">smf-captcha-weak-security(42150)</ref>
    </refs>
    <vuln_soft>
      <prod name="smf" vendor="simple_machines">
        <vers num="1.1.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2020" seq="2008-2020" published="2008-04-29" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The CAPTCHA implementation as used in (1) Francisco Burzi PHP-Nuke 7.0 and 8.1, (2) my123tkShop e-Commerce-Suite (aka 123tkShop) 0.9.1, (3) phpMyBitTorrent 1.2.2, (4) TorrentFlux 2.3, (5) e107 0.7.11, (6) WebZE 0.5.9, (7) Open Media Collectors Database (aka OpenDb) 1.5.0b4, and (8) Labgab 1.1 uses a code_bg.jpg background image and the PHP ImageString function in a way that produces an insufficient number of different images, which allows remote attackers to pass the CAPTCHA test via an automated attack using a table of all possible image checksums and their corresponding digit strings.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3834">3834</ref>
      <ref source="MISC" url="http://www.rooksecurity.com/blog/?p=6">http://www.rooksecurity.com/blog/?p=6</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491127/100/0/threaded">20080419 Deciphering the PHP-Nuke Capthca</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28877">28877</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42152">captcha-imagestring-codebg-weak-security(42152)</ref>
    </refs>
    <vuln_soft>
      <prod name="e107" vendor="e107">
        <vers num="0.7.11"/>
      </prod>
      <prod name="labgab" vendor="labgab">
        <vers num="1.1"/>
      </prod>
      <prod name="e-commerce-suite" vendor="my123tkshop">
        <vers num="0.9.1"/>
      </prod>
      <prod name="opendb" vendor="opendb">
        <vers num="1.5.0b4"/>
      </prod>
      <prod name="php-nuke" vendor="php-nuke">
        <vers num="8.1"/>
      </prod>
      <prod name="phpmybittorrent" vendor="phpmybittorrent">
        <vers num="1.2.2"/>
      </prod>
      <prod name="php-nuke" vendor="phpnuke">
        <vers num="7.0"/>
      </prod>
      <prod name="torrentflux" vendor="torrentflux">
        <vers num="2.3"/>
      </prod>
      <prod name="webze" vendor="webze">
        <vers num="0.5.9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2021" seq="2008-2021" published="2008-04-30" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in Lhaplus before 1.57 allows remote attackers to execute arbitrary code via a long comment field in a ZOO archive.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="JVN" url="http://jvn.jp/jp/JVN%2374468481/index.html">JVN#74468481</ref>
      <ref source="MISC" url="http://www.fourteenforty.jp/research/advisory.cgi?FFRRA-20080428">http://www.fourteenforty.jp/research/advisory.cgi?FFRRA-20080428</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28953">28953</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1369/references">ADV-2008-1369</ref>
      <ref source="CONFIRM" url="http://www7a.biglobe.ne.jp/~schezo/">http://www7a.biglobe.ne.jp/~schezo/</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42032">lhaplus-zoo-bo(42032)</ref>
    </refs>
    <vuln_soft>
      <prod name="lhaplus" vendor="lhaplus">
        <vers num="1.56" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2022" seq="2008-2022" published="2008-04-30" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Mulatiple cross-site scripting (XSS) vulnerabilities in PD9 Software MegaBBS 2.2 allow remote attackers to inject arbitrary web script or HTML via the (1) toid parameter to send-private-message.asp and the (2) redirect parameter to admin/impersonate.asp.  NOTE: vector 2 requires authentication.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.bugreport.ir/?/37">http://www.bugreport.ir/?/37</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28961">28961</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42040">megabbs-toid-xss(42040)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42042">megabbs-impersonate-xss(42042)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5507">5507</ref>
    </refs>
    <vuln_soft>
      <prod name="megabbs" vendor="pd9_software">
        <vers num="2.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2023" seq="2008-2023" published="2008-04-30" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in PD9 Software MegaBBS 2.2 allow remote attackers to execute arbitrary SQL commands via the (1) invisible and (2) timeoffset parameters to profile/controlpanel.asp and the (3) attachmentid parameter to forums/attach-file.asp.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.bugreport.ir/?/37">http://www.bugreport.ir/?/37</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28961">28961</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42044">megabbs-multiple-sql-injection(42044)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5507">5507</ref>
    </refs>
    <vuln_soft>
      <prod name="megabbs" vendor="pd9_software">
        <vers num="2.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2024" seq="2008-2024" published="2008-04-30" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php in miniBB 2.2, and possibly earlier, when register_globals is enabled, allows remote attackers to inject arbitrary web script or HTML via the glang[] parameter in a registernew action.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.minibb.net/forums/9_5110_0.html">http://www.minibb.net/forums/9_5110_0.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28930" patch="1">28930</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42013">minibb-glang-xss(42013)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5494">5494</ref>
    </refs>
    <vuln_soft>
      <prod name="minibb" vendor="minibb">
        <vers num="2.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2025" seq="2008-2025" published="2009-04-09" modified="2009-04-18" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Apache Struts before 1.2.9-162.31.1 on SUSE Linux Enterprise (SLE) 11, before 1.2.9-108.2 on SUSE openSUSE 10.3, before 1.2.9-198.2 on SUSE openSUSE 11.0, and before 1.2.9-162.163.2 on SUSE openSUSE 11.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to "insufficient quoting of parameters."</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://download.opensuse.org/update/10.3-test/repodata/patch-struts-5872.xml" patch="1">http://download.opensuse.org/update/10.3-test/repodata/patch-struts-5872.xml</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html">SUSE-SR:2009:008</ref>
      <ref source="CONFIRM" url="http://support.novell.com/security/cve/CVE-2008-2025.html">http://support.novell.com/security/cve/CVE-2008-2025.html</ref>
      <ref source="MISC" url="https://bugzilla.novell.com/show_bug.cgi?id=385273">https://bugzilla.novell.com/show_bug.cgi?id=385273</ref>
      <ref source="MISC" url="https://launchpad.net/bugs/cve/2008-2025">https://launchpad.net/bugs/cve/2008-2025</ref>
    </refs>
    <vuln_soft>
      <prod name="struts" vendor="apache">
        <vers num="1.0.2"/>
        <vers num="1.1"/>
        <vers num="1.2.4"/>
        <vers num="1.2.7"/>
        <vers num="1.2.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2026" seq="2008-2026" published="2008-04-30" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in WebID/IISWebAgentIF.dll in RSA Authentication Agent 5.3.0.258, and other versions before 5.3.3.378, allows remote attackers to inject arbitrary web script or HTML via a URL-encoded postdata parameter.  NOTE: this is different than CVE-2005-1118, but it might be the same as CVE-2008-1470.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3848">3848</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491247/100/0/threaded">20080423 PR07-44: XSS on RSA Authentication Agent login page</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019920">1019920</ref>
    </refs>
    <vuln_soft>
      <prod name="authentication_agent" vendor="rsa">
        <vers num="5.3" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2027" seq="2008-2027" published="2008-04-30" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.8" CVSS_base_score="5.8" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Open redirect vulnerability in WebID/IISWebAgentIF.dll in RSA Authentication Agent 5.3.0.258 for Web for IIS, when accessed via certain browsers such as Mozilla Firefox, allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via an ftp URL in the url parameter to a Redirect action.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3850">3850</ref>
      <ref source="MISC" url="http://www.procheckup.com/Vulnerability_PR07-43.php">http://www.procheckup.com/Vulnerability_PR07-43.php</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491237/100/0/threaded">20080423 PR07-43: Cross-domain redirect on RSA Authentication Agent</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28907">28907</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42184">rsa-agent-iiswebagentif-security-bypass(42184)</ref>
    </refs>
    <vuln_soft>
      <prod name="authentication_agent" vendor="rsa">
        <vers num="5.3.0.258"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2028" seq="2008-2028" published="2008-04-30" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">miniBB 2.2, and possibly earlier, when register_globals is enabled, allows remote attackers to obtain the full path via a direct request to the glang parameter in a registernew action to index.php, which leaks the path in an error message.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.minibb.net/forums/9_5110_0.html" patch="1">http://www.minibb.net/forums/9_5110_0.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42012">minibb-bbfuncregusr-info-disclosure(42012)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5494">5494</ref>
    </refs>
    <vuln_soft>
      <prod name="minibb" vendor="minibb">
        <vers num="2.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2029" seq="2008-2029" published="2008-04-30" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in (1) setup_mysql.php and (2) setup_options.php in miniBB 2.2 and possibly earlier, when register_globals is enabled, allow remote attackers to execute arbitrary SQL commands via the xtr parameter in a userinfo action to index.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.minibb.net/forums/9_5110_0.html">http://www.minibb.net/forums/9_5110_0.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28930" patch="1">28930</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42014">minibb-multiple-sql-injection(42014)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5494">5494</ref>
    </refs>
    <vuln_soft>
      <prod name="minibb" vendor="minibb">
        <vers num="2.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2030" seq="2008-2030" published="2008-04-30" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in installControl.php3 in F5 FirePass 4100 SSL VPN 5.4.2-5.5.2 and 6.0-6.2 allows remote attackers to inject arbitrary web script or HTML via the query string.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://downloads.securityfocus.com/vulnerabilities/exploits/28902.html">http://downloads.securityfocus.com/vulnerabilities/exploits/28902.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28902">28902</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42078">firepass-installcontrol-xss(42078)</ref>
    </refs>
    <vuln_soft>
      <prod name="firepass_4100" vendor="f5">
        <vers num=""/>
      </prod>
      <prod name="firepass_ssl_vpn" vendor="f5">
        <vers num="5.4.2"/>
        <vers num="5.5.2"/>
        <vers num="6.0"/>
        <vers num="6.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2031" seq="2008-2031" published="2008-04-30" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">VicFTPS 5.0 allows remote attackers to cause a denial of service (crash) via a crafted LIST command, which triggers a NULL pointer dereference.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28967">28967</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42074">vicftps-list-dos(42074)</ref>
    </refs>
    <vuln_soft>
      <prod name="vicftps" vendor="vicftps">
        <vers num="5.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2032" seq="2008-2032" published="2008-04-30" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The FTP service in Acritum Femitter Server 1.03 allows remote attackers to cause a denial of service (crash) by sending multiple crafted RETR commands.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28973">28973</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42075">femitterserver-ftp-dos(42075)</ref>
    </refs>
    <vuln_soft>
      <prod name="femitter_server" vendor="acritum">
        <vers num="1.03"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2033" seq="2008-2033" published="2008-04-30" modified="2008-06-03" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2008-1381.  Reason: This candidate is a duplicate of CVE-2008-1381.  Notes: All CVE users should reference CVE-2008-1381 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2008-2034" seq="2008-2034" published="2008-04-30" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in wp-download_monitor/download.php in the Download Monitor 2.0.6 plugin for WordPress allows remote attackers to execute arbitrary SQL commands via the id parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28975">28975</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42094">downloadmonitor-id-sql-injection(42094)</ref>
    </refs>
    <vuln_soft>
      <prod name="download_monitor_plugin" vendor="wordpress">
        <vers num="2.0.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2035" seq="2008-2035" published="2008-04-30" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the Bluemoon, Inc. (1) BackPack 0.91 and earlier, (2) BmSurvey 0.84 and earlier, (3) newbb_fileup 1.83 and earlier, (4) News_embed (news_fileup) 1.44 and earlier, and (5) PopnupBlog 3.19 and earlier modules for XOOPS 2.0.x, XOOPS Cube 2.1, and ImpressCMS allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="JVN" url="http://jvn.jp/jp/JVN%2331351020/index.html">JVN#31351020</ref>
      <ref source="CONFIRM" url="http://www.bluemooninc.biz/~xoops/modules/news/article.php?storyid=69">http://www.bluemooninc.biz/~xoops/modules/news/article.php?storyid=69</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28966">28966</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42072">bluemoon-unspecified-xss(42072)</ref>
    </refs>
    <vuln_soft>
      <prod name="backpack" vendor="bluemoon">
        <vers num="0.91" prev="1"/>
      </prod>
      <prod name="bmsurvey" vendor="bluemoon">
        <vers num="0.84" prev="1"/>
      </prod>
      <prod name="newbb_fileup" vendor="bluemoon">
        <vers num="1.83" prev="1"/>
      </prod>
      <prod name="news_fileup" vendor="bluemoon">
        <vers num="1.44" prev="1"/>
      </prod>
      <prod name="popnupblog" vendor="bluemoon">
        <vers num="3.19" prev="1"/>
      </prod>
      <prod name="xoops" vendor="xoops">
        <vers num="2.0"/>
      </prod>
      <prod name="xoops_cube" vendor="xoops">
        <vers num="2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2036" seq="2008-2036" published="2008-04-30" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in dream4 Koobi Pro 6.25 allows remote attackers to execute arbitrary SQL commands via the poll_id parameter in a poll action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3843">3843</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490889/100/0/threaded">20080415 Koobi Pro 6.25 poll Remote SQL Injection Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28779">28779</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1242/references">ADV-2008-1242</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41817">koobipro-pollid-sql-injection(41817)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5448">5448</ref>
    </refs>
    <vuln_soft>
      <prod name="koobi" vendor="dream4">
        <vers num="6.25" edition="pro"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2037" seq="2008-2037" published="2008-04-30" modified="2017-08-07" severity="Low" CVSS_version="2.0" CVSS_score="3.5" CVSS_base_score="3.5" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="6.8" CVSS_vector="(AV:N/AC:M/Au:S/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in EditeurScripts EsContacts 1.0 allow remote authenticated users to inject arbitrary web script or HTML via the msg parameter to (1) login.php, (2) importer.php, (3) add_groupe.php, (4) contacts.php, (5) groupes.php, and (6) search.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28825">28825</ref>
      <ref source="MISC" url="http://www.z0rlu.ownspace.org/index.php?/archives/50-EScontacts-XSS.html">http://www.z0rlu.ownspace.org/index.php?/archives/50-EScontacts-XSS.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41879">escontacts-msg-xss(41879)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/49237">editeurscripts-login-xss(49237)</ref>
    </refs>
    <vuln_soft>
      <prod name="escontacts" vendor="editeurscripts">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2038" seq="2008-2038" published="2008-04-30" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in admin/adminindex.php in Turnkey Web Tools SunShop Shopping Cart 4.1.0 allow remote authenticated administrators to execute arbitrary SQL commands via the (1) orderby and (2) sort parameters.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28832">28832</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41882">sunshop-adminindex-sql-injection(41882)</ref>
    </refs>
    <vuln_soft>
      <prod name="sunshop_shopping_cart" vendor="turnkey_solutions">
        <vers num="4.1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2039" seq="2008-2039" published="2017-05-11" modified="2017-05-11" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2008. Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2008-2040" seq="2008-2040" published="2008-04-30" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the HTTP::getAuthUserPass function (core/common/http.cpp) in Peercast 0.1218 and gnome-peercast allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a Basic Authentication string with a long (1) username or (2) password.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=478573">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=478573</ref>
      <ref source="CONFIRM" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=478680">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=478680</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200807-11.xml">GLSA-200807-11</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1582">DSA-1582</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1583">DSA-1583</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28986">28986</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1409/references">ADV-2008-1409</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1410/references">ADV-2008-1410</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42092">peercast-httpgetauthuserpass-bo(42092)</ref>
    </refs>
    <vuln_soft>
      <prod name="peercast" vendor="peercast">
        <vers num="0.1218"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2041" seq="2008-2041" published="2008-04-30" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple unspecified vulnerabilities in eGroupWare before 1.4.004 have unspecified attack vectors and "grave" impact when the web server has write access to a directory under the web document root.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.egroupware.org/news">http://www.egroupware.org/news</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200805-04.xml">GLSA-200805-04</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28817">28817</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42141">egroupware-webserver-unspecified(42141)</ref>
    </refs>
    <vuln_soft>
      <prod name="egroupware" vendor="egroupware">
        <vers num="1.4.001"/>
        <vers num="1.4.002"/>
        <vers num="1.4.003" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2042" seq="2008-2042" published="2008-05-07" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The Javascript API in Adobe Acrobat Professional 7.0.9 and possibly 8.1.1 exposes a dangerous method, which allows remote attackers to execute arbitrary commands or trigger a buffer overflow via a crafted PDF file that invokes app.checkForUpdate with a malicious callback function.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3861">3861</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1019971">1019971</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-239286-1">239286</ref>
      <ref source="CONFIRM" url="http://www.adobe.com/support/security/bulletins/apsb08-13.html" adv="1">http://www.adobe.com/support/security/bulletins/apsb08-13.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491735/100/0/threaded">20080507 Adobe Acrobat Professional Javascript For PDF Security Feature Bypass and Memory Corruption Vulnerabilities</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1966/references">ADV-2008-1966</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42237">adobe-appcheckforupdate-code-execution(42237)</ref>
    </refs>
    <vuln_soft>
      <prod name="acrobat" vendor="adobe">
        <vers num="3.0"/>
        <vers num="3.1"/>
        <vers num="4.0"/>
        <vers num="4.0.5"/>
        <vers num="4.0.5a"/>
        <vers num="4.0.5c"/>
        <vers num="5.0"/>
        <vers num="5.0.5"/>
        <vers num="5.0.6"/>
        <vers num="5.0.10"/>
        <vers num="6.0"/>
        <vers num="6.0.1"/>
        <vers num="6.0.2"/>
        <vers num="6.0.3"/>
        <vers num="6.0.4"/>
        <vers num="6.0.5"/>
        <vers num="6.0.6"/>
        <vers num="7.0"/>
        <vers num="7.0.1"/>
        <vers num="7.0.2"/>
        <vers num="7.0.3"/>
        <vers num="7.0.4"/>
        <vers num="7.0.5"/>
        <vers num="7.0.6"/>
        <vers num="7.0.7"/>
        <vers num="7.0.8"/>
        <vers num="7.0.9"/>
        <vers num="7.1.0"/>
        <vers num="7.1.1"/>
        <vers num="7.1.2"/>
        <vers num="7.1.3"/>
        <vers num="7.1.4"/>
        <vers num="8.0"/>
        <vers num="8.1"/>
        <vers num="8.1.1" prev="1"/>
      </prod>
      <prod name="acrobat_reader" vendor="adobe">
        <vers num="3.0"/>
        <vers num="3.01"/>
        <vers num="3.02"/>
        <vers num="4.0"/>
        <vers num="4.0.5"/>
        <vers num="4.0.5a"/>
        <vers num="4.0.5c"/>
        <vers num="4.5"/>
        <vers num="5.0"/>
        <vers num="5.0.5"/>
        <vers num="5.0.6"/>
        <vers num="5.0.7"/>
        <vers num="5.0.9"/>
        <vers num="5.0.10"/>
        <vers num="5.0.11"/>
        <vers num="5.1"/>
        <vers num="6.0"/>
        <vers num="6.0.1"/>
        <vers num="6.0.2"/>
        <vers num="6.0.3"/>
        <vers num="6.0.4"/>
        <vers num="6.0.5"/>
        <vers num="6.0.6"/>
        <vers num="7.0"/>
        <vers num="7.0.1"/>
        <vers num="7.0.2"/>
        <vers num="7.0.3"/>
        <vers num="7.0.4"/>
        <vers num="7.0.5"/>
        <vers num="7.0.6"/>
        <vers num="7.0.7"/>
        <vers num="7.0.8"/>
        <vers num="7.0.9"/>
        <vers num="7.1.0"/>
        <vers num="7.1.1"/>
        <vers num="7.1.2"/>
        <vers num="7.1.3"/>
        <vers num="7.1.4"/>
        <vers num="8.0"/>
        <vers num="8.1"/>
        <vers num="8.1.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2043" seq="2008-2043" published="2008-05-01" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site request forgery (CSRF) vulnerabilities in cPanel, possibly 11.18.3 and 11.19.3, allow remote attackers to (1) execute arbitrary code via the command1 parameter to frontend/x2/cron/editcronsimple.html, and perform various administrative actions via (2) frontend/x2/sql/adddb.html, (3) frontend/x2/sql/adduser.html, and (4) frontend/x2/ftp/doaddftp.html.</descript>
      <descript source="nvd">Additional information can be found at:

http://secunia.com/advisories/30027/

http://www.frsirt.com/english/advisories/2008/1401

http://blog.cpanel.net/?p=39</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/584089">VU#584089</ref>
      <ref source="MISC" url="http://www.rooksecurity.com/blog/?p=7">http://www.rooksecurity.com/blog/?p=7</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1401/references">ADV-2008-1401</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42114">cpanel-http-csrf(42114)</ref>
    </refs>
    <vuln_soft>
      <prod name="cpanel" vendor="cpanel">
        <vers num="11.18.3"/>
        <vers num="11.19.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2044" seq="2008-2044" published="2008-05-01" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">includes/library.php in netOffice Dwins 1.3 p2 compares the demoSession variable to the 'true' string literal instead of the true boolean literal, which allows remote attackers to bypass authentication and execute arbitrary code by setting this variable to 1, as demonstrated by uploading a PHP script via an add action to projects_site/uploadfile.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://netofficedwins.sourceforge.net/modules/news/article.php?storyid=47">http://netofficedwins.sourceforge.net/modules/news/article.php?storyid=47</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3845">3845</ref>
      <ref source="MISC" url="http://sourceforge.net/forum/forum.php?forum_id=814851">http://sourceforge.net/forum/forum.php?forum_id=814851</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488958">20080229 netOffice Dwins 1.3 Remote code execution.</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491542/100/0/threaded">20080502 Re: netOffice Dwins 1.3 Remote code execution.</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28051">28051</ref>
    </refs>
    <vuln_soft>
      <prod name="dwins" vendor="netoffice">
        <vers num="1.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2045" seq="2008-2045" published="2008-05-01" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Absolute path traversal vulnerability in SugarCRM Sugar Community Edition 4.5.1 and 5.0.0 allows remote attackers to read arbitrary files via a full path in the URL parameter to modules/Feeds/Feed.php, which places the contents into a related cache file in the .cache/feeds directory.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3844">3844</ref>
      <ref source="MISC" url="http://www.security-assessment.com/files/advisories/2008-04-29_SugarCRM_local_file_disclosure.pdf">http://www.security-assessment.com/files/advisories/2008-04-29_SugarCRM_local_file_disclosure.pdf</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491417/100/0/threaded">20080429 SugarCRM Community Edition Local File Disclosure Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28981" patch="1">28981</ref>
      <ref source="CONFIRM" url="http://www.sugarcrm.com/docs/Release_Notes/CommunityEdition_ReleaseNotes_5.0d/Sugar_Release_Notes_5.0d.2.6.html">http://www.sugarcrm.com/docs/Release_Notes/CommunityEdition_ReleaseNotes_5.0d/Sugar_Release_Notes_5.0d.2.6.html</ref>
      <ref source="CONFIRM" url="http://www.sugarcrm.com/forums/showthread.php?t=31688" patch="1">http://www.sugarcrm.com/forums/showthread.php?t=31688</ref>
      <ref source="CONFIRM" url="http://www.sugarcrm.com/forums/showthread.php?t=32252" patch="1">http://www.sugarcrm.com/forums/showthread.php?t=32252</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1388/references">ADV-2008-1388</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42087">sugar-feed-information-disclosure(42087)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5521">5521</ref>
    </refs>
    <vuln_soft>
      <prod name="sugarcrm" vendor="sugarcrm">
        <vers num="4.5.1" edition=":community_edition"/>
        <vers num="5.0.0" edition=":community_edition"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2046" seq="2008-2046" published="2008-05-01" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php in Softpedia SiteXS CMS 0.1.1 Pre-Alpha allows remote attackers to inject arbitrary web script or HTML via the user parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=120950161507846&amp;w=2">20080429 XSS Attack</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28984">28984</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42093">sitexs-index-xss(42093)</ref>
    </refs>
    <vuln_soft>
      <prod name="sitexs_cms" vendor="softpedia">
        <vers num="0.1.1" edition="pre-alpha"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2047" seq="2008-2047" published="2008-05-01" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in Angelo-Emlak 1.0 allow remote attackers to execute arbitrary SQL commands via the id parameter to (1) hpz/profil.asp and (2) hpz/prodetail.asp.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28949">28949</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1385">ADV-2008-1385</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42018">angeloemlak-profil-sql-injection(42018)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5503">5503</ref>
    </refs>
    <vuln_soft>
      <prod name="angelo-emlak" vendor="aspindir">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2048" seq="2008-2048" published="2008-05-01" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in hpz/admin/Default.asp in Angelo-Emlak 1.0 allows remote attackers to inject arbitrary web script or HTML via the sayfa parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28949">28949</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1385">ADV-2008-1385</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42155">angeloemlak-deafult-xss(42155)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5503">5503</ref>
    </refs>
    <vuln_soft>
      <prod name="angelo-emlak" vendor="aspindir">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2049" seq="2008-2049" published="2008-05-01" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The POP3 server (EPSTPOP3S.EXE) 4.22 in E-Post Mail Server 4.10 allows remote attackers to obtain sensitive information via multiple crafted APOP commands for a known POP3 account, which displays the password in a POP3 error message.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://vuln.sg/epostmailserver410-en.html">http://vuln.sg/epostmailserver410-en.html</ref>
      <ref source="CONFIRM" url="http://www.e-postinc.jp/Mail_Server.html">http://www.e-postinc.jp/Mail_Server.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28951">28951</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019930">1019930</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1389/references">ADV-2008-1389</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42035">epost-pop3-information-disclosure(42035)</ref>
    </refs>
    <vuln_soft>
      <prod name="mail_server" vendor="e-post_corporation">
        <vers num="4.10"/>
        <vers num="enterprise_4.10"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2050" seq="2008-2050" published="2008-05-05" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the FastCGI SAPI (fastcgi.c) in PHP before 5.2.6 has unknown impact and attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://cvs.php.net/viewvc.cgi/php-src/sapi/cgi/fastcgi.c?r1=1.44&amp;r2=1.45&amp;diff_format=u">http://cvs.php.net/viewvc.cgi/php-src/sapi/cgi/fastcgi.c?r1=1.44&amp;r2=1.45&amp;diff_format=u</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html">APPLE-SA-2008-07-31</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html">SUSE-SR:2008:014</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200811-05.xml">GLSA-200811-05</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0176">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0176</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1572" patch="1">DSA-1572</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2009:022">MDVSA-2009:022</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2009:023">MDVSA-2009:023</ref>
      <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/05/02/2">[oss-security] 20080502 CVE Request (PHP)</ref>
      <ref source="CONFIRM" url="http://www.php.net/ChangeLog-5.php" adv="1" patch="1">http://www.php.net/ChangeLog-5.php</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492535/100/0/threaded">20080523 rPSA-2008-0176-1 php php-cgi php-imap php-mcrypt php-mysql php-mysqli php-pgsql php-soap php-xsl php5 php5-cgi php5-imap php5-mcrypt php5-mysql php5-mysqli php5-pear php5-pgsql php5-soap php5-xsl</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29009" patch="1">29009</ref>
      <ref source="SLACKWARE" url="http://www.slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.488951">SSA:2008-128-01</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-628-1">USN-628-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1412" adv="1">ADV-2008-1412</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2268" adv="1">ADV-2008-2268</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42133">php-fastcgisapi-bo(42133)</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2503">https://issues.rpath.com/browse/RPL-2503</ref>
    </refs>
    <vuln_soft>
      <prod name="php" vendor="php">
        <vers num="5.0.0" edition="beta1"/>
        <vers num="5.0.0" edition="beta2"/>
        <vers num="5.0.0" edition="beta3"/>
        <vers num="5.0.0" edition="beta4"/>
        <vers num="5.0.0" edition="rc1"/>
        <vers num="5.0.0" edition="rc2"/>
        <vers num="5.0.0" edition="rc3"/>
        <vers num="5.0.1"/>
        <vers num="5.0.2"/>
        <vers num="5.0.3"/>
        <vers num="5.0.4"/>
        <vers num="5.0.5"/>
        <vers num="5.1.0"/>
        <vers num="5.1.1"/>
        <vers num="5.1.2"/>
        <vers num="5.1.3"/>
        <vers num="5.1.4"/>
        <vers num="5.1.5"/>
        <vers num="5.1.6"/>
        <vers num="5.2.0"/>
        <vers num="5.2.1"/>
        <vers num="5.2.2"/>
        <vers num="5.2.3"/>
        <vers num="5.2.4"/>
        <vers num="5.2.5" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2051" seq="2008-2051" published="2008-05-05" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The escapeshellcmd API function in PHP before 5.2.6 has unknown impact and context-dependent attack vectors related to "incomplete multibyte chars."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html">APPLE-SA-2008-07-31</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html">SUSE-SR:2008:014</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200811-05.xml">GLSA-200811-05</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0176">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0176</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0178">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0178</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1572">DSA-1572</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1578">DSA-1578</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:125">MDVSA-2008:125</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:126">MDVSA-2008:126</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:127">MDVSA-2008:127</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:128">MDVSA-2008:128</ref>
      <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/05/02/2">[oss-security] 20080502 CVE Request (PHP)</ref>
      <ref source="CONFIRM" url="http://www.php.net/ChangeLog-5.php">http://www.php.net/ChangeLog-5.php</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0505.html">RHSA-2008:0505</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0544.html">RHSA-2008:0544</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0545.html">RHSA-2008:0545</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0546.html">RHSA-2008:0546</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0582.html">RHSA-2008:0582</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492535/100/0/threaded">20080523 rPSA-2008-0176-1 php php-cgi php-imap php-mcrypt php-mysql php-mysqli php-pgsql php-soap php-xsl php5 php5-cgi php5-imap php5-mcrypt php5-mysql php5-mysqli php5-pear php5-pgsql php5-soap php5-xsl</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492671/100/0/threaded">20080527 rPSA-2008-0178-1 php php-mysql php-pgsql</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29009">29009</ref>
      <ref source="SLACKWARE" url="http://www.slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.488951">SSA:2008-128-01</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-628-1">USN-628-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1412">ADV-2008-1412</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2268">ADV-2008-2268</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2503">https://issues.rpath.com/browse/RPL-2503</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10256">oval:org.mitre.oval:def:10256</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00773.html">FEDORA-2008-3864</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00779.html">FEDORA-2008-3606</ref>
    </refs>
    <vuln_soft>
      <prod name="php" vendor="php">
        <vers num="5.0.0" edition="beta1"/>
        <vers num="5.0.0" edition="beta2"/>
        <vers num="5.0.0" edition="beta3"/>
        <vers num="5.0.0" edition="beta4"/>
        <vers num="5.0.0" edition="rc1"/>
        <vers num="5.0.0" edition="rc2"/>
        <vers num="5.0.0" edition="rc3"/>
        <vers num="5.0.1"/>
        <vers num="5.0.2"/>
        <vers num="5.0.3"/>
        <vers num="5.0.4"/>
        <vers num="5.0.5"/>
        <vers num="5.1.0"/>
        <vers num="5.1.1"/>
        <vers num="5.1.2"/>
        <vers num="5.1.3"/>
        <vers num="5.1.4"/>
        <vers num="5.1.5"/>
        <vers num="5.1.6"/>
        <vers num="5.2.0"/>
        <vers num="5.2.1"/>
        <vers num="5.2.2"/>
        <vers num="5.2.3"/>
        <vers num="5.2.4"/>
        <vers num="5.2.5" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2052" seq="2008-2052" published="2008-05-02" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Open redirect vulnerability in redirect.php in Bitrix Site Manager 6.5 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the goto parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://holisticinfosec.org/content/view/62/45/">http://holisticinfosec.org/content/view/62/45/</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42157">bitrix-redirect-security-bypass(42157)</ref>
    </refs>
    <vuln_soft>
      <prod name="bitrix_site_manager" vendor="bitrix">
        <vers num="6.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2053" seq="2008-2053" published="2008-05-22" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="9.0" CVSS_base_score="9.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Cisco Unified Customer Voice Portal (CVP) 4.0.x before 4.0(2)_ES14, 4.1.x before 4.1(1)_ES11, and 7.x before 7.0(1) allows remote authenticated users with administrator role privileges to create, modify, or delete a superuser account.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020080" patch="1">1020080</ref>
      <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_advisory09186a008099beae.shtml" patch="1">20080521 Cisco Voice Portal Privilege Escalation Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29315">29315</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1603/references">ADV-2008-1603</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42564">cisco-cvp-unspecified-privilege-escalation(42564)</ref>
    </refs>
    <vuln_soft>
      <prod name="unified_customer_voice_portal" vendor="cisco">
        <vers num="4.0"/>
        <vers num="4.1"/>
        <vers num="7.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2054" seq="2008-2054" published="2008-05-29" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Cisco CiscoWorks Common Services 3.0.3 through 3.1.1 allows remote attackers to execute arbitrary code on a client machine via unknown vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_advisory09186a00809a1f14.shtml" adv="1" patch="1">20080528 CiscoWorks Common Services Arbitrary Code Execution Vulnerability</ref>
      <ref source="MISC" url="http://www.liquidmatrix.org/blog/2008/05/28/advisory-ciscoworks-arbitrary-code-execution-vulnerability/">http://www.liquidmatrix.org/blog/2008/05/28/advisory-ciscoworks-arbitrary-code-execution-vulnerability/</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020127">1020127</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1687/references">ADV-2008-1687</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42702">cisco-cwcs-unspecified-code-execution(42702)</ref>
    </refs>
    <vuln_soft>
      <prod name="ciscoworks_common_services" vendor="cisco">
        <vers num="3.0.3"/>
        <vers num="3.0.4"/>
        <vers num="3.0.5"/>
        <vers num="3.0.6"/>
        <vers num="3.1"/>
        <vers num="3.1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2055" seq="2008-2055" published="2008-06-04" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Cisco Adaptive Security Appliance (ASA) and Cisco PIX security appliance 7.1.x before 7.1(2)70, 7.2.x before 7.2(4), and 8.0.x before 8.0(3)10 allows remote attackers to cause a denial of service via a crafted TCP ACK packet to the device interface.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_advisory09186a00809a8354.shtml" patch="1">20080604 Multiple Vulnerabilities in Cisco PIX and Cisco ASA</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020176">1020176</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020177">1020177</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1750/references">ADV-2008-1750</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42835">cisco-asa-pix-tcpack-dos(42835)</ref>
    </refs>
    <vuln_soft>
      <prod name="adaptive_security_appliance_software" vendor="cisco">
        <vers num="7.1"/>
        <vers num="7.2.2"/>
        <vers num="8.0"/>
      </prod>
      <prod name="pix_security_appliance" vendor="cisco">
        <vers num="7.1"/>
        <vers num="7.2"/>
        <vers num="8.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2056" seq="2008-2056" published="2008-06-04" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Cisco Adaptive Security Appliance (ASA) and Cisco PIX security appliance 8.0.x before 8.0(3)9 and 8.1.x before 8.1(1)1 allows remote attackers to cause a denial of service (device reload) via a crafted Transport Layer Security (TLS) packet to the device interface.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_advisory09186a00809a8354.shtml" patch="1">20080604 Multiple Vulnerabilities in Cisco PIX and Cisco ASA</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020178">1020178</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020179">1020179</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1750/references">ADV-2008-1750</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42836">cisco-pix-asa-tls-dos(42836)</ref>
    </refs>
    <vuln_soft>
      <prod name="adaptive_security_appliance_software" vendor="cisco">
        <vers num="8.0"/>
      </prod>
      <prod name="adaptive_security_appliance" vendor="cisco">
        <vers num="8.1"/>
      </prod>
      <prod name="pix_security_appliance" vendor="cisco">
        <vers num="8.0"/>
        <vers num="8.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2057" seq="2008-2057" published="2008-06-04" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="5.4" CVSS_base_score="5.4" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">The Instant Messenger (IM) inspection engine in Cisco Adaptive Security Appliance (ASA) and Cisco PIX security appliance 7.2.x before 7.2(4), 8.0.x before 8.0(3)10, and 8.1.x before 8.1(1)2 allows remote attackers to cause a denial of service via a crafted packet.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020180">1020180</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020181">1020181</ref>
      <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_advisory09186a00809a8354.shtml" patch="1">20080604 Multiple Vulnerabilities in Cisco PIX and Cisco ASA</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1750/references">ADV-2008-1750</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42837">cisco-asa-pix-im-dos(42837)</ref>
    </refs>
    <vuln_soft>
      <prod name="adaptive_security_appliance_software" vendor="cisco">
        <vers num="7.2.2"/>
        <vers num="8.0"/>
      </prod>
      <prod name="pix_security_appliance" vendor="cisco">
        <vers num="7.2"/>
        <vers num="8.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2058" seq="2008-2058" published="2008-06-04" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Cisco Adaptive Security Appliance (ASA) and Cisco PIX security appliance 7.2.x before 7.2(3)2 and 8.0.x before 8.0(2)17 allows remote attackers to cause a denial of service (device reload) via a port scan against TCP port 443 on the device.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020182">1020182</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020183">1020183</ref>
      <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_advisory09186a00809a8354.shtml" patch="1">20080604 Multiple Vulnerabilities in Cisco PIX and Cisco ASA</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1750/references">ADV-2008-1750</ref>
    </refs>
    <vuln_soft>
      <prod name="adaptive_security_appliance_software" vendor="cisco">
        <vers num="7.2.2"/>
        <vers num="8.0"/>
      </prod>
      <prod name="pix_security_appliance" vendor="cisco">
        <vers num="7.2"/>
        <vers num="8.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2059" seq="2008-2059" published="2008-06-04" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:N/A:N)">
    <desc>
      <descript source="cve">Cisco Adaptive Security Appliance (ASA) and Cisco PIX security appliance 8.0.x before 8.0(3)9 allows remote attackers to bypass control-plane ACLs for the device via unknown vectors.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_advisory09186a00809a8354.shtml">20080604 Multiple Vulnerabilities in Cisco PIX and Cisco ASA</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020184">1020184</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020185">1020185</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1750/references">ADV-2008-1750</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42841">cisco-asa-pix-acl-weak-security(42841)</ref>
    </refs>
    <vuln_soft>
      <prod name="adaptive_security_appliance_software" vendor="cisco">
        <vers num="8.0"/>
      </prod>
      <prod name="pix_security_appliance" vendor="cisco">
        <vers num="8.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2060" seq="2008-2060" published="2008-06-18" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="7.8" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:N/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Cisco Intrusion Prevention System (IPS) 5.x before 5.1(8)E2 and 6.x before 6.0(5)E2, when inline mode and jumbo Ethernet support are enabled, allows remote attackers to cause a denial of service (panic), and possibly bypass intended restrictions on network traffic, via a "specific series of jumbo Ethernet frames."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_advisory09186a00809b3842.shtml" patch="1">20080618 Cisco Intrusion Prevention System Jumbo Frame Denial of Service</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29791">29791</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020326">1020326</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1872/references">ADV-2008-1872</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43166">cisco-ips-ethernetframes-dos(43166)</ref>
    </refs>
    <vuln_soft>
      <prod name="intrusion_prevention_system" vendor="cisco">
        <vers num="5.1"/>
        <vers num="6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2061" seq="2008-2061" published="2008-06-26" modified="2018-10-31" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">The Computer Telephony Integration (CTI) Manager service in Cisco Unified Communications Manager (CUCM) 5.x before 5.1(3c) and 6.x before 6.1(2) allows remote attackers to cause a denial of service (TSP crash) via malformed network traffic to TCP port 2748.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_advisory09186a00809b9011.shtml" adv="1" patch="1">20080625 Cisco Unified Communications Manager Denial of Service and Authentication Bypass Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29933" adv="1">29933</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020360" adv="1">1020360</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1933/references" adv="1">ADV-2008-1933</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43349" adv="1">cucm-ctimanager-dos(43349)</ref>
    </refs>
    <vuln_soft>
      <prod name="unified_communications_manager" vendor="cisco">
        <vers num="5.0"/>
        <vers num="5.1"/>
        <vers num="5.1(1)"/>
        <vers num="5.1(1b)"/>
        <vers num="5.1(1c)"/>
        <vers num="5.1(2)"/>
        <vers num="5.1(2a)"/>
        <vers num="5.1(2b)"/>
        <vers num="5.1(3)"/>
        <vers num="5.1(3a)"/>
        <vers num="6.0"/>
        <vers num="6.0(1)"/>
        <vers num="6.0(1a)"/>
        <vers num="6.0(1b)"/>
        <vers num="6.1(1)"/>
        <vers num="6.1(1a)"/>
        <vers num="6.1(1b)"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2062" seq="2008-2062" published="2008-06-26" modified="2019-07-31" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The Real-Time Information Server (RIS) Data Collector service in Cisco Unified Communications Manager (CUCM) before 4.2(3)SR4, and 4.3 before 4.3(2)SR1, allows remote attackers to bypass authentication, and obtain cluster configuration information and statistics, via a direct TCP connection to the service port, aka Bug ID CSCsq35151.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_advisory09186a00809b9011.shtml" adv="1" patch="1">20080625 Cisco Unified Communications Manager Denial of Service and Authentication Bypass Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29935" adv="1">29935</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020361" adv="1">1020361</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1933/references">ADV-2008-1933</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43355" adv="1">cucm-risdatacollector-info-disclosure(43355)</ref>
    </refs>
    <vuln_soft>
      <prod name="unified_communications_manager" vendor="cisco">
        <vers num="4.2"/>
        <vers num="4.3"/>
        <vers num="4.3(1)"/>
        <vers num="5.0"/>
        <vers num="5.1"/>
        <vers num="5.1(1)"/>
        <vers num="5.1(1b)"/>
        <vers num="5.1(1c)"/>
        <vers num="5.1(2)"/>
        <vers num="5.1(2a)"/>
        <vers num="5.1(2b)"/>
        <vers num="5.1(3)"/>
        <vers num="5.1(3a)"/>
        <vers num="6.0"/>
        <vers num="6.0(1)"/>
        <vers num="6.0(1a)"/>
        <vers num="6.0(1b)"/>
        <vers num="6.1(1)"/>
        <vers num="6.1(1a)"/>
        <vers num="6.1(1b)"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2063" seq="2008-2063" published="2008-05-02" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in browse.videos.php in Joovili 3.1 allows remote attackers to execute arbitrary SQL commands via the category parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28979">28979</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42086">joovili-category-sql-injection(42086)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5520">5520</ref>
    </refs>
    <vuln_soft>
      <prod name="joovili" vendor="joovili">
        <vers num="3.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2064" seq="2008-2064" published="2008-05-02" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple unspecified vulnerabilities in PhpGedView before 4.1.5 have unknown impact and attack vectors related to "a fundamental design flaw in the interface (API) to connect phpGedView with external programs like content management systems."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?group_id=55456&amp;release_id=595222" patch="1">http://sourceforge.net/project/shownotes.php?group_id=55456&amp;release_id=595222</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1580" patch="1">DSA-1580</ref>
      <ref source="CONFIRM" url="http://www.phpgedview.net/" adv="1" patch="1">http://www.phpgedview.net/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28978">28978</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42085">phpgedview-unspecified-code-execution(42085)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpgedview" vendor="phpgedview">
        <vers num="0.6"/>
        <vers num="0.8"/>
        <vers num="0.95"/>
        <vers num="1.0"/>
        <vers num="1.1"/>
        <vers num="1.04"/>
        <vers num="2.0"/>
        <vers num="2.12"/>
        <vers num="2.13"/>
        <vers num="2.50"/>
        <vers num="2.60"/>
        <vers num="2.65"/>
        <vers num="3.0"/>
        <vers num="3.2"/>
        <vers num="3.3.8"/>
        <vers num="4.0"/>
        <vers num="4.1.1"/>
        <vers num="4.1.3"/>
        <vers num="4.1.4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2065" seq="2008-2065" published="2008-05-02" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in jokes.php in YourFreeWorld Jokes Site Script allows remote attackers to execute arbitrary SQL commands via the catagorie parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28963">28963</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42047">jokessitescript-jokes-sql-injection(42047)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5508">5508</ref>
    </refs>
    <vuln_soft>
      <prod name="jokes_site_script" vendor="yourfreeworld">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2066" seq="2008-2066" published="2008-05-02" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in bb_admin.php in miniBB 2.2a allows remote attackers to inject arbitrary web script or HTML via the whatus parameter in a searchusers2 action.  NOTE: it was later reported that other versions before 3.0.1 are also vulnerable.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://seclists.org/fulldisclosure/2013/Jul/102">20130711 XSS and SQL Injection Vulnerabilities in MiniBB</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3846">3846</ref>
      <ref source="CONFIRM" url="http://www.minibb.com/download.php?file=minibb_update">http://www.minibb.com/download.php?file=minibb_update</ref>
      <ref source="CONFIRM" url="http://www.minibb.com/forums/news-9/minibb-3.0.1-released-stable-fixed-secured-dedicated-6059.html">http://www.minibb.com/forums/news-9/minibb-3.0.1-released-stable-fixed-secured-dedicated-6059.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491375/100/0/threaded">20080428 Minibb 2.2a XSS Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28957">28957</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/61116">61116</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42076">minibb-bbadmin-xss(42076)</ref>
      <ref source="MISC" url="https://www.mavitunasecurity.com/xss-and-sql-injection-vulnerabilities-in-minibb/">https://www.mavitunasecurity.com/xss-and-sql-injection-vulnerabilities-in-minibb/</ref>
    </refs>
    <vuln_soft>
      <prod name="minibb" vendor="minibb">
        <vers num="2.2a"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2067" seq="2008-2067" published="2008-05-02" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in bb_admin.php in miniBB 2.2a allows remote attackers to execute arbitrary SQL commands via the whatus parameter in a searchusers2 action.  NOTE: it was later reported that other versions before 3.0.1 are also vulnerable.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://seclists.org/fulldisclosure/2013/Jul/102">20130711 XSS and SQL Injection Vulnerabilities in MiniBB</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3846">3846</ref>
      <ref source="CONFIRM" url="http://www.minibb.com/download.php?file=minibb_update">http://www.minibb.com/download.php?file=minibb_update</ref>
      <ref source="CONFIRM" url="http://www.minibb.com/forums/news-9/minibb-3.0.1-released-stable-fixed-secured-dedicated-6059.html">http://www.minibb.com/forums/news-9/minibb-3.0.1-released-stable-fixed-secured-dedicated-6059.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491375/100/0/threaded">20080428 Minibb 2.2a XSS Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/61116">61116</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42270">minibb-bbadmin-sql-injection(42270)</ref>
      <ref source="MISC" url="https://www.mavitunasecurity.com/xss-and-sql-injection-vulnerabilities-in-minibb/">https://www.mavitunasecurity.com/xss-and-sql-injection-vulnerabilities-in-minibb/</ref>
    </refs>
    <vuln_soft>
      <prod name="minibb" vendor="minibb">
        <vers num="2.2a"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2068" seq="2008-2068" published="2008-05-02" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in WordPress 2.5 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://wordpress.org/development/2008/04/wordpress-251/">http://wordpress.org/development/2008/04/wordpress-251/</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42029">wordpress-unspecified-xss(42029)</ref>
    </refs>
    <vuln_soft>
      <prod name="wordpress" vendor="wordpress">
        <vers num="2.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2069" seq="2008-2069" published="2008-05-02" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in Novell GroupWise 7 allows remote attackers to cause a denial of service or execute arbitrary code via a long argument in a mailto: URI.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3847">3847</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491376/100/0/threaded">20080428 GroupWise 7.0 mailto: scheme buffer overflow</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491576/100/0/threaded">20080502 Re: GroupWise 7.0 mailto: scheme buffer overflow</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491594/100/0/threaded">20080504 Re: Re: GroupWise 7.0 mailto: scheme buffer overflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28969">28969</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019942">1019942</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1393/references">ADV-2008-1393</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42052">novell-groupwise-mailto-bo(42052)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5515">5515</ref>
    </refs>
    <vuln_soft>
      <prod name="groupwise" vendor="novell">
        <vers num="7.0" edition="sp1"/>
        <vers num="7.0" edition="sp2"/>
        <vers num="7.0" edition="sp3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2070" seq="2008-2070" published="2008-05-12" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The WHM interface 11.15.0 for cPanel 11.18 before 11.18.4 and 11.22 before 11.22.3 allows remote attackers to bypass XSS protection and inject arbitrary script or HTML via repeated, improperly-ordered "&lt;" and ">" characters in the (1) issue parameter to scripts2/knowlegebase, (2) user parameter to scripts2/changeip, (3) search parameter to scripts2/listaccts, and other unspecified vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://changelog.cpanel.net/?revision=0;tree=;treeview=;show=html;pp=25;te=1314;pg=2">http://changelog.cpanel.net/?revision=0;tree=;treeview=;show=html;pp=25;te=1314;pg=2</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2008-May/062197.html">20080509 XSS and CSRF vulnerability on cPanel 11</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3866">3866</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491864/100/0/threaded">20080509 XSS and CSRF vulnerability on Cpanel 11</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29125">29125</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1522/references">ADV-2008-1522</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42305">cpanel-whminterface-xss(42305)</ref>
    </refs>
    <vuln_soft>
      <prod name="cpanel" vendor="cpanel">
        <vers num="11.18"/>
        <vers num="11.18.1"/>
        <vers num="11.18.2"/>
        <vers num="11.18.3"/>
        <vers num="11.22"/>
        <vers num="11.22.1"/>
        <vers num="11.22.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2071" seq="2008-2071" published="2008-05-12" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site request forgery (CSRF) vulnerabilities in the WHM interface 11.15.0 for cPanel 11.18 before 11.18.4 and 11.22 before 11.22.3 allow remote attackers to perform unauthorized actions as cPanel administrators via requests to cpanel/whm/webmail and other unspecified vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://changelog.cpanel.net/?revision=0;tree=;treeview=;show=html;pp=25;te=1314;pg=2">http://changelog.cpanel.net/?revision=0;tree=;treeview=;show=html;pp=25;te=1314;pg=2</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2008-May/062197.html">20080509 XSS and CSRF vulnerability on cPanel 11</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3866">3866</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491864/100/0/threaded">20080509 XSS and CSRF vulnerability on Cpanel 11</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29125">29125</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1522/references">ADV-2008-1522</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42306">cpanel-whminterface-csrf(42306)</ref>
    </refs>
    <vuln_soft>
      <prod name="cpanel" vendor="cpanel">
        <vers num="11.18"/>
        <vers num="11.18.1"/>
        <vers num="11.18.2"/>
        <vers num="11.18.3"/>
        <vers num="11.22"/>
        <vers num="11.22.1"/>
        <vers num="11.22.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2072" seq="2008-2072" published="2008-05-05" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php in Virtual Design Studio vlbook 1.21 allows remote attackers to inject arbitrary web script or HTML via the l parameter, a different vector than CVE-2006-3260.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3854">3854</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491519/100/0/threaded">20080501 vlBook 1.21 (ALL VERSION)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29006">29006</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42126">vlbook-l-xss(42126)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5529">5529</ref>
    </refs>
    <vuln_soft>
      <prod name="vlbook" vendor="virtual_design_studios">
        <vers num="1.21"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2073" seq="2008-2073" published="2008-05-05" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in include/global.inc.php in Virtual Design Studio vlbook 1.21 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the l parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3854">3854</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491519/100/0/threaded">20080501 vlBook 1.21 (ALL VERSION)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29006">29006</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42127">vlbook-globalinc-file-include(42127)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5529">5529</ref>
    </refs>
    <vuln_soft>
      <prod name="vlbook" vendor="virtual_design_studios">
        <vers num="1.21"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2074" seq="2008-2074" published="2008-05-05" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple PHP remote file inclusion vulnerabilities Harris Yusuf Arifin Harris Wap Chat 1.0, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the sysFileDir parameter to (1) eng.writeMsg.php, (2) eng.adCreate.php, (3) eng.adCreateSave.php, (4) eng.adDispByTypeOptions.php, (5) eng.createRoom.php, (6) eng.forward.php, (7) eng.pageLogout.php, (8) eng.resultMember.php, (9) eng.roomDeleteConfirm.php, (10) eng.saveNewRoom.php, and (11) eng.searchMember.php in src/.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28995">28995</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42112">harriswapchat-sysfiledir-file-include(42112)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5525">5525</ref>
    </refs>
    <vuln_soft>
      <prod name="harris_wap_chat" vendor="successkid">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2075" seq="2008-2075" published="2008-05-05" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in pic.php in AstroCam 2.5.0 through 2.7.3 allows remote attackers to inject arbitrary web script or HTML via the picfile parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://astrocam.svn.sourceforge.net/viewvc/astrocam/BUGS?view=markup">http://astrocam.svn.sourceforge.net/viewvc/astrocam/BUGS?view=markup</ref>
      <ref source="CONFIRM" url="http://astrocam.svn.sourceforge.net/viewvc/astrocam/CHANGELOG?view=markup">http://astrocam.svn.sourceforge.net/viewvc/astrocam/CHANGELOG?view=markup</ref>
      <ref source="CONFIRM" url="http://astrocam.svn.sourceforge.net/viewvc/astrocam/v2.x/pic.php?r1=125&amp;r2=126" patch="1">http://astrocam.svn.sourceforge.net/viewvc/astrocam/v2.x/pic.php?r1=125&amp;r2=126</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3852">3852</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491513/100/0/threaded">20080501 XSS in AstroCam</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28998" patch="1">28998</ref>
      <ref source="CONFIRM" url="http://www.wendzel.de/?sub=showpost&amp;blogid=5&amp;postid=56">http://www.wendzel.de/?sub=showpost&amp;blogid=5&amp;postid=56</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42122">astrocam-pic-xss(42122)</ref>
    </refs>
    <vuln_soft>
      <prod name="astrocam" vendor="astrocam">
        <vers num="2.5.0"/>
        <vers num="2.5.1"/>
        <vers num="2.5.2"/>
        <vers num="2.5.3"/>
        <vers num="2.5.4"/>
        <vers num="2.5.5" edition="p1"/>
        <vers num="2.5.6" edition="p1"/>
        <vers num="2.5.7"/>
        <vers num="2.5.8" edition="p1"/>
        <vers num="2.5.8" edition="p2"/>
        <vers num="2.5.9"/>
        <vers num="2.6.0"/>
        <vers num="2.6.1"/>
        <vers num="2.6.2"/>
        <vers num="2.6.3"/>
        <vers num="2.6.4"/>
        <vers num="2.6.5"/>
        <vers num="2.6.6"/>
        <vers num="2.7.0"/>
        <vers num="2.7.1"/>
        <vers num="2.7.2"/>
        <vers num="2.7.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2076" seq="2008-2076" published="2008-05-05" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in admin.php in ActualScripts ActualAnalyzer Lite 2.78 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the style parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29007">29007</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42128">actualanalyzerlite-admin-file-include(42128)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5528">5528</ref>
    </refs>
    <vuln_soft>
      <prod name="actualanalyzer_lite" vendor="actualscripts">
        <vers num="2.78"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2077" seq="2008-2077" published="2008-05-05" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Plain Black WebGUI 7.4.34 has unknown impact and attack vectors related to "data form list view."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=595907&amp;group_id=51417" patch="1">http://sourceforge.net/project/shownotes.php?release_id=595907&amp;group_id=51417</ref>
      <ref source="CONFIRM" url="http://www.plainblack.com/getwebgui/advisories/webgui-7_4_35-stable-released">http://www.plainblack.com/getwebgui/advisories/webgui-7_4_35-stable-released</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28988" patch="1">28988</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42118">webgui-dataform-unspecified(42118)</ref>
    </refs>
    <vuln_soft>
      <prod name="webgui" vendor="plain_black">
        <vers num="7.4.34"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2078" seq="2008-2078" published="2008-05-05" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Robocode before 1.6.0 allows user-assisted remote attackers to "access the internals of the Robocode game" via unspecified vectors related to the AWT Event Queue.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=596393" patch="1">http://sourceforge.net/project/shownotes.php?release_id=596393</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29016">29016</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42136">robocode-awteventqueue-security-bypass(42136)</ref>
    </refs>
    <vuln_soft>
      <prod name="robocode" vendor="robocode">
        <vers num="1.0.7"/>
        <vers num="1.4.9"/>
        <vers num="1.5.4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2079" seq="2008-2079" published="2008-05-05" modified="2018-10-31" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:N/AC:H/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">MySQL 4.1.x before 4.1.24, 5.0.x before 5.0.60, 5.1.x before 5.1.24, and 6.0.x before 6.0.5 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are within the MySQL home data directory, which can point to tables that are created in the future.</descript>
      <descript source="nvd">Per http://www.securityfocus.com/bid/29106 and http://secunia.com/advisories/32222, this vulnerability is remotely exploitable.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.mysql.com/bug.php?id=32167" adv="1" patch="1">http://bugs.mysql.com/bug.php?id=32167</ref>
      <ref source="CONFIRM" url="http://dev.mysql.com/doc/refman/4.1/en/news-4-1-24.html" adv="1">http://dev.mysql.com/doc/refman/4.1/en/news-4-1-24.html</ref>
      <ref source="CONFIRM" url="http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-60.html" adv="1">http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-60.html</ref>
      <ref source="CONFIRM" url="http://dev.mysql.com/doc/refman/5.1/en/news-5-1-24.html" adv="1">http://dev.mysql.com/doc/refman/5.1/en/news-5-1-24.html</ref>
      <ref source="CONFIRM" url="http://dev.mysql.com/doc/refman/6.0/en/news-6-0-5.html" adv="1">http://dev.mysql.com/doc/refman/6.0/en/news-6-0-5.html</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html" adv="1">APPLE-SA-2008-10-09</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html" adv="1">APPLE-SA-2009-09-10-2</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html" adv="1">SUSE-SR:2008:017</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3216" adv="1">http://support.apple.com/kb/HT3216</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3865" adv="1">http://support.apple.com/kb/HT3865</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1608" adv="1">DSA-1608</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:149" adv="1">MDVSA-2008:149</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:150" adv="1">MDVSA-2008:150</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0505.html" adv="1">RHSA-2008:0505</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0510.html" adv="1">RHSA-2008:0510</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0768.html" adv="1">RHSA-2008:0768</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2009-1289.html" adv="1">RHSA-2009:1289</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29106" adv="1" patch="1">29106</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/31681" adv="1" patch="1">31681</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019995" adv="1">1019995</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/USN-671-1" adv="1">USN-671-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1472/references" adv="1">ADV-2008-1472</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2780" adv="1">ADV-2008-2780</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42267" adv="1">mysql-myisam-security-bypass(42267)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10133" adv="1">oval:org.mitre.oval:def:10133</ref>
    </refs>
    <vuln_soft>
      <prod name="mysql" vendor="mysql">
        <vers num="4.1.0" edition="alpha"/>
        <vers num="4.1.0.0"/>
        <vers num="4.1.1"/>
        <vers num="4.1.2" edition="alpha"/>
        <vers num="4.1.3" edition="beta"/>
        <vers num="4.1.4"/>
        <vers num="4.1.5"/>
        <vers num="4.1.6"/>
        <vers num="4.1.7"/>
        <vers num="4.1.8"/>
        <vers num="4.1.8a"/>
        <vers num="4.1.9"/>
        <vers num="4.1.10"/>
        <vers num="4.1.10a"/>
        <vers num="4.1.11"/>
        <vers num="4.1.12"/>
        <vers num="4.1.12a"/>
        <vers num="4.1.13"/>
        <vers num="4.1.13a"/>
        <vers num="4.1.14"/>
        <vers num="4.1.14a"/>
        <vers num="4.1.15"/>
        <vers num="4.1.15a"/>
        <vers num="4.1.16"/>
        <vers num="4.1.17"/>
        <vers num="4.1.18"/>
        <vers num="4.1.19"/>
        <vers num="4.1.20"/>
        <vers num="4.1.21"/>
        <vers num="4.1.22"/>
        <vers num="5.0.0" edition="alpha"/>
        <vers num="5.0.0.0"/>
        <vers num="5.0.1"/>
        <vers num="5.0.1a"/>
        <vers num="5.0.2"/>
        <vers num="5.0.3" edition="beta"/>
        <vers num="5.0.3a"/>
        <vers num="5.0.4"/>
        <vers num="5.0.4a"/>
        <vers num="5.0.5"/>
        <vers num="5.0.6"/>
        <vers num="5.0.7"/>
        <vers num="5.0.8"/>
        <vers num="5.0.9"/>
        <vers num="5.0.10"/>
        <vers num="5.0.10a"/>
        <vers num="5.0.11"/>
        <vers num="5.0.12"/>
        <vers num="5.0.13"/>
        <vers num="5.0.14"/>
        <vers num="5.0.15"/>
        <vers num="5.0.15a"/>
        <vers num="5.0.16"/>
        <vers num="5.0.16a"/>
        <vers num="5.0.17"/>
        <vers num="5.0.17a"/>
        <vers num="5.0.18"/>
        <vers num="5.0.19"/>
        <vers num="5.0.20"/>
        <vers num="5.0.20a"/>
        <vers num="5.0.21"/>
        <vers num="5.0.22"/>
        <vers num="5.0.23"/>
        <vers num="5.0.24"/>
        <vers num="5.0.24a"/>
        <vers num="5.0.25"/>
        <vers num="5.0.26"/>
        <vers num="5.0.27"/>
        <vers num="5.0.28"/>
        <vers num="5.0.30" edition="sp1"/>
        <vers num="5.0.32"/>
        <vers num="5.0.33"/>
        <vers num="5.0.34"/>
        <vers num="5.0.36" edition="sp1"/>
        <vers num="5.0.37"/>
        <vers num="5.0.38"/>
        <vers num="5.0.40"/>
        <vers num="5.0.41"/>
        <vers num="5.0.42"/>
        <vers num="5.0.44" edition="sp1"/>
        <vers num="5.0.45"/>
        <vers num="5.0.46"/>
        <vers num="5.0.48"/>
        <vers num="5.0.50" edition="sp1"/>
        <vers num="5.0.51" edition="a"/>
        <vers num="5.0.51" edition="b"/>
        <vers num="5.0.51a"/>
        <vers num="5.0.51b"/>
        <vers num="5.0.52"/>
        <vers num="5.0.54"/>
        <vers num="5.0.54a"/>
        <vers num="5.0.56" edition="sp1"/>
        <vers num="5.0.58"/>
        <vers num="5.1.1"/>
        <vers num="5.1.2"/>
        <vers num="5.1.3"/>
        <vers num="5.1.4"/>
        <vers num="5.1.5"/>
        <vers num="5.1.5a"/>
        <vers num="5.1.6"/>
        <vers num="5.1.7"/>
        <vers num="5.1.8"/>
        <vers num="5.1.9"/>
        <vers num="5.1.10"/>
        <vers num="5.1.11"/>
        <vers num="5.1.12"/>
        <vers num="5.1.13"/>
        <vers num="5.1.14"/>
        <vers num="5.1.15"/>
        <vers num="5.1.16"/>
        <vers num="5.1.17"/>
        <vers num="5.1.18"/>
        <vers num="5.1.19"/>
        <vers num="5.1.20"/>
        <vers num="5.1.21"/>
        <vers num="5.1.22"/>
        <vers num="5.1.23" edition="a"/>
        <vers num="5.1.23_bk"/>
        <vers num="5.1.23a"/>
        <vers num="6.0.0"/>
        <vers num="6.0.1"/>
        <vers num="6.0.2"/>
        <vers num="6.0.3"/>
        <vers num="6.0.4"/>
      </prod>
      <prod name="ubuntu_linux" vendor="canonical">
        <vers num="6.06" edition=":~~lts~~~"/>
        <vers num="7.10"/>
        <vers num="8.04" edition=":~~lts~~~"/>
      </prod>
      <prod name="debian_linux" vendor="debian">
        <vers num="4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2080" seq="2008-2080" published="2008-05-06" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the Read32s_64 function in src/lib/cdfread64.c in the NASA Goddard Space Flight Center Common Data Format (CDF) library before 3.2.1 allows context-dependent attackers to execute arbitrary code via a .cdf file with crafted length tags.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://cdf.gsfc.nasa.gov/CDF32_buffer_overflow.html">http://cdf.gsfc.nasa.gov/CDF32_buffer_overflow.html</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200805-14.xml">GLSA-200805-14</ref>
      <ref source="MISC" url="http://www.coresecurity.com/?action=item&amp;id=2260" patch="1">http://www.coresecurity.com/?action=item&amp;id=2260</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29045">29045</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019965">1019965</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1440/references">ADV-2008-1440</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42219">cdf-read32s64-bo(42219)</ref>
    </refs>
    <vuln_soft>
      <prod name="common_data_format" vendor="nasa_goddard_space_flight_center">
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="2.2"/>
        <vers num="2.3"/>
        <vers num="2.4"/>
        <vers num="2.5"/>
        <vers num="2.6"/>
        <vers num="2.7"/>
        <vers num="3.0"/>
        <vers num="3.1"/>
        <vers num="3.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2081" seq="2008-2081" published="2008-05-05" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="9.0" CVSS_base_score="9.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in index.php in Siteman 2.0.x2 allows remote authenticated administrators to include and execute arbitrary local files via a .. (dot dot) in the module parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://ircrash.com/english/index.php?topic=29.0">http://ircrash.com/english/index.php?topic=29.0</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28943">28943</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42021">siteman-index-directory-travesal(42021)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42022">siteman-admin-code-execution(42022)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5499">5499</ref>
    </refs>
    <vuln_soft>
      <prod name="siteman" vendor="siteman">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2082" seq="2008-2082" published="2008-05-05" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php in Siteman 2.0.x2 allows remote attackers to inject arbitrary web script or HTML via the module parameter, which leaks the path in an error message.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://ircrash.com/english/index.php?topic=29.0">http://ircrash.com/english/index.php?topic=29.0</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28943">28943</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42020">siteman-index-xss(42020)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5499">5499</ref>
    </refs>
    <vuln_soft>
      <prod name="siteman" vendor="siteman">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2083" seq="2008-2083" published="2008-05-05" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in directory.php in Prozilla Hosting Index, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the cat_id parameter in a list action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3853">3853</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491395/100/0/threaded">20080428 [ECHO_ADV_88$2008] Prozilla Hosting Index (directory.php cat_id) Blind Sql Injection Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28970">28970</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42269">hostingindex-directory-sql-injection(42269)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5516">5516</ref>
    </refs>
    <vuln_soft>
      <prod name="hosting_index" vendor="prozilla">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2084" seq="2008-2084" published="2008-05-05" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in topics.php in the MyArticles 0.6 beta-1 module for RunCMS allows remote attackers to execute arbitrary SQL commands via the topic_id parameter in a listarticles action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28952">28952</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42016">myarticles-topics-sql-injection(42016)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5505">5505</ref>
    </refs>
    <vuln_soft>
      <prod name="myarticles" vendor="myarticles">
        <vers num="0.6" edition="beta1"/>
      </prod>
      <prod name="myarticles_module" vendor="runcms">
        <vers num="0.6" edition="beta1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2085" seq="2008-2085" published="2008-05-12" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple stack-based buffer overflows in the (1) get_remote_ip_media and (2) get_remote_ipv6_media functions in call.cpp in SIPp 3.1 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted SIP message.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=479039">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=479039</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29064">29064</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1447/references">ADV-2008-1447</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42234">sipp-getremoteipmedia-bo(42234)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00311.html">FEDORA-2008-6210</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00318.html">FEDORA-2008-6219</ref>
    </refs>
    <vuln_soft>
      <prod name="sipp" vendor="icewalkers">
        <vers num="3.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2086" seq="2008-2086" published="2008-12-04" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Sun Java Web Start and Java Plug-in for JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier allow remote attackers to execute arbitrary code via a crafted jnlp file that modifies the (1) java.home, (2) java.ext.dirs, or (3) user.home System Properties, aka "Java Web Start File Inclusion" and CR 6694892.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2009/Feb/msg00003.html">APPLE-SA-2009-02-12</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00009.html">SUSE-SA:2009:007</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00004.html">SUSE-SA:2009:018</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html">SUSE-SR:2009:010</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=123678756409861&amp;w=2">SSRT080111</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=126583436323697&amp;w=2">SSRT090049</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2008-1025.html">RHSA-2008:1025</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200911-02.xml">GLSA-200911-02</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/4693">4693</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-244988-1">244988</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2008-486.htm">http://support.avaya.com/elmodocs2/security/ASA-2008-486.htm</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2009-012.htm">http://support.avaya.com/elmodocs2/security/ASA-2009-012.htm</ref>
      <ref source="CONFIRM" url="http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&amp;DocumentOID=829914&amp;poid=">http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&amp;DocumentOID=829914&amp;poid=</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-1018.html">RHSA-2008:1018</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2009-0015.html">RHSA-2009:0015</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2009-0016.html">RHSA-2009:0016</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2009-0445.html">RHSA-2009:0445</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/498907/100/0/threaded">20081204 CVE-2008-2086: Java Web Start File Inclusion via System PropertiesOverride</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/32620">32620</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1021318">1021318</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-340A.html">TA08-340A</ref>
      <ref source="MISC" url="http://www.vsecurity.com/bulletins/advisories/2008/JWS-props.txt">http://www.vsecurity.com/bulletins/advisories/2008/JWS-props.txt</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/0424">ADV-2009-0424</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/0672">ADV-2009-0672</ref>
      <ref source="CONFIRM" url="http://www116.nortel.com/pub/repository/CLARIFY/DOCUMENT/2009/03/024431-01.pdf">http://www116.nortel.com/pub/repository/CLARIFY/DOCUMENT/2009/03/024431-01.pdf</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5601">oval:org.mitre.oval:def:5601</ref>
    </refs>
    <vuln_soft>
      <prod name="jdk" vendor="sun">
        <vers num="5.0" prev="1" edition="update_1"/>
        <vers num="5.0" prev="1" edition="update_10"/>
        <vers num="5.0" prev="1" edition="update_11"/>
        <vers num="5.0" prev="1" edition="update_12"/>
        <vers num="5.0" prev="1" edition="update_13"/>
        <vers num="5.0" prev="1" edition="update_14"/>
        <vers num="5.0" prev="1" edition="update_15"/>
        <vers num="5.0" prev="1" edition="update_16"/>
        <vers num="5.0" prev="1" edition="update_2"/>
        <vers num="5.0" prev="1" edition="update_3"/>
        <vers num="5.0" prev="1" edition="update_4"/>
        <vers num="5.0" prev="1" edition="update_5"/>
        <vers num="5.0" prev="1" edition="update_6"/>
        <vers num="5.0" prev="1" edition="update_7"/>
        <vers num="5.0" prev="1" edition="update_8"/>
        <vers num="5.0" prev="1" edition="update_9"/>
        <vers num="6" prev="1" edition="update_1"/>
        <vers num="6" prev="1" edition="update_10"/>
        <vers num="6" prev="1" edition="update_2"/>
        <vers num="6" prev="1" edition="update_3"/>
        <vers num="6" prev="1" edition="update_4"/>
        <vers num="6" prev="1" edition="update_5"/>
        <vers num="6" prev="1" edition="update_6"/>
        <vers num="6" prev="1" edition="update_7"/>
        <vers num="6" prev="1" edition="update_8"/>
        <vers num="6" prev="1" edition="update_9"/>
      </prod>
      <prod name="jre" vendor="sun">
        <vers num="1.4.2_1"/>
        <vers num="1.4.2_2"/>
        <vers num="1.4.2_3"/>
        <vers num="1.4.2_4"/>
        <vers num="1.4.2_5"/>
        <vers num="1.4.2_6"/>
        <vers num="1.4.2_7"/>
        <vers num="1.4.2_8"/>
        <vers num="1.4.2_9"/>
        <vers num="1.4.2_10"/>
        <vers num="1.4.2_11"/>
        <vers num="1.4.2_12"/>
        <vers num="1.4.2_13"/>
        <vers num="1.4.2_14"/>
        <vers num="1.4.2_15"/>
        <vers num="1.4.2_16"/>
        <vers num="1.4.2_17"/>
        <vers num="1.4.2_18" prev="1"/>
        <vers num="5.0" prev="1" edition="update_1"/>
        <vers num="5.0" prev="1" edition="update_10"/>
        <vers num="5.0" prev="1" edition="update_11"/>
        <vers num="5.0" prev="1" edition="update_12"/>
        <vers num="5.0" prev="1" edition="update_13"/>
        <vers num="5.0" prev="1" edition="update_14"/>
        <vers num="5.0" prev="1" edition="update_15"/>
        <vers num="5.0" prev="1" edition="update_16"/>
        <vers num="5.0" prev="1" edition="update_2"/>
        <vers num="5.0" prev="1" edition="update_3"/>
        <vers num="5.0" prev="1" edition="update_4"/>
        <vers num="5.0" prev="1" edition="update_5"/>
        <vers num="5.0" prev="1" edition="update_6"/>
        <vers num="5.0" prev="1" edition="update_7"/>
        <vers num="5.0" prev="1" edition="update_8"/>
        <vers num="5.0" prev="1" edition="update_9"/>
        <vers num="6" prev="1" edition="update_1"/>
        <vers num="6" prev="1" edition="update_10"/>
        <vers num="6" prev="1" edition="update_2"/>
        <vers num="6" prev="1" edition="update_3"/>
        <vers num="6" prev="1" edition="update_4"/>
        <vers num="6" prev="1" edition="update_5"/>
        <vers num="6" prev="1" edition="update_6"/>
        <vers num="6" prev="1" edition="update_7"/>
        <vers num="6" prev="1" edition="update_8"/>
        <vers num="6" prev="1" edition="update_9"/>
      </prod>
      <prod name="sdk" vendor="sun">
        <vers num="1.4.2_1"/>
        <vers num="1.4.2_2"/>
        <vers num="1.4.2_3"/>
        <vers num="1.4.2_4"/>
        <vers num="1.4.2_5"/>
        <vers num="1.4.2_6"/>
        <vers num="1.4.2_7"/>
        <vers num="1.4.2_8"/>
        <vers num="1.4.2_9"/>
        <vers num="1.4.2_10"/>
        <vers num="1.4.2_11"/>
        <vers num="1.4.2_12"/>
        <vers num="1.4.2_13"/>
        <vers num="1.4.2_14"/>
        <vers num="1.4.2_15"/>
        <vers num="1.4.2_16"/>
        <vers num="1.4.2_17"/>
        <vers num="1.4.2_18" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2087" seq="2008-2087" published="2008-05-06" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in search_result.php in Softbiz Web Host Directory Script, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the host_id parameter, a different vector than CVE-2005-3817.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3855">3855</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491396/100/0/threaded">20080428 [ECHO_ADV_89$2008] Softbiz Web Host Directory Script (search_result.php host_id) Blind Sql Injection Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28971">28971</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42096">webhostdirectoryscript-hostid-sql-injection(42096)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5517">5517</ref>
    </refs>
    <vuln_soft>
      <prod name="web_hosting_directory_script" vendor="softbiz">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2088" seq="2008-2088" published="2008-05-06" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in admin/news.php in PHP Forge 3.0 beta 2 allows remote attackers to execute arbitrary SQL commands via the id parameter in the news module to admin.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28950">28950</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1386/references">ADV-2008-1386</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42017">phpforge-admin-sql-injection(42017)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5504">5504</ref>
    </refs>
    <vuln_soft>
      <prod name="php_forge" vendor="phpforge">
        <vers num="3.0" edition="beta_2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2089" seq="2008-2089" published="2008-05-06" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the SCTP protocol implementation in Sun Solaris 10 allows remote attackers to cause a denial of service (panic) via a crafted SCTP packet.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-236321-1" adv="1">236321</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29023">29023</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019961">1019961</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1429/references">ADV-2008-1429</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42160">sun-solaris-sctp-dos(42160)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5165">oval:org.mitre.oval:def:5165</ref>
    </refs>
    <vuln_soft>
      <prod name="solaris" vendor="sun">
        <vers num="10" edition=":sparc"/>
        <vers num="10" edition=":x86"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2090" seq="2008-2090" published="2008-05-06" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the SCTP protocol implementation in Sun Solaris 10 allows remote attackers to cause a denial of service (CPU consumption and network traffic amplification) via a crafted SCTP packet.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-236521-1">236521</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29024">29024</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019962">1019962</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1429/references">ADV-2008-1429</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42160">sun-solaris-sctp-dos(42160)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5258">oval:org.mitre.oval:def:5258</ref>
    </refs>
    <vuln_soft>
      <prod name="solaris" vendor="sun">
        <vers num="10" edition=":sparc"/>
        <vers num="10" edition=":x86"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2091" seq="2008-2091" published="2008-05-06" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in ipn.php in KubeLabs Kubelance 1.6.4 allows remote attackers to include and execute arbitrary local files via the i parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28873">28873</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1341/references">ADV-2008-1341</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41905">kubelance-ipn-file-include(41905)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5477">5477</ref>
    </refs>
    <vuln_soft>
      <prod name="kubelance" vendor="kubelabs">
        <vers num="1.6.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2092" seq="2008-2092" published="2008-05-06" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Linksys SPA-2102 Phone Adapter 3.3.6 allows remote attackers to cause a denial of service (crash) via a long ping packet ("ping of death"). NOTE: the severity of this issue has been disputed since there are limited attack scenarios.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=120637257800425&amp;w=2">20080324 Linksys phone adapter denial of service</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=120637551306325&amp;w=2">20080324 Re: Linksys phone adapter denial of service</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=120638162819268&amp;w=2">20080324 Re: Re: Linksys phone adapter denial of service</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=120638296821936&amp;w=2">20080324 Re: Linksys phone adapter denial of service</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=120645736414059&amp;w=2">20080325 Re: Linksys phone adapter denial of service</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28414">28414</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41436">linksys-spa2102-phoneadapter-ping-dos(41436)</ref>
    </refs>
    <vuln_soft>
      <prod name="spa-2102_phone_adapter" vendor="linksys">
        <vers num="3.3.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2093" seq="2008-2093" published="2008-05-06" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the Profiler (com_comprofiler) component in Community Builder for Mambo and Joomla! allows remote attackers to execute arbitrary SQL commands via the user parameter in a userProfile action to index.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28911">28911</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42008">communitybuilder-user-sql-injection(42008)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5491">5491</ref>
    </refs>
    <vuln_soft>
      <prod name="com_comprofiler" vendor="joomla">
        <vers num=""/>
      </prod>
      <prod name="community_builder" vendor="joomlapolis">
        <vers num=""/>
      </prod>
      <prod name="com_comprofiler" vendor="mambo">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2094" seq="2008-2094" published="2008-05-06" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in article.php in the Article module for XOOPS allows remote attackers to execute arbitrary SQL commands via the id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3856">3856</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491150/100/0/threaded">20080419 Xoops All Version -Articles- Article.PHP (ID) Blind SQL Injection ExpL0it</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28879">28879</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41943">articlemodule-article-sql-injection(41943)</ref>
    </refs>
    <vuln_soft>
      <prod name="article_module" vendor="xoops">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2095" seq="2008-2095" published="2008-05-06" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the FlippingBook (com_flippingbook) 1.0.4 component for Joomla! allows remote attackers to execute arbitrary SQL commands via the book_id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28886">28886</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1342/references">ADV-2008-1342</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41942">flippingbook-index-sql-injection(41942)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5484">5484</ref>
    </refs>
    <vuln_soft>
      <prod name="com_flippingbook" vendor="joomla">
        <vers num="1.0.4"/>
      </prod>
      <prod name="com_flippingbook" vendor="mambo">
        <vers num="1.0.4"/>
      </prod>
      <prod name="flipping_book" vendor="page-flip-tools">
        <vers num="1.0.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2096" seq="2008-2096" published="2008-05-07" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in BackLinkSpider allows remote attackers to execute arbitrary SQL commands via the cat_id parameter to a site-specific component name such as link.php or backlinkspider.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3857">3857</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491612/100/0/threaded">20080505 [ECHO_ADV_95$2008] BackLinkSpider (cat_id) Blind Sql Injection Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29054">29054</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42189">backlinkspider-catid-sql-injection(42189)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5546">5546</ref>
    </refs>
    <vuln_soft>
      <prod name="backlink_spider" vendor="backlinkspider">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2097" seq="2008-2097" published="2008-06-05" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.0" CVSS_base_score="9.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the openwsman management service in VMware ESXi 3.5 and ESX 3.5 allows remote authenticated users to gain privileges via an "invalid Content-Length."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00001.html">SUSE-SR:2008:012</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3922">3922</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020199">1020199</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493080/100/0/threaded">20080604 VMSA-2008-0009 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Fusion, VMware Server, VMware VIX API, VMware ESX, VMware ESXi resolve critical security issues</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29547">29547</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2008-0009.html" adv="1">http://www.vmware.com/security/advisories/VMSA-2008-0009.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1744" adv="1">ADV-2008-1744</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42875">vmware-openwsman-privilege-escalation(42875)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5640">oval:org.mitre.oval:def:5640</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5759">oval:org.mitre.oval:def:5759</ref>
    </refs>
    <vuln_soft>
      <prod name="esx" vendor="vmware">
        <vers num="3.5"/>
      </prod>
      <prod name="esxi" vendor="vmware">
        <vers num="3.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2098" seq="2008-2098" published="2008-06-02" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.9" CVSS_base_score="6.9" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in the VMware Host Guest File System (HGFS) in VMware Workstation 6 before 6.0.4 build 93057, VMware Player 2 before 2.0.4 build 93057, VMware ACE 2 before 2.0.2 build 93057, and VMware Fusion before 1.1.2 build 87978, when folder sharing is used, allows guest OS users to execute arbitrary code on the host OS via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-201209-25.xml">GLSA-201209-25</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492831/100/0/threaded">20080530 VMSA-2008-0008 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Fusion resolve critical security issues</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020148">1020148</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2008-0008.html">http://www.vmware.com/security/advisories/VMSA-2008-0008.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1707/references" adv="1">ADV-2008-1707</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42753">vmware-hgfs-bo(42753)</ref>
    </refs>
    <vuln_soft>
      <prod name="ace_2" vendor="vmware">
        <vers num="2.0"/>
        <vers num="2.01"/>
      </prod>
      <prod name="fusion" vendor="vmware">
        <vers num="1.1"/>
        <vers num="1.1.1"/>
      </prod>
      <prod name="vmware_player_2" vendor="vmware">
        <vers num="2.0"/>
        <vers num="2.01"/>
        <vers num="2.02"/>
        <vers num="2.03"/>
      </prod>
      <prod name="vmware_workstation" vendor="vmware">
        <vers num="6.0.1"/>
        <vers num="6.0.2"/>
        <vers num="6.03"/>
      </prod>
      <prod name="workstation" vendor="vmware">
        <vers num="6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2099" seq="2008-2099" published="2008-06-02" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.9" CVSS_base_score="6.9" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in VMCI in VMware Workstation 6 before 6.0.4 build 93057, VMware Player 2 before 2.0.4 build 93057, and VMware ACE 2 before 2.0.2 build 93057 on Windows allows guest OS users to execute arbitrary code on the host OS via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492831/100/0/threaded">20080530 VMSA-2008-0008 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Fusion resolve critical security issues</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29443">29443</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020149">1020149</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2008-0008.html" adv="1" patch="1">http://www.vmware.com/security/advisories/VMSA-2008-0008.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1707" adv="1">ADV-2008-1707</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42757">vmware-vmci-code-execution(42757)</ref>
    </refs>
    <vuln_soft>
      <prod name="ace_2" vendor="vmware">
        <vers num="2.0"/>
        <vers num="2.0.1"/>
      </prod>
      <prod name="vmware_player_2" vendor="vmware">
        <vers num="2.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
      </prod>
      <prod name="vmware_workstation" vendor="vmware">
        <vers num="6.0.1"/>
        <vers num="6.0.2"/>
        <vers num="6.0.3"/>
      </prod>
      <prod name="workstation" vendor="vmware">
        <vers num="6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2100" seq="2008-2100" published="2008-06-05" modified="2019-08-14" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple buffer overflows in VIX API 1.1.x before 1.1.4 build 93057 on VMware Workstation 5.x and 6.x, VMware Player 1.x and 2.x, VMware ACE 2.x, VMware Server 1.x, VMware Fusion 1.x, VMware ESXi 3.5, and VMware ESX 3.0.1 through 3.5 allow guest OS users to execute arbitrary code on the host OS via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-201209-25.xml" adv="1">GLSA-201209-25</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3922" adv="1">3922</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020200" adv="1">1020200</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493080/100/0/threaded" adv="1">20080604 VMSA-2008-0009 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Fusion, VMware Server, VMware VIX API, VMware ESX, VMware ESXi resolve critical security issues</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29552" adv="1">29552</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2008-0009.html" adv="1">http://www.vmware.com/security/advisories/VMSA-2008-0009.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1744">ADV-2008-1744</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42872" adv="1">vmware-vixapi-multiple-unspecified-bo(42872)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5081" adv="1">oval:org.mitre.oval:def:5081</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5647" adv="1">oval:org.mitre.oval:def:5647</ref>
    </refs>
    <vuln_soft>
      <prod name="ace" vendor="vmware">
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.3_build_54075"/>
        <vers num="1.0.4"/>
        <vers num="1.0.5"/>
        <vers num="2.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.1_build_55017"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
      </prod>
      <prod name="esx_server" vendor="vmware">
        <vers num="3.0"/>
        <vers num="3.5"/>
      </prod>
      <prod name="esxi" vendor="vmware">
        <vers num="3.5"/>
      </prod>
      <prod name="fusion" vendor="vmware">
        <vers num="1.1.1" prev="1"/>
      </prod>
      <prod name="player" vendor="vmware">
        <vers num="1.0.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.4"/>
        <vers num="1.0.5"/>
        <vers num="1.0.5_build_56455"/>
        <vers num="1.0.6"/>
        <vers num="2.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.1_build_55017"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
      </prod>
      <prod name="server" vendor="vmware">
        <vers num="1.0.5" prev="1"/>
      </prod>
      <prod name="workstation" vendor="vmware">
        <vers num="5.5"/>
        <vers num="5.5.0_build_13124"/>
        <vers num="5.5.1"/>
        <vers num="5.5.1_build_19175"/>
        <vers num="5.5.2"/>
        <vers num="5.5.3"/>
        <vers num="5.5.3_build_34685"/>
        <vers num="5.5.3_build_42958"/>
        <vers num="5.5.4"/>
        <vers num="5.5.4_build_44386"/>
        <vers num="5.5.5"/>
        <vers num="5.5.5_build_56455"/>
        <vers num="5.5.6"/>
        <vers num="6.0"/>
        <vers num="6.0.1"/>
        <vers num="6.0.1_build_55017"/>
        <vers num="6.0.2"/>
        <vers num="6.0.3"/>
      </prod>
      <prod name="esx" vendor="vmware">
        <vers num="2.5.4"/>
        <vers num="2.5.5"/>
        <vers num="3.0.0"/>
        <vers num="3.0.1"/>
        <vers num="3.0.2"/>
        <vers num="3.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2101" seq="2008-2101" published="2008-09-03" modified="2018-10-11" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The VMware Consolidated Backup (VCB) command-line utilities in VMware ESX 3.0.1 through 3.0.3 and ESX 3.5 place a password on the command line, which allows local users to obtain sensitive information by listing the process.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html">20080830 VMSA-2008-0014 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX address information disclosure, privilege escalation and other security issues.</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-201209-25.xml">GLSA-201209-25</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/4202">4202</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020794">1020794</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/495869/100/0/threaded">20080830 VMSA-2008-0014 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX address information disclosure, privilege escalation and other security issues.</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30937">30937</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2008-0014.html">http://www.vmware.com/security/advisories/VMSA-2008-0014.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2466">ADV-2008-2466</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/44797">vmware-esx-vcb-info-disclosure(44797)</ref>
    </refs>
    <vuln_soft>
      <prod name="esx" vendor="vmware">
        <vers num="3.0.1"/>
        <vers num="3.0.2"/>
        <vers num="3.0.3"/>
        <vers num="3.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2103" seq="2008-2103" published="2008-05-07" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Bugzilla 2.17.2 and later allows remote attackers to inject arbitrary web script or HTML via the id parameter to the "Format for Printing" view or "Long Format" bug list.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.bugzilla.org/security/2.20.5/">http://www.bugzilla.org/security/2.20.5/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29038">29038</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019967">1019967</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1428/references">ADV-2008-1428</ref>
      <ref source="CONFIRM" url="https://bugzilla.mozilla.org/show_bug.cgi?id=425665">https://bugzilla.mozilla.org/show_bug.cgi?id=425665</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42216">bugzilla-bugview-xss(42216)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00036.html">FEDORA-2008-3442</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00098.html">FEDORA-2008-3488</ref>
    </refs>
    <vuln_soft>
      <prod name="bugzilla" vendor="mozilla">
        <vers num="2.17.2"/>
        <vers num="2.17.3"/>
        <vers num="2.17.4"/>
        <vers num="2.17.5"/>
        <vers num="2.17.6"/>
        <vers num="2.17.7"/>
        <vers num="2.18" edition="rc1"/>
        <vers num="2.18" edition="rc2"/>
        <vers num="2.18" edition="rc3"/>
        <vers num="2.18.1"/>
        <vers num="2.18.2"/>
        <vers num="2.18.3"/>
        <vers num="2.18.4"/>
        <vers num="2.18.5"/>
        <vers num="2.18.6"/>
        <vers num="2.19.1"/>
        <vers num="2.19.2"/>
        <vers num="2.19.3"/>
        <vers num="2.20" edition="rc1"/>
        <vers num="2.20" edition="rc2"/>
        <vers num="2.20.1"/>
        <vers num="2.20.2"/>
        <vers num="2.20.3"/>
        <vers num="2.20.4"/>
        <vers num="2.20.5"/>
        <vers num="2.20.6"/>
        <vers num="2.21.1"/>
        <vers num="2.21.2"/>
        <vers num="2.22" edition="rc1"/>
        <vers num="2.22.1"/>
        <vers num="2.22.2"/>
        <vers num="2.22.3"/>
        <vers num="2.22.4"/>
        <vers num="2.23"/>
        <vers num="2.23.1"/>
        <vers num="2.23.2"/>
        <vers num="2.23.3"/>
        <vers num="2.23.4"/>
        <vers num="3.0.1"/>
        <vers num="3.0.2"/>
        <vers num="3.0.3"/>
        <vers num="3.0.4"/>
        <vers num="3.0_rc1"/>
        <vers num="3.1.1"/>
        <vers num="3.1.2"/>
        <vers num="3.1.3"/>
        <vers num="3.1.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2104" seq="2008-2104" published="2008-05-07" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.0" CVSS_base_score="4.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The WebService in Bugzilla 3.1.3 allows remote authenticated users without canconfirm privileges to create NEW or ASSIGNED bug entries via a request to the XML-RPC interface, which bypasses the canconfirm check.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.bugzilla.org/security/2.20.5/">http://www.bugzilla.org/security/2.20.5/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29038">29038</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019968">1019968</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1428/references" adv="1">ADV-2008-1428</ref>
      <ref source="CONFIRM" url="https://bugzilla.mozilla.org/show_bug.cgi?id=415471">https://bugzilla.mozilla.org/show_bug.cgi?id=415471</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42218">bugzilla-xmlrpc-security-bypass(42218)</ref>
    </refs>
    <vuln_soft>
      <prod name="bugzilla" vendor="mozilla">
        <vers num="3.1.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2105" seq="2008-2105" published="2008-05-07" modified="2017-08-07" severity="Low" CVSS_version="2.0" CVSS_score="3.5" CVSS_base_score="3.5" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="6.8" CVSS_vector="(AV:N/AC:M/Au:S/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">email_in.pl in Bugzilla 2.23.4, 3.0.x before 3.0.4, and 3.1.x before 3.1.4 allows remote authenticated users to more easily spoof the changer of a bug via a @reporter command in the body of an e-mail message, which overrides the e-mail address as normally obtained from the From e-mail header.  NOTE: since From headers are easily spoofed, this only crosses privilege boundaries in environments that provide additional verification of e-mail addresses.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.bugzilla.org/security/2.20.5/">http://www.bugzilla.org/security/2.20.5/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29038">29038</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019969">1019969</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1428/references">ADV-2008-1428</ref>
      <ref source="CONFIRM" url="https://bugzilla.mozilla.org/show_bug.cgi?id=419188" patch="1">https://bugzilla.mozilla.org/show_bug.cgi?id=419188</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42235">bugzilla-emailin-security-bypass(42235)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00036.html">FEDORA-2008-3442</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00098.html">FEDORA-2008-3488</ref>
    </refs>
    <vuln_soft>
      <prod name="bugzilla" vendor="mozilla">
        <vers num="2.4"/>
        <vers num="2.6"/>
        <vers num="2.8"/>
        <vers num="2.10"/>
        <vers num="2.12"/>
        <vers num="2.14"/>
        <vers num="2.14.1"/>
        <vers num="2.14.2"/>
        <vers num="2.14.3"/>
        <vers num="2.14.4"/>
        <vers num="2.14.5"/>
        <vers num="2.16" edition="rc1"/>
        <vers num="2.16.1"/>
        <vers num="2.16.2"/>
        <vers num="2.16.3"/>
        <vers num="2.16.4"/>
        <vers num="2.16.5"/>
        <vers num="2.16.6"/>
        <vers num="2.16.7"/>
        <vers num="2.16.8"/>
        <vers num="2.16.9"/>
        <vers num="2.16.10"/>
        <vers num="2.16.11"/>
        <vers num="2.16_rc2"/>
        <vers num="2.17.1"/>
        <vers num="2.17.2"/>
        <vers num="2.17.3"/>
        <vers num="2.17.4"/>
        <vers num="2.17.5"/>
        <vers num="2.17.6"/>
        <vers num="2.17.7"/>
        <vers num="2.18" edition="rc1"/>
        <vers num="2.18" edition="rc2"/>
        <vers num="2.18" edition="rc3"/>
        <vers num="2.18.1"/>
        <vers num="2.18.2"/>
        <vers num="2.18.3"/>
        <vers num="2.18.4"/>
        <vers num="2.18.5"/>
        <vers num="2.18.6"/>
        <vers num="2.19.1"/>
        <vers num="2.19.2"/>
        <vers num="2.19.3"/>
        <vers num="2.20" edition="rc1"/>
        <vers num="2.20" edition="rc2"/>
        <vers num="2.20.1"/>
        <vers num="2.20.2"/>
        <vers num="2.20.3"/>
        <vers num="2.20.4"/>
        <vers num="2.20.5"/>
        <vers num="2.20.6"/>
        <vers num="2.21.1"/>
        <vers num="2.21.2"/>
        <vers num="2.22" edition="rc1"/>
        <vers num="2.22.1"/>
        <vers num="2.22.2"/>
        <vers num="2.22.3"/>
        <vers num="2.22.4"/>
        <vers num="2.23"/>
        <vers num="2.23.1"/>
        <vers num="2.23.2"/>
        <vers num="2.23.3"/>
        <vers num="2.23.4"/>
        <vers num="3.0.0"/>
        <vers num="3.0.1"/>
        <vers num="3.0.2"/>
        <vers num="3.1.0"/>
        <vers num="3.1.1"/>
        <vers num="3.1.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2106" seq="2008-2106" published="2008-05-07" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Call of Duty 4 (CoD4) 1.5 and earlier allows remote authenticated users to cause a denial of service (crash) via a type 7 stats packet, which triggers a memcpy with a negative value.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/cod4statz-adv.txt">http://aluigi.altervista.org/adv/cod4statz-adv.txt</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3858">3858</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491564/100/0/threaded">20080502 Denial of Service in Call of Duty 4 1.5</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29026">29026</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42163">callofduty4-stats-dos(42163)</ref>
    </refs>
    <vuln_soft>
      <prod name="call_of_duty_4" vendor="activision">
        <vers num="1.5" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2107" seq="2008-2107" published="2008-05-07" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The GENERATE_SEED macro in PHP 4.x before 4.4.8 and 5.x before 5.2.5, when running on 32-bit systems, performs a multiplication using values that can produce a zero seed in rare circumstances, which allows context-dependent attackers to predict subsequent values of the rand and mt_rand functions and possibly bypass protection mechanisms that rely on an unknown initial seed.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2008-05/0103.html">20080506 Advisory SE-2008-02: PHP GENERATE_SEED() Weak Random Number Seed Vulnerability</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html">SUSE-SR:2008:014</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200811-05.xml">GLSA-200811-05</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3859">3859</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2009/dsa-1789">DSA-1789</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:125">MDVSA-2008:125</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:126">MDVSA-2008:126</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:127">MDVSA-2008:127</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:128">MDVSA-2008:128</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:129">MDVSA-2008:129</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:130">MDVSA-2008:130</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0505.html">RHSA-2008:0505</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0544.html">RHSA-2008:0544</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0545.html">RHSA-2008:0545</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0546.html">RHSA-2008:0546</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0582.html">RHSA-2008:0582</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491683/100/0/threaded">20080506 Advisory SE-2008-02: PHP GENERATE_SEED() Weak Random Number Seed Vulnerability</ref>
      <ref source="MISC" url="http://www.sektioneins.de/advisories/SE-2008-02.txt">http://www.sektioneins.de/advisories/SE-2008-02.txt</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-628-1">USN-628-1</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42226">php-generateseed-weak-security(42226)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42284">php-generateseed-security-bypass(42284)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10644">oval:org.mitre.oval:def:10644</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00773.html">FEDORA-2008-3864</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00779.html">FEDORA-2008-3606</ref>
    </refs>
    <vuln_soft>
      <prod name="php" vendor="php">
        <vers num="4.4.7" prev="1"/>
        <vers num="5"/>
        <vers num="5.0.0" edition="beta1"/>
        <vers num="5.0.0" edition="beta2"/>
        <vers num="5.0.0" edition="beta3"/>
        <vers num="5.0.0" edition="rc1"/>
        <vers num="5.0.0" edition="rc2"/>
        <vers num="5.0.0" edition="rc3"/>
        <vers num="5.0.1"/>
        <vers num="5.0.2"/>
        <vers num="5.0.3"/>
        <vers num="5.0.4"/>
        <vers num="5.0.5"/>
        <vers num="5.1.0"/>
        <vers num="5.1.1"/>
        <vers num="5.1.2"/>
        <vers num="5.1.3"/>
        <vers num="5.1.4"/>
        <vers num="5.1.5"/>
        <vers num="5.1.6"/>
        <vers num="5.2.0"/>
        <vers num="5.2.1"/>
        <vers num="5.2.2"/>
        <vers num="5.2.3"/>
        <vers num="5.2.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2108" seq="2008-2108" published="2008-05-07" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The GENERATE_SEED macro in PHP 4.x before 4.4.8 and 5.x before 5.2.5, when running on 64-bit systems, performs a multiplication that generates a portion of zero bits during conversion due to insufficient precision, which produces 24 bits of entropy and simplifies brute force attacks against protection mechanisms that use the rand and mt_rand functions.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2008-05/0103.html">20080506 Advisory SE-2008-02: PHP GENERATE_SEED() Weak Random Number Seed Vulnerability</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200811-05.xml">GLSA-200811-05</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3859">3859</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2009/dsa-1789">DSA-1789</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:125">MDVSA-2008:125</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:126">MDVSA-2008:126</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:127">MDVSA-2008:127</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:128">MDVSA-2008:128</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:129">MDVSA-2008:129</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:130">MDVSA-2008:130</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0505.html">RHSA-2008:0505</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0544.html">RHSA-2008:0544</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0545.html">RHSA-2008:0545</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0546.html">RHSA-2008:0546</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0582.html">RHSA-2008:0582</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491683/100/0/threaded">20080506 Advisory SE-2008-02: PHP GENERATE_SEED() Weak Random Number Seed Vulnerability</ref>
      <ref source="MISC" url="http://www.sektioneins.de/advisories/SE-2008-02.txt">http://www.sektioneins.de/advisories/SE-2008-02.txt</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-628-1">USN-628-1</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42226">php-generateseed-weak-security(42226)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10844">oval:org.mitre.oval:def:10844</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00773.html">FEDORA-2008-3864</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00779.html">FEDORA-2008-3606</ref>
    </refs>
    <vuln_soft>
      <prod name="php" vendor="php">
        <vers num="4.4.7" prev="1"/>
        <vers num="5"/>
        <vers num="5.0.0" edition="beta1"/>
        <vers num="5.0.0" edition="beta2"/>
        <vers num="5.0.0" edition="beta3"/>
        <vers num="5.0.0" edition="rc1"/>
        <vers num="5.0.0" edition="rc2"/>
        <vers num="5.0.0" edition="rc3"/>
        <vers num="5.0.1"/>
        <vers num="5.0.2"/>
        <vers num="5.0.3"/>
        <vers num="5.0.4"/>
        <vers num="5.0.5"/>
        <vers num="5.1.0"/>
        <vers num="5.1.1"/>
        <vers num="5.1.2"/>
        <vers num="5.1.3"/>
        <vers num="5.1.4"/>
        <vers num="5.1.5"/>
        <vers num="5.1.6"/>
        <vers num="5.2.0"/>
        <vers num="5.2.1"/>
        <vers num="5.2.2"/>
        <vers num="5.2.3"/>
        <vers num="5.2.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2109" seq="2008-2109" published="2008-05-07" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">field.c in the libid3tag 0.15.0b library allows context-dependent attackers to cause a denial of service (CPU consumption) via an ID3_FIELD_TYPE_STRINGLIST field that ends in '\0', which triggers an infinite loop.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.gentoo.org/show_bug.cgi?id=210564" patch="1">http://bugs.gentoo.org/show_bug.cgi?id=210564</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200805-15.xml">GLSA-200805-15</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:103">MDVSA-2008:103</ref>
      <ref source="MLIST" url="http://www.mars.org/mailman/public/mad-dev/2008-January/001366.html">[mad-dev] 20080112 Initite loop bug in libid3tag-0.15.0b</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29210">29210</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42271">libid3tag-field-dos(42271)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00159.html">FEDORA-2008-3757</ref>
    </refs>
    <vuln_soft>
      <prod name="libid3tag" vendor="media-libs">
        <vers num="0.15.0b"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2110" seq="2008-2110" published="2008-05-07" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unrestricted file upload vulnerability in qtofm.php in QTOFileManager 1.0 allows remote attackers to execute arbitrary PHP code by uploading a file with an executable extension, then accessing it via a direct request.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3860">3860</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491699/100/0/threaded">20080505 QTOFileManager V 1.0&lt;== Remote File Upload Vulnerability</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491756/100/0/threaded">20080507 Re: QTOFileManager V 1.0&lt;== Remote File Upload Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29072">29072</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42236">qtofilemanager-qtofm-file-upload(42236)</ref>
    </refs>
    <vuln_soft>
      <prod name="qtofilemanager" vendor="qto">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2111" seq="2008-2111" published="2008-05-07" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The ActiveX Control (yNotifier.dll) in Yahoo! Assistant 3.6 and earlier allows remote attackers to execute arbitrary code via unspecified vectors in the Ynoifier COM object that trigger memory corruption.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://secway.org/advisory/AD20080506EN.txt">http://secway.org/advisory/AD20080506EN.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29065">29065</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020004">1020004</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1471/references">ADV-2008-1471</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42233">yahoo-assistant-ynotifier-code-execution(42233)</ref>
    </refs>
    <vuln_soft>
      <prod name="yahoo_assistant" vendor="yahoo">
        <vers num="3.6" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2112" seq="2008-2112" published="2008-05-07" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="8.5" CVSS_base_score="8.5" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="6.8" CVSS_vector="(AV:N/AC:M/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Sun Ray Kiosk Mode 4.0 allows local and remote authenticated Sun Ray administrators to gain root privileges via unknown vectors related to utconfig.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-236944-1">236944</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29092">29092</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019993">1019993</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1454/references">ADV-2008-1454</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42262">sunray-kiosk-privilege-escalation(42262)</ref>
    </refs>
    <vuln_soft>
      <prod name="ray_server_software" vendor="sun">
        <vers num="4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2113" seq="2008-2113" published="2008-05-08" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in annuaire.php in PHPEasyData 1.5.4 allows remote attackers to execute arbitrary SQL commands via the cat_id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29068">29068</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42230">phpeasydata-annuaire-sql-injection(42230)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5552">5552</ref>
    </refs>
    <vuln_soft>
      <prod name="phpeasydata" vendor="phpeasydata">
        <vers num="1.5.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2114" seq="2008-2114" published="2008-05-08" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in emall/search.php in Pre Shopping Mall 1.1 allows remote attackers to execute arbitrary SQL commands via the search parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29067">29067</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42227">preshoppingmall-search-sql-injection(42227)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5551">5551</ref>
    </refs>
    <vuln_soft>
      <prod name="pre_shopping_mall" vendor="preprojects">
        <vers num="1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2115" seq="2008-2115" published="2008-05-08" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in editor.php in ScriptsEZ.net Power Editor 2.0 allow remote attackers to inject arbitrary web script or HTML via the (1) te and (2) dir parameters in a tempedit action.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3864">3864</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491702/100/0/threaded">20080506 Power Editor LOCAL FILE INCLUSION Vulnerbility</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29063">29063</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42223">powereditor-editor-xss(42223)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5549">5549</ref>
    </refs>
    <vuln_soft>
      <prod name="power_editor" vendor="scriptsez">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2116" seq="2008-2116" published="2008-05-08" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.4" CVSS_base_score="4.4" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple directory traversal vulnerabilities in editor.php in ScriptsEZ.net Power Editor 2.0 allow remote attackers to read arbitrary local files via a .. (dot dot) in the (1) te and (2) dir parameters in a tempedit action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3864">3864</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491702/100/0/threaded">20080506 Power Editor LOCAL FILE INCLUSION Vulnerbility</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29063">29063</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42222">powereditor-editor-file-include(42222)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5549">5549</ref>
    </refs>
    <vuln_soft>
      <prod name="power_editor" vendor="scriptsez">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2117" seq="2008-2117" published="2008-05-08" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in pages/news.page.inc in Project Alumni 1.0.9 allows remote attackers to inject arbitrary web script or HTML via the year parameter in a news action to index.php, a different vector than CVE-2007-6126.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3863">3863</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491552/100/0/threaded">20080502 project alumni v1.0.9 (info.php) SQL Injection Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29019">29019</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42149">projectalumni-year-xss(42149)</ref>
    </refs>
    <vuln_soft>
      <prod name="project_alumni" vendor="project_alumni">
        <vers num="1.0.9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2118" seq="2008-2118" published="2008-05-08" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in info.php in Project Alumni 1.0.9 allows remote attackers to execute arbitrary SQL commands via the id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3863">3863</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491552/100/0/threaded">20080502 project alumni v1.0.9 (info.php) SQL Injection Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29019">29019</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42148">projectalumni-info-sql-injection(42148)</ref>
    </refs>
    <vuln_soft>
      <prod name="project_alumni" vendor="project_alumni">
        <vers num="1.0.9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2119" seq="2008-2119" published="2008-06-04" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Asterisk Open Source 1.0.x and 1.2.x before 1.2.29 and Business Edition A.x.x and B.x.x before B.2.5.3, when pedantic parsing (aka pedanticsipchecking) is enabled, allows remote attackers to cause a denial of service (daemon crash) via a SIP INVITE message that lacks a From header, related to invocations of the ast_uri_decode function, and improper handling of (1) an empty const string and (2) a NULL pointer.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.digium.com/view.php?id=12607">http://bugs.digium.com/view.php?id=12607</ref>
      <ref source="CONFIRM" url="http://downloads.digium.com/pub/security/AST-2008-008.html">http://downloads.digium.com/pub/security/AST-2008-008.html</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200905-01.xml">GLSA-200905-01</ref>
      <ref source="CONFIRM" url="http://svn.digium.com/view/asterisk?view=rev&amp;revision=120109">http://svn.digium.com/view/asterisk?view=rev&amp;revision=120109</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493020/100/0/threaded">20080603 AST-2008-008: Remote Crash Vulnerability in SIP channel driver when run in pedantic mode</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020166">1020166</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1731">ADV-2008-1731</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42823">asterisk-asturidecode-dos(42823)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5749">5749</ref>
    </refs>
    <vuln_soft>
      <prod name="asterisk_business_edition" vendor="asterisk">
        <vers num="b.1.3.2"/>
        <vers num="b.1.3.3"/>
        <vers num="b.2.2.0"/>
        <vers num="b.2.2.1"/>
        <vers num="b.2.3.1"/>
        <vers num="b.2.3.2"/>
        <vers num="b.2.3.3"/>
        <vers num="b.2.3.4"/>
        <vers num="b.2.5.0"/>
        <vers num="b2.5.1"/>
        <vers num="b2.5.2" prev="1"/>
      </prod>
      <prod name="open_source" vendor="asterisk">
        <vers num="1.0"/>
        <vers num="1.0.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.4"/>
        <vers num="1.0.5"/>
        <vers num="1.0.6"/>
        <vers num="1.0.7"/>
        <vers num="1.0.8"/>
        <vers num="1.0.9"/>
        <vers num="1.0.11"/>
        <vers num="1.0.11.1"/>
        <vers num="1.0.12"/>
        <vers num="1.2.0"/>
        <vers num="1.2.0beta1"/>
        <vers num="1.2.0beta2"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2"/>
        <vers num="1.2.10"/>
        <vers num="1.2.11"/>
        <vers num="1.2.12"/>
        <vers num="1.2.12.1"/>
        <vers num="1.2.13"/>
        <vers num="1.2.14"/>
        <vers num="1.2.15"/>
        <vers num="1.2.16"/>
        <vers num="1.2.17"/>
        <vers num="1.2.18"/>
        <vers num="1.2.19"/>
        <vers num="1.2.20"/>
        <vers num="1.2.21"/>
        <vers num="1.2.21.1"/>
        <vers num="1.2.22"/>
        <vers num="1.2.23"/>
        <vers num="1.2.24"/>
        <vers num="1.2.25"/>
        <vers num="1.2.26"/>
        <vers num="1.2.26.1"/>
        <vers num="1.2.26.2"/>
        <vers num="1.2.27"/>
        <vers num="1.2.28" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2120" seq="2008-2120" published="2008-05-09" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Sun Java System Application Server 7 2004Q2 before Update 6, Web Server 6.1 before SP8, and Web Server 7.0 before Update 1 allows remote attackers to obtain source code of JSP files via unknown vectors.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-201255-1" patch="1">201255</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29088" patch="1">29088</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019985">1019985</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019986">1019986</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1457/references">ADV-2008-1457</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42266">javasystem-jsp-information-disclosure(42266)</ref>
    </refs>
    <vuln_soft>
      <prod name="java_system_application_server" vendor="sun">
        <vers num="7.0" prev="1"/>
      </prod>
      <prod name="java_system_web_server" vendor="sun">
        <vers num="6.1" prev="1" edition="sp7"/>
        <vers num="7.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2121" seq="2008-2121" published="2008-05-09" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">The TCP implementation in Sun Solaris 8, 9, and 10 allows remote attackers to cause a denial of service (CPU consumption and new connection timeouts) via a TCP SYN flood attack.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-200864-1">200864</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2008-206.htm">http://support.avaya.com/elmodocs2/security/ASA-2008-206.htm</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29089" patch="1">29089</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019989">1019989</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1453/references">ADV-2008-1453</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1585/references">ADV-2008-1585</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42264">sunsolaris-tcp-dos(42264)</ref>
    </refs>
    <vuln_soft>
      <prod name="sunos" vendor="sun">
        <vers num="5.8"/>
        <vers num="5.9"/>
        <vers num="5.10"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2122" seq="2008-2122" published="2008-05-09" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">IBM Rational Build Forge 7.0.2 allows remote attackers to cause a denial of service (CPU consumption) via a port scan, which spawns multiple bfagent server processes that attempt to read data from closed sockets.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29036">29036</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019964">1019964</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1427/references">ADV-2008-1427</ref>
      <ref source="CONFIRM" url="http://www-1.ibm.com/support/docview.wss?uid=swg21303877">http://www-1.ibm.com/support/docview.wss?uid=swg21303877</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42173">ibmrationalbuild-buildforgeagent-dos(42173)</ref>
    </refs>
    <vuln_soft>
      <prod name="rational_build_forge" vendor="ibm">
        <vers num="7.0.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2123" seq="2008-2123" published="2008-05-09" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in WGate in SAP Internet Transaction Server (ITS) 6.20 allows remote attackers to inject arbitrary web script or HTML via (1) a "&lt;&gt;" sequence in the ~service parameter to wgate.dll, or (2) Javascript splicing in the query string, a different vector than CVE-2006-5114.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.portcullis-security.com/275.php">http://www.portcullis-security.com/275.php</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29103">29103</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019998">1019998</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1466/references">ADV-2008-1466</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42281">sap-internettransactionserver-wgate-xss(42281)</ref>
    </refs>
    <vuln_soft>
      <prod name="internet_transaction_server" vendor="sap">
        <vers num="6200.1017.50954.0_build_730827"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2124" seq="2008-2124" published="2008-05-09" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in modules/print.asp in fipsASP fipsCMS allows remote attackers to execute arbitrary SQL commands via the lg parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29095">29095</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42257">fipscms-print-sql-injection(42257)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5553">5553</ref>
    </refs>
    <vuln_soft>
      <prod name="fipscms" vendor="fipsasp">
        <vers num="2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2125" seq="2008-2125" published="2008-05-09" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in viewalbums.php in Musicbox 2.3.6 and 2.3.7 allows remote attackers to execute arbitrary SQL commands via the artistId parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29100">29100</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42259">musicbox-viewalbums-sql-injection(42259)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5560">5560</ref>
    </refs>
    <vuln_soft>
      <prod name="musicbox" vendor="musicbox">
        <vers num="2.3.6"/>
        <vers num="2.3.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2126" seq="2008-2126" published="2008-05-09" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in Tux CMS 0.1 allow remote attackers to inject arbitrary web script or HTML via the (1) q parameter to index.php and the (2) returnURL parameter to tux-login.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=121019103418967&amp;w=2">20080507 Multiple XSS In TuxCMS All Version</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29090">29090</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42252">tuxcms-multiple-xss(42252)</ref>
    </refs>
    <vuln_soft>
      <prod name="tux_cms" vendor="tux_cms">
        <vers num="0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2127" seq="2008-2127" published="2008-05-09" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in search.php in CMS Faethon 2.2 Ultimate allows remote attackers to inject arbitrary web script or HTML via the what parameter.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29099">29099</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42258">cmsfaethon-search-xss(42258)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5558">5558</ref>
    </refs>
    <vuln_soft>
      <prod name="cms_faethon" vendor="cms_faethon">
        <vers num="2.2_ultimate"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2128" seq="2008-2128" published="2008-05-09" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in templates/header.php in CMS Faethon 2.2 Ultimate allows remote attackers to execute arbitrary PHP code via a URL in the mainpath parameter, a different vulnerability than CVE-2006-5588 and CVE-2006-3185.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42376">cmsfaethon-header-file-include(42376)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5558">5558</ref>
    </refs>
    <vuln_soft>
      <prod name="cms_faethon" vendor="cms_faethon">
        <vers num="2.2" edition=":ultimate"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2129" seq="2008-2129" published="2008-05-09" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in Galleristic 1.0, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the cat parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29096">29096</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42253">galleristic-index-sql-injection(42253)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5554">5554</ref>
    </refs>
    <vuln_soft>
      <prod name="galleristic" vendor="cine">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2130" seq="2008-2130" published="2008-05-09" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in poll_vote.php in iGaming CMS 1.5 allows remote attackers to execute arbitrary SQL commands via the id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://downloads.securityfocus.com/vulnerabilities/exploits/29059.pl">http://downloads.securityfocus.com/vulnerabilities/exploits/29059.pl</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29059">29059</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42229">igamingcms-pollvote-sql-injection(42229)</ref>
    </refs>
    <vuln_soft>
      <prod name="cms" vendor="igaming">
        <vers num="1.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2131" seq="2008-2131" published="2008-05-09" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in mvnForum 1.1 GA allows remote authenticated users to inject arbitrary web script or HTML via the topic field, which is later displayed by user/viewthread.jsp through use of the "quick reply button."</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://mvnforum.cvs.sourceforge.net/mvnforum/mvnforum/srcweb/mvnplugin/mvnforum/user/viewthread.jsp?r1=1.316&amp;r2=1.317" patch="1">http://mvnforum.cvs.sourceforge.net/mvnforum/mvnforum/srcweb/mvnplugin/mvnforum/user/viewthread.jsp?r1=1.316&amp;r2=1.317</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3862">3862</ref>
      <ref source="MISC" url="http://users.own-hero.net/~decoder/advisories/mvnforum-jsxss.txt">http://users.own-hero.net/~decoder/advisories/mvnforum-jsxss.txt</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491713/100/0/threaded">20080506 mvnForum 1.1 Cross Site Scripting</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29075">29075</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42241">mvnforum-quickreply-xss(42241)</ref>
    </refs>
    <vuln_soft>
      <prod name="mvnforum" vendor="myvietnam">
        <vers num="1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2132" seq="2008-2132" published="2008-05-09" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in step1.asp in Systementor PostcardMentor allows remote attackers to execute arbitrary SQL commands via the cat_fldAuto parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29094">29094</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42256">postcardmentor-step1-sql-injection(42256)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5556">5556</ref>
    </refs>
    <vuln_soft>
      <prod name="postcardmentor" vendor="systementor">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2133" seq="2008-2133" published="2008-05-09" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the Journal module in Tru-Zone Nuke ET 3.x allows remote attackers to inject arbitrary web script or HTML via the title parameter in a new entry, as demonstrated by a CSS property in the STYLE attribute of a DIV element, a different vulnerability than CVE-2008-1873.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://truzone.org/modules.php?name=Forums&amp;file=viewtopic&amp;t=55141">http://truzone.org/modules.php?name=Forums&amp;file=viewtopic&amp;t=55141</ref>
      <ref source="MISC" url="http://www.mrzayas.es/2008/05/04/multiples-vulnerabilidades-en-nuket-3x/">http://www.mrzayas.es/2008/05/04/multiples-vulnerabilidades-en-nuket-3x/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29080">29080</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42238">nukeet-journalentry-xss(42238)</ref>
    </refs>
    <vuln_soft>
      <prod name="nukeet" vendor="tru-zone">
        <vers num="3.0"/>
        <vers num="3.1"/>
        <vers num="3.2"/>
        <vers num="3.3"/>
        <vers num="3.4"/>
        <vers num="3.9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2134" seq="2008-2134" published="2008-05-09" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The Journal module in Tru-Zone Nuke ET 3.x allows remote attackers to obtain access to arbitrary user accounts, and alter or delete data, via a modified username in an unspecified cookie.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://truzone.org/modules.php?name=Forums&amp;file=viewtopic&amp;p=332746" patch="1">http://truzone.org/modules.php?name=Forums&amp;file=viewtopic&amp;p=332746</ref>
      <ref source="MISC" url="http://www.mrzayas.es/2008/05/04/multiples-vulnerabilidades-en-nuket-3x/">http://www.mrzayas.es/2008/05/04/multiples-vulnerabilidades-en-nuket-3x/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29080" patch="1">29080</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42239">nukeet-journalmodule-security-bypass(42239)</ref>
    </refs>
    <vuln_soft>
      <prod name="nukeet" vendor="tru-zone">
        <vers num="3.0"/>
        <vers num="3.1"/>
        <vers num="3.2"/>
        <vers num="3.3"/>
        <vers num="3.4"/>
        <vers num="3.9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2135" seq="2008-2135" published="2008-05-09" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in VisualShapers ezContents 2.0.0 allow remote attackers to execute arbitrary SQL commands via the (1) contentname parameter to showdetails.php and the (2) article parameter to printer.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3865">3865</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491813/100/0/threaded">20080508 ezContents CMS Version 2.0.0 SQL Injection Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29098">29098</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42260">ezcontents-showdetails-sql-injection(42260)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5559">5559</ref>
    </refs>
    <vuln_soft>
      <prod name="ezcontents" vendor="visualshapers">
        <vers num="2.0.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2136" seq="2008-2136" published="2008-05-16" modified="2018-10-31" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Memory leak in the ipip6_rcv function in net/ipv6/sit.c in the Linux kernel 2.4 before 2.4.36.5 and 2.6 before 2.6.25.3 allows remote attackers to cause a denial of service (memory consumption) via network traffic to a Simple Internet Transition (SIT) tunnel interface, related to the pskb_may_pull and kfree_skb functions, and management of an skb reference count.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.3" adv="1">http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.3</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html" adv="1">SUSE-SA:2008:030</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00002.html" adv="1">SUSE-SA:2008:032</ref>
      <ref source="MLIST" url="http://marc.info/?l=linux-netdev&amp;m=121031533024912&amp;w=2" adv="1">[linux-kernel] 20080509 Re: When should kfree_skb be used?</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2008-362.htm" adv="1">http://support.avaya.com/elmodocs2/security/ASA-2008-362.htm</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0169">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0169</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1588" adv="1">DSA-1588</ref>
      <ref source="CONFIRM" url="http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.36.5" adv="1">http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.36.5</ref>
      <ref source="CONFIRM" url="http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.3" adv="1">http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.3</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:167" adv="1">MDVSA-2008:167</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:174" adv="1">MDVSA-2008:174</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0585.html" adv="1">RHSA-2008:0585</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0607.html" adv="1">RHSA-2008:0607</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0612.html" adv="1">RHSA-2008:0612</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0787.html" adv="1">RHSA-2008:0787</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0973.html" adv="1">RHSA-2008:0973</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29235" adv="1">29235</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020118" adv="1">1020118</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-625-1" adv="1">USN-625-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1543/references" adv="1">ADV-2008-1543</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1716/references" adv="1">ADV-2008-1716</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42451" adv="1">linux-kernel-ipip6rcv-dos(42451)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11038">oval:org.mitre.oval:def:11038</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6503">oval:org.mitre.oval:def:6503</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00294.html" adv="1">FEDORA-2008-3949</ref>
    </refs>
    <vuln_soft>
      <prod name="ubuntu_linux" vendor="canonical">
        <vers num="6.06" edition=":~~lts~~~"/>
        <vers num="7.04"/>
        <vers num="7.10"/>
        <vers num="8.04" edition=":~~lts~~~"/>
      </prod>
      <prod name="debian_linux" vendor="debian">
        <vers num="4.0"/>
      </prod>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.4.0" edition="test1"/>
        <vers num="2.4.0" edition="test10"/>
        <vers num="2.4.0" edition="test11"/>
        <vers num="2.4.0" edition="test12"/>
        <vers num="2.4.0" edition="test2"/>
        <vers num="2.4.0" edition="test3"/>
        <vers num="2.4.0" edition="test4"/>
        <vers num="2.4.0" edition="test5"/>
        <vers num="2.4.0" edition="test6"/>
        <vers num="2.4.0" edition="test7"/>
        <vers num="2.4.0" edition="test8"/>
        <vers num="2.4.0" edition="test9"/>
        <vers num="2.4.1"/>
        <vers num="2.4.2"/>
        <vers num="2.4.3" edition="pre3"/>
        <vers num="2.4.4"/>
        <vers num="2.4.5"/>
        <vers num="2.4.6"/>
        <vers num="2.4.7"/>
        <vers num="2.4.8"/>
        <vers num="2.4.9"/>
        <vers num="2.4.10"/>
        <vers num="2.4.11" edition="pre3"/>
        <vers num="2.4.12"/>
        <vers num="2.4.13"/>
        <vers num="2.4.14"/>
        <vers num="2.4.15"/>
        <vers num="2.4.16"/>
        <vers num="2.4.17"/>
        <vers num="2.4.18" edition="pre1"/>
        <vers num="2.4.18" edition="pre2"/>
        <vers num="2.4.18" edition="pre3"/>
        <vers num="2.4.18" edition="pre4"/>
        <vers num="2.4.18" edition="pre5"/>
        <vers num="2.4.18" edition="pre6"/>
        <vers num="2.4.18" edition="pre7"/>
        <vers num="2.4.18" edition="pre8"/>
        <vers num="2.4.18" edition="pre9"/>
        <vers num="2.4.19" edition="pre1"/>
        <vers num="2.4.19" edition="pre2"/>
        <vers num="2.4.19" edition="pre3"/>
        <vers num="2.4.19" edition="pre4"/>
        <vers num="2.4.19" edition="pre5"/>
        <vers num="2.4.19" edition="pre6"/>
        <vers num="2.4.20"/>
        <vers num="2.4.21" edition="pre1"/>
        <vers num="2.4.21" edition="pre4"/>
        <vers num="2.4.21" edition="pre7"/>
        <vers num="2.4.22" edition="pre10"/>
        <vers num="2.4.23" edition="pre9"/>
        <vers num="2.4.24"/>
        <vers num="2.4.25"/>
        <vers num="2.4.26"/>
        <vers num="2.4.27" edition="pre1"/>
        <vers num="2.4.27" edition="pre2"/>
        <vers num="2.4.27" edition="pre3"/>
        <vers num="2.4.27" edition="pre4"/>
        <vers num="2.4.27" edition="pre5"/>
        <vers num="2.4.28"/>
        <vers num="2.4.29" edition="rc1"/>
        <vers num="2.4.29" edition="rc2"/>
        <vers num="2.4.30" edition="rc2"/>
        <vers num="2.4.30" edition="rc3"/>
        <vers num="2.4.31" edition="pre1"/>
        <vers num="2.4.32" edition="pre1"/>
        <vers num="2.4.32" edition="pre2"/>
        <vers num="2.4.33" edition="pre1"/>
        <vers num="2.4.33.1"/>
        <vers num="2.4.33.2"/>
        <vers num="2.4.33.3"/>
        <vers num="2.4.33.4"/>
        <vers num="2.4.33.5"/>
        <vers num="2.4.34" edition="rc3"/>
        <vers num="2.4.34.1"/>
        <vers num="2.4.34.2"/>
        <vers num="2.4.35"/>
        <vers num="2.4.35.2"/>
        <vers num="2.6.0" edition="test1"/>
        <vers num="2.6.0" edition="test10"/>
        <vers num="2.6.0" edition="test11"/>
        <vers num="2.6.0" edition="test2"/>
        <vers num="2.6.0" edition="test3"/>
        <vers num="2.6.0" edition="test4"/>
        <vers num="2.6.0" edition="test5"/>
        <vers num="2.6.0" edition="test6"/>
        <vers num="2.6.0" edition="test7"/>
        <vers num="2.6.0" edition="test8"/>
        <vers num="2.6.0" edition="test9"/>
        <vers num="2.6.1" edition="rc1"/>
        <vers num="2.6.1" edition="rc2"/>
        <vers num="2.6.1" edition="rc3"/>
        <vers num="2.6.2" edition="rc1"/>
        <vers num="2.6.2" edition="rc2"/>
        <vers num="2.6.2" edition="rc3"/>
        <vers num="2.6.3" edition="rc1"/>
        <vers num="2.6.3" edition="rc2"/>
        <vers num="2.6.3" edition="rc3"/>
        <vers num="2.6.3" edition="rc4"/>
        <vers num="2.6.4" edition="rc1"/>
        <vers num="2.6.4" edition="rc2"/>
        <vers num="2.6.4" edition="rc3"/>
        <vers num="2.6.5" edition="rc1"/>
        <vers num="2.6.5" edition="rc2"/>
        <vers num="2.6.5" edition="rc3"/>
        <vers num="2.6.6" edition="rc1"/>
        <vers num="2.6.6" edition="rc2"/>
        <vers num="2.6.6" edition="rc3"/>
        <vers num="2.6.7" edition="rc1"/>
        <vers num="2.6.7" edition="rc2"/>
        <vers num="2.6.7" edition="rc3"/>
        <vers num="2.6.8" edition="rc1"/>
        <vers num="2.6.8" edition="rc2"/>
        <vers num="2.6.8" edition="rc3"/>
        <vers num="2.6.8" edition="rc4"/>
        <vers num="2.6.8.1"/>
        <vers num="2.6.9" edition="final"/>
        <vers num="2.6.9" edition="rc1"/>
        <vers num="2.6.9" edition="rc2"/>
        <vers num="2.6.9" edition="rc3"/>
        <vers num="2.6.9" edition="rc4"/>
        <vers num="2.6.10" edition="rc1"/>
        <vers num="2.6.10" edition="rc2"/>
        <vers num="2.6.10" edition="rc3"/>
        <vers num="2.6.11" edition="rc1"/>
        <vers num="2.6.11" edition="rc2"/>
        <vers num="2.6.11" edition="rc3"/>
        <vers num="2.6.11" edition="rc4"/>
        <vers num="2.6.11" edition="rc5"/>
        <vers num="2.6.11.1"/>
        <vers num="2.6.11.2"/>
        <vers num="2.6.11.3"/>
        <vers num="2.6.11.4"/>
        <vers num="2.6.11.5"/>
        <vers num="2.6.11.6"/>
        <vers num="2.6.11.7"/>
        <vers num="2.6.11.8"/>
        <vers num="2.6.11.9"/>
        <vers num="2.6.11.10"/>
        <vers num="2.6.11.11"/>
        <vers num="2.6.11.12"/>
        <vers num="2.6.12" edition="rc1"/>
        <vers num="2.6.12" edition="rc2"/>
        <vers num="2.6.12" edition="rc3"/>
        <vers num="2.6.12" edition="rc4"/>
        <vers num="2.6.12" edition="rc5"/>
        <vers num="2.6.12" edition="rc6"/>
        <vers num="2.6.12.1"/>
        <vers num="2.6.12.2"/>
        <vers num="2.6.12.3"/>
        <vers num="2.6.12.4"/>
        <vers num="2.6.12.5"/>
        <vers num="2.6.12.6"/>
        <vers num="2.6.13" edition="rc1"/>
        <vers num="2.6.13" edition="rc2"/>
        <vers num="2.6.13" edition="rc3"/>
        <vers num="2.6.13" edition="rc4"/>
        <vers num="2.6.13" edition="rc5"/>
        <vers num="2.6.13" edition="rc6"/>
        <vers num="2.6.13" edition="rc7"/>
        <vers num="2.6.13.1"/>
        <vers num="2.6.13.2"/>
        <vers num="2.6.13.3"/>
        <vers num="2.6.13.4"/>
        <vers num="2.6.13.5"/>
        <vers num="2.6.14" edition="rc1"/>
        <vers num="2.6.14" edition="rc2"/>
        <vers num="2.6.14" edition="rc3"/>
        <vers num="2.6.14" edition="rc4"/>
        <vers num="2.6.14" edition="rc5"/>
        <vers num="2.6.14.1"/>
        <vers num="2.6.14.2"/>
        <vers num="2.6.14.3"/>
        <vers num="2.6.14.4"/>
        <vers num="2.6.14.5"/>
        <vers num="2.6.14.6"/>
        <vers num="2.6.14.7"/>
        <vers num="2.6.15" edition="rc1"/>
        <vers num="2.6.15" edition="rc2"/>
        <vers num="2.6.15" edition="rc3"/>
        <vers num="2.6.15" edition="rc4"/>
        <vers num="2.6.15" edition="rc5"/>
        <vers num="2.6.15" edition="rc6"/>
        <vers num="2.6.15" edition="rc7"/>
        <vers num="2.6.15.1"/>
        <vers num="2.6.15.2"/>
        <vers num="2.6.15.3"/>
        <vers num="2.6.15.4"/>
        <vers num="2.6.15.5"/>
        <vers num="2.6.15.6"/>
        <vers num="2.6.15.7"/>
        <vers num="2.6.15.8"/>
        <vers num="2.6.15.9"/>
        <vers num="2.6.15.10"/>
        <vers num="2.6.15.11"/>
        <vers num="2.6.16" edition="rc1"/>
        <vers num="2.6.16" edition="rc2"/>
        <vers num="2.6.16" edition="rc3"/>
        <vers num="2.6.16" edition="rc4"/>
        <vers num="2.6.16" edition="rc5"/>
        <vers num="2.6.16" edition="rc6"/>
        <vers num="2.6.16" edition="rc7"/>
        <vers num="2.6.16.1"/>
        <vers num="2.6.16.2"/>
        <vers num="2.6.16.3"/>
        <vers num="2.6.16.4"/>
        <vers num="2.6.16.5"/>
        <vers num="2.6.16.6"/>
        <vers num="2.6.16.7"/>
        <vers num="2.6.16.8"/>
        <vers num="2.6.16.9"/>
        <vers num="2.6.16.10"/>
        <vers num="2.6.16.11"/>
        <vers num="2.6.16.12"/>
        <vers num="2.6.16.13"/>
        <vers num="2.6.16.14"/>
        <vers num="2.6.16.15"/>
        <vers num="2.6.16.16"/>
        <vers num="2.6.16.17"/>
        <vers num="2.6.16.18"/>
        <vers num="2.6.16.19"/>
        <vers num="2.6.16.20"/>
        <vers num="2.6.16.21"/>
        <vers num="2.6.16.22"/>
        <vers num="2.6.16.23"/>
        <vers num="2.6.16.24"/>
        <vers num="2.6.16.25"/>
        <vers num="2.6.16.26"/>
        <vers num="2.6.16.27"/>
        <vers num="2.6.16.28"/>
        <vers num="2.6.16.29"/>
        <vers num="2.6.16.30"/>
        <vers num="2.6.16.31"/>
        <vers num="2.6.16.32"/>
        <vers num="2.6.16.33"/>
        <vers num="2.6.16.34"/>
        <vers num="2.6.16.35"/>
        <vers num="2.6.16.36"/>
        <vers num="2.6.16.37"/>
        <vers num="2.6.16.38"/>
        <vers num="2.6.16.39"/>
        <vers num="2.6.16.40"/>
        <vers num="2.6.16.41"/>
        <vers num="2.6.16.42"/>
        <vers num="2.6.16.43"/>
        <vers num="2.6.16.44"/>
        <vers num="2.6.16.45"/>
        <vers num="2.6.16.46"/>
        <vers num="2.6.16.47"/>
        <vers num="2.6.16.48"/>
        <vers num="2.6.16.49"/>
        <vers num="2.6.16.50"/>
        <vers num="2.6.16.51"/>
        <vers num="2.6.16.52"/>
        <vers num="2.6.16.53"/>
        <vers num="2.6.16.54"/>
        <vers num="2.6.16.55"/>
        <vers num="2.6.16.56"/>
        <vers num="2.6.16.57"/>
        <vers num="2.6.16.58"/>
        <vers num="2.6.16.59"/>
        <vers num="2.6.16.60"/>
        <vers num="2.6.16.61"/>
        <vers num="2.6.16.62"/>
        <vers num="2.6.17" edition="rc1"/>
        <vers num="2.6.17" edition="rc2"/>
        <vers num="2.6.17" edition="rc3"/>
        <vers num="2.6.17" edition="rc4"/>
        <vers num="2.6.17" edition="rc5"/>
        <vers num="2.6.17" edition="rc6"/>
        <vers num="2.6.17.1"/>
        <vers num="2.6.17.2"/>
        <vers num="2.6.17.3"/>
        <vers num="2.6.17.4"/>
        <vers num="2.6.17.5"/>
        <vers num="2.6.17.6"/>
        <vers num="2.6.17.7"/>
        <vers num="2.6.17.8"/>
        <vers num="2.6.17.9"/>
        <vers num="2.6.17.10"/>
        <vers num="2.6.17.11"/>
        <vers num="2.6.17.12"/>
        <vers num="2.6.17.13"/>
        <vers num="2.6.17.14"/>
        <vers num="2.6.18" edition="rc1"/>
        <vers num="2.6.18" edition="rc2"/>
        <vers num="2.6.18" edition="rc3"/>
        <vers num="2.6.18" edition="rc4"/>
        <vers num="2.6.18" edition="rc5"/>
        <vers num="2.6.18" edition="rc6"/>
        <vers num="2.6.18" edition="rc7"/>
        <vers num="2.6.18.1"/>
        <vers num="2.6.18.2"/>
        <vers num="2.6.18.3"/>
        <vers num="2.6.18.4"/>
        <vers num="2.6.18.5"/>
        <vers num="2.6.18.6"/>
        <vers num="2.6.18.7"/>
        <vers num="2.6.18.8"/>
        <vers num="2.6.19" edition="rc1"/>
        <vers num="2.6.19" edition="rc2"/>
        <vers num="2.6.19" edition="rc3"/>
        <vers num="2.6.19" edition="rc4"/>
        <vers num="2.6.19" edition="rc5"/>
        <vers num="2.6.19" edition="rc6"/>
        <vers num="2.6.19.0"/>
        <vers num="2.6.19.1"/>
        <vers num="2.6.19.2"/>
        <vers num="2.6.19.3"/>
        <vers num="2.6.19.4"/>
        <vers num="2.6.19.5"/>
        <vers num="2.6.19.6"/>
        <vers num="2.6.19.7"/>
        <vers num="2.6.20" edition="rc1"/>
        <vers num="2.6.20" edition="rc2"/>
        <vers num="2.6.20" edition="rc3"/>
        <vers num="2.6.20" edition="rc4"/>
        <vers num="2.6.20" edition="rc5"/>
        <vers num="2.6.20" edition="rc6"/>
        <vers num="2.6.20" edition="rc7"/>
        <vers num="2.6.20.1"/>
        <vers num="2.6.20.2"/>
        <vers num="2.6.20.3"/>
        <vers num="2.6.20.4"/>
        <vers num="2.6.20.5"/>
        <vers num="2.6.20.6"/>
        <vers num="2.6.20.7"/>
        <vers num="2.6.20.8"/>
        <vers num="2.6.20.9"/>
        <vers num="2.6.20.10"/>
        <vers num="2.6.20.11"/>
        <vers num="2.6.20.12"/>
        <vers num="2.6.20.13"/>
        <vers num="2.6.20.14"/>
        <vers num="2.6.20.15"/>
        <vers num="2.6.20.16"/>
        <vers num="2.6.20.17"/>
        <vers num="2.6.20.18"/>
        <vers num="2.6.20.19"/>
        <vers num="2.6.20.20"/>
        <vers num="2.6.20.21"/>
        <vers num="2.6.21" edition="git1"/>
        <vers num="2.6.21" edition="git2"/>
        <vers num="2.6.21" edition="git3"/>
        <vers num="2.6.21" edition="git4"/>
        <vers num="2.6.21" edition="git5"/>
        <vers num="2.6.21" edition="git6"/>
        <vers num="2.6.21" edition="git7"/>
        <vers num="2.6.21" edition="rc1"/>
        <vers num="2.6.21" edition="rc2"/>
        <vers num="2.6.21" edition="rc3"/>
        <vers num="2.6.21" edition="rc4"/>
        <vers num="2.6.21" edition="rc5"/>
        <vers num="2.6.21" edition="rc6"/>
        <vers num="2.6.21" edition="rc7"/>
        <vers num="2.6.21.1"/>
        <vers num="2.6.21.2"/>
        <vers num="2.6.21.3"/>
        <vers num="2.6.21.4"/>
        <vers num="2.6.21.5"/>
        <vers num="2.6.21.6"/>
        <vers num="2.6.21.7"/>
        <vers num="2.6.22" edition="rc1"/>
        <vers num="2.6.22" edition="rc2"/>
        <vers num="2.6.22" edition="rc3"/>
        <vers num="2.6.22" edition="rc4"/>
        <vers num="2.6.22" edition="rc5"/>
        <vers num="2.6.22" edition="rc6"/>
        <vers num="2.6.22" edition="rc7"/>
        <vers num="2.6.22.1"/>
        <vers num="2.6.22.2"/>
        <vers num="2.6.22.3"/>
        <vers num="2.6.22.4"/>
        <vers num="2.6.22.5"/>
        <vers num="2.6.22.6"/>
        <vers num="2.6.22.7"/>
        <vers num="2.6.22.8"/>
        <vers num="2.6.22.9"/>
        <vers num="2.6.22.10"/>
        <vers num="2.6.22.11"/>
        <vers num="2.6.22.12"/>
        <vers num="2.6.22.13"/>
        <vers num="2.6.22.14"/>
        <vers num="2.6.22.15"/>
        <vers num="2.6.22.16"/>
        <vers num="2.6.22.17"/>
        <vers num="2.6.22.18"/>
        <vers num="2.6.22.19"/>
        <vers num="2.6.22.20"/>
        <vers num="2.6.22.21"/>
        <vers num="2.6.22.22"/>
        <vers num="2.6.23" edition="rc1"/>
        <vers num="2.6.23" edition="rc2"/>
        <vers num="2.6.23" edition="rc3"/>
        <vers num="2.6.23" edition="rc4"/>
        <vers num="2.6.23" edition="rc5"/>
        <vers num="2.6.23" edition="rc6"/>
        <vers num="2.6.23" edition="rc7"/>
        <vers num="2.6.23" edition="rc8"/>
        <vers num="2.6.23" edition="rc9"/>
        <vers num="2.6.23.1"/>
        <vers num="2.6.23.2"/>
        <vers num="2.6.23.3"/>
        <vers num="2.6.23.4"/>
        <vers num="2.6.23.5"/>
        <vers num="2.6.23.6"/>
        <vers num="2.6.23.7"/>
        <vers num="2.6.23.8"/>
        <vers num="2.6.23.9"/>
        <vers num="2.6.23.10"/>
        <vers num="2.6.23.11"/>
        <vers num="2.6.23.12"/>
        <vers num="2.6.23.13"/>
        <vers num="2.6.23.14"/>
        <vers num="2.6.23.15"/>
        <vers num="2.6.23.16"/>
        <vers num="2.6.23.17"/>
        <vers num="2.6.24" edition="rc1"/>
        <vers num="2.6.24" edition="rc2"/>
        <vers num="2.6.24" edition="rc3"/>
        <vers num="2.6.24" edition="rc4"/>
        <vers num="2.6.24" edition="rc5"/>
        <vers num="2.6.24" edition="rc6"/>
        <vers num="2.6.24" edition="rc7"/>
        <vers num="2.6.24" edition="rc8"/>
        <vers num="2.6.24.1"/>
        <vers num="2.6.24.2"/>
        <vers num="2.6.24.3"/>
        <vers num="2.6.24.4"/>
        <vers num="2.6.24.5"/>
        <vers num="2.6.24.6"/>
        <vers num="2.6.24.7"/>
        <vers num="2.6.25" edition="rc1"/>
        <vers num="2.6.25" edition="rc2"/>
        <vers num="2.6.25" edition="rc3"/>
        <vers num="2.6.25" edition="rc4"/>
        <vers num="2.6.25" edition="rc5"/>
        <vers num="2.6.25" edition="rc6"/>
        <vers num="2.6.25" edition="rc7"/>
        <vers num="2.6.25" edition="rc8"/>
        <vers num="2.6.25" edition="rc9"/>
        <vers num="2.6.25.1"/>
        <vers num="2.6.25.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2137" seq="2008-2137" published="2008-05-29" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="4.4" CVSS_base_score="4.4" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The (1) sparc_mmap_check function in arch/sparc/kernel/sys_sparc.c and the (2) sparc64_mmap_check function in arch/sparc64/kernel/sys_sparc.c, in the Linux kernel 2.4 before 2.4.36.5 and 2.6 before 2.6.25.3, omit some virtual-address range (aka span) checks when the mmap MAP_FIXED bit is not set, which allows local users to cause a denial of service (panic) via unspecified mmap calls.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MLIST" url="http://kerneltrap.org/mailarchive/git-commits-head/2008/5/8/1760604">[git-commits-head] 20080507 sparc: Fix mmap VA span checking.</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1588">DSA-1588</ref>
      <ref source="CONFIRM" url="http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.36.5">http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.36.5</ref>
      <ref source="CONFIRM" url="http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.3">http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.3</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29397">29397</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020119">1020119</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-625-1">USN-625-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1716/references">ADV-2008-1716</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42681">linux-kernel-mmap-dos(42681)</ref>
    </refs>
    <vuln_soft>
      <prod name="debian_linux" vendor="debian">
        <vers num="4.0" edition=":sparc"/>
      </prod>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.6.0"/>
        <vers num="2.6.1"/>
        <vers num="2.6.2"/>
        <vers num="2.6.3"/>
        <vers num="2.6.4"/>
        <vers num="2.6.5"/>
        <vers num="2.6.6"/>
        <vers num="2.6.7"/>
        <vers num="2.6.8"/>
        <vers num="2.6.9"/>
        <vers num="2.6.10"/>
        <vers num="2.6.11"/>
        <vers num="2.6.11.4"/>
        <vers num="2.6.11.5"/>
        <vers num="2.6.11.6"/>
        <vers num="2.6.11.7"/>
        <vers num="2.6.11.8"/>
        <vers num="2.6.11.11"/>
        <vers num="2.6.11.12"/>
        <vers num="2.6.12"/>
        <vers num="2.6.12.1"/>
        <vers num="2.6.12.2"/>
        <vers num="2.6.12.3"/>
        <vers num="2.6.12.4"/>
        <vers num="2.6.12.5"/>
        <vers num="2.6.12.6"/>
        <vers num="2.6.12.12"/>
        <vers num="2.6.12.22"/>
        <vers num="2.6.13"/>
        <vers num="2.6.13.1"/>
        <vers num="2.6.13.2"/>
        <vers num="2.6.13.3"/>
        <vers num="2.6.13.4"/>
        <vers num="2.6.14"/>
        <vers num="2.6.14.1"/>
        <vers num="2.6.14.2"/>
        <vers num="2.6.14.3"/>
        <vers num="2.6.14.4"/>
        <vers num="2.6.14.5"/>
        <vers num="2.6.15"/>
        <vers num="2.6.15.1"/>
        <vers num="2.6.15.2"/>
        <vers num="2.6.15.3"/>
        <vers num="2.6.15.4"/>
        <vers num="2.6.15.5"/>
        <vers num="2.6.15.11"/>
        <vers num="2.6.16"/>
        <vers num="2.6.16.13"/>
        <vers num="2.6.16.27"/>
        <vers num="2.6.17"/>
        <vers num="2.6.17.1"/>
        <vers num="2.6.17.2"/>
        <vers num="2.6.17.3"/>
        <vers num="2.6.17.5"/>
        <vers num="2.6.17.6"/>
        <vers num="2.6.17.7"/>
        <vers num="2.6.17.8"/>
        <vers num="2.6.17.10"/>
        <vers num="2.6.17.11"/>
        <vers num="2.6.17.12"/>
        <vers num="2.6.17.13"/>
        <vers num="2.6.17.14"/>
        <vers num="2.6.18"/>
        <vers num="2.6.18.1"/>
        <vers num="2.6.18.3"/>
        <vers num="2.6.18.4"/>
        <vers num="2.6.19"/>
        <vers num="2.6.19.1"/>
        <vers num="2.6.19.2"/>
        <vers num="2.6.20"/>
        <vers num="2.6.20.1"/>
        <vers num="2.6.20.2"/>
        <vers num="2.6.20.3"/>
        <vers num="2.6.20.4"/>
        <vers num="2.6.20.5"/>
        <vers num="2.6.20.8"/>
        <vers num="2.6.20.9"/>
        <vers num="2.6.20.11"/>
        <vers num="2.6.20.13"/>
        <vers num="2.6.20.15"/>
        <vers num="2.6.21"/>
        <vers num="2.6.21.1"/>
        <vers num="2.6.21.2"/>
        <vers num="2.6.21.4"/>
        <vers num="2.6.21.6"/>
        <vers num="2.6.21.7"/>
        <vers num="2.6.22"/>
        <vers num="2.6.22.3"/>
        <vers num="2.6.22.4"/>
        <vers num="2.6.22.5"/>
        <vers num="2.6.22.6"/>
        <vers num="2.6.22.7"/>
        <vers num="2.6.22.8"/>
        <vers num="2.6.22.11"/>
        <vers num="2.6.22.12"/>
        <vers num="2.6.22.13"/>
        <vers num="2.6.22.14"/>
        <vers num="2.6.22.15"/>
        <vers num="2.6.22.16"/>
        <vers num="2.6.22.17"/>
        <vers num="2.6.23"/>
        <vers num="2.6.23.1"/>
        <vers num="2.6.23.2"/>
        <vers num="2.6.23.3"/>
        <vers num="2.6.23.4"/>
        <vers num="2.6.23.5"/>
        <vers num="2.6.23.6"/>
        <vers num="2.6.23.7"/>
        <vers num="2.6.23.9"/>
        <vers num="2.6.23.14"/>
        <vers num="2.6.24.1"/>
        <vers num="2.6.24.2"/>
        <vers num="2.6.25"/>
        <vers num="2.6.25.1"/>
        <vers num="2.6.25.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2138" seq="2008-2138" published="2008-05-12" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Oracle Application Server (OracleAS) Portal 10g allows remote attackers to bypass intended access restrictions and read the contents of /dav_portal/portal/ by sending a request containing a trailing "%0A" (encoded line feed), then using the session ID that is generated from that request.  NOTE: as of 20080512, Oracle has not commented on the accuracy of this report.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3867">3867</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491865/100/0/threaded">20080509 Oracle Application Server 10G ORA_DAV Basic Authentication Bypass Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29119">29119</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020034">1020034</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42302">oracle-aps-cookie-auth-bypass(42302)</ref>
    </refs>
    <vuln_soft>
      <prod name="application_server_portal" vendor="oracle">
        <vers num="10g"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2139" seq="2008-2139" published="2008-05-12" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="2.5" CVSS_vector="(AV:A/AC:H/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The rootpw plugin in rPath Appliance Platform Agent 2 and 3 does not re-validate requests from a browser with a valid administrator session, including requests to change the password, which makes it easier for physically proximate attackers to gain privileges and maintain control over the administrator account.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local_network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0148">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0148</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42393">rootpw-rpath-appliance-csrf(42393)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42394">rootpw-rpath-appliance-privilege-escalation(42394)</ref>
    </refs>
    <vuln_soft>
      <prod name="appliance_platform_agent" vendor="rpath">
        <vers num="2"/>
        <vers num="3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2140" seq="2008-2140" published="2008-05-12" modified="2017-08-07" severity="Low" CVSS_version="2.0" CVSS_score="2.6" CVSS_base_score="2.6" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site request forgery (CSRF) vulnerability in the rootpw plugin in rPath Appliance Platform Agent 2 and 3 allows remote attackers to reset the root password as the administrator via a crafted URL.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0148">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0148</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42393">rootpw-rpath-appliance-csrf(42393)</ref>
    </refs>
    <vuln_soft>
      <prod name="appliance_platform_agent" vendor="rpath">
        <vers num="2"/>
        <vers num="3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2142" seq="2008-2142" published="2008-05-12" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Emacs 21 and XEmacs automatically load and execute .flc (fast lock) files that are associated with other files that are edited within Emacs, which allows user-assisted attackers to execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MLIST" url="http://lists.gnu.org/archive/html/emacs-devel/2008-05/msg00645.html">[emacs-devel] 20080510 [mwelinder@bogus.example.com: Emacs security bug]</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00001.html">SUSE-SR:2008:012</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200902-06.xml">GLSA-200902-06</ref>
      <ref source="MISC" url="http://thread.gmane.org/gmane.emacs.devel/96903">http://thread.gmane.org/gmane.emacs.devel/96903</ref>
      <ref source="MISC" url="http://tracker.xemacs.org/XEmacs/its/issue378">http://tracker.xemacs.org/XEmacs/its/issue378</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0177">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0177</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:153">MDVSA-2008:153</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:154">MDVSA-2008:154</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492657/100/0/threaded">20080527 rPSA-2008-0177-1 emacs emacs-leim</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29176">29176</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020019">1020019</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1539/references">ADV-2008-1539</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1540/references">ADV-2008-1540</ref>
      <ref source="CONFIRM" url="https://bugs.gentoo.org/show_bug.cgi?id=221197">https://bugs.gentoo.org/show_bug.cgi?id=221197</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42362">xemacs-gnuemacs-flc-code-execution(42362)</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2529">https://issues.rpath.com/browse/RPL-2529</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00736.html">FEDORA-2008-5446</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00782.html">FEDORA-2008-5504</ref>
    </refs>
    <vuln_soft>
      <prod name="emacs" vendor="gnu">
        <vers num="21.3.1"/>
      </prod>
      <prod name="xemacs" vendor="gnu">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2143" seq="2008-2143" published="2008-05-12" modified="2017-08-07" severity="Low" CVSS_version="2.0" CVSS_score="1.9" CVSS_base_score="1.9" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Unspecified versions of Microsoft Outlook Web Access (OWA) use the Cache-Control: no-cache HTTP directive instead of no-store, which might cause web browsers that follow RFC-2616 to cache sensitive information.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/829876">VU#829876</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29121">29121</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42301">microsoft-owa-nostore-info-disclosure(42301)</ref>
    </refs>
    <vuln_soft>
      <prod name="outlook_web_access" vendor="microsoft">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2144" seq="2008-2144" published="2008-05-12" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple unspecified vulnerabilities in Solaris print service for Sun Solaris 8, 9, and 10 allow remote attackers to cause a denial of service or execute arbitrary code via unknown vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-236884-1">236884</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2008-216.htm">http://support.avaya.com/elmodocs2/security/ASA-2008-216.htm</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29135">29135</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020003">1020003</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1473/references">ADV-2008-1473</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1709/references">ADV-2008-1709</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42322">solaris-print-code-execution(42322)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5269">oval:org.mitre.oval:def:5269</ref>
    </refs>
    <vuln_soft>
      <prod name="sunos" vendor="sun">
        <vers num="5.8"/>
        <vers num="5.9"/>
        <vers num="5.10"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2145" seq="2008-2145" published="2008-05-12" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in Novell Client 4.91 SP4 and earlier allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long username in the "forgotten password" dialog.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3868">3868</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491814/100/0/threaded">20080508 Novell Client &lt;= 4.91 SP4 Local Stack overflow / B.S.O.D (unauthentificated user)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29109">29109</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020020">1020020</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1503">ADV-2008-1503</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42359">novell-client-username-bo(42359)</ref>
    </refs>
    <vuln_soft>
      <prod name="client" vendor="novell">
        <vers num="4.91" edition="sp1"/>
        <vers num="4.91" edition="sp2"/>
        <vers num="4.91" edition="sp3"/>
        <vers num="4.91" edition="sp4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2146" seq="2008-2146" published="2008-05-12" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">wp-includes/vars.php in Wordpress before 2.2.3 does not properly extract the current path from the PATH_INFO ($PHP_SELF), which allows remote attackers to bypass intended access restrictions for certain pages.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://trac.wordpress.org/changeset/6029">http://trac.wordpress.org/changeset/6029</ref>
      <ref source="CONFIRM" url="http://trac.wordpress.org/changeset?old_path=tags%2F2.2.2&amp;old=6063&amp;new_path=tags%2F2.2.3&amp;new=6063#file10">http://trac.wordpress.org/changeset?old_path=tags%2F2.2.2&amp;old=6063&amp;new_path=tags%2F2.2.3&amp;new=6063#file10</ref>
      <ref source="CONFIRM" url="http://trac.wordpress.org/ticket/4748" patch="1">http://trac.wordpress.org/ticket/4748</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42379">wordpress-vars-security-bypass(42379)</ref>
    </refs>
    <vuln_soft>
      <prod name="wordpress" vendor="wordpress">
        <vers num="0.6.2"/>
        <vers num="0.6.2.1"/>
        <vers num="0.7"/>
        <vers num="0.71"/>
        <vers num="0.711"/>
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.2"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2"/>
        <vers num="1.3.1"/>
        <vers num="1.4"/>
        <vers num="1.5"/>
        <vers num="1.5-strayhorn"/>
        <vers num="1.5.1"/>
        <vers num="1.5.1.1"/>
        <vers num="1.5.1.2"/>
        <vers num="1.5.1.3"/>
        <vers num="1.5.2"/>
        <vers num="1.6"/>
        <vers num="2.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
        <vers num="2.0.4"/>
        <vers num="2.0.5"/>
        <vers num="2.0.6"/>
        <vers num="2.0.7"/>
        <vers num="2.0.8"/>
        <vers num="2.0.9"/>
        <vers num="2.0.10"/>
        <vers num="2.0.10_rc1"/>
        <vers num="2.0.10_rc2"/>
        <vers num="2.0.11"/>
        <vers num="2.1"/>
        <vers num="2.1.1"/>
        <vers num="2.1.2"/>
        <vers num="2.1.3"/>
        <vers num="2.1.3_rc1"/>
        <vers num="2.1.3_rc2"/>
        <vers num="2.2"/>
        <vers num="2.2.0"/>
        <vers num="2.2.1"/>
        <vers num="2.2.2" prev="1"/>
        <vers num="2.2_revision5002"/>
        <vers num="2.2_revision5003"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2147" seq="2008-2147" published="2008-05-12" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Untrusted search path vulnerability in VideoLAN VLC before 0.9.0 allows local users to execute arbitrary code via a malicious library under the modules/ or plugins/ subdirectories of the current working directory.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://git.videolan.org/?p=vlc.git;a=commit;h=c7cef4fdd8dd72ce0a45be3cda8ba98df5e83181">http://git.videolan.org/?p=vlc.git;a=commit;h=c7cef4fdd8dd72ce0a45be3cda8ba98df5e83181</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200807-13.xml">GLSA-200807-13</ref>
      <ref source="CONFIRM" url="http://trac.videolan.org/vlc/ticket/1578">http://trac.videolan.org/vlc/ticket/1578</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42377">vlc-searchpath-code-execution(42377)</ref>
    </refs>
    <vuln_soft>
      <prod name="vlc" vendor="videolan">
        <vers num="0.4.6"/>
        <vers num="0.5.0"/>
        <vers num="0.5.1"/>
        <vers num="0.5.1a"/>
        <vers num="0.5.2"/>
        <vers num="0.5.3"/>
        <vers num="0.6.0"/>
        <vers num="0.6.1"/>
        <vers num="0.6.2"/>
        <vers num="0.7.0"/>
        <vers num="0.7.1"/>
        <vers num="0.7.2"/>
        <vers num="0.8.0"/>
        <vers num="0.8.1"/>
        <vers num="0.8.2"/>
        <vers num="0.8.4"/>
        <vers num="0.8.4a"/>
        <vers num="0.8.5"/>
        <vers num="0.8.6" prev="1"/>
        <vers num="0.8.6a"/>
        <vers num="0.8.6b"/>
        <vers num="0.8.6c"/>
        <vers num="0.8.6d"/>
        <vers num="0.8.6e"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2148" seq="2008-2148" published="2008-05-12" modified="2017-08-07" severity="Low" CVSS_version="2.0" CVSS_score="3.6" CVSS_base_score="3.6" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:P)">
    <desc>
      <descript source="cve">The utimensat system call (sys_utimensat) in Linux kernel 2.6.22 and other versions before 2.6.25.3 does not check file permissions when certain UTIME_NOW and UTIME_OMIT combinations are used, which allows local users to modify file times of arbitrary files, possibly leading to a denial of service.</descript>
    </desc>
    <loss_types>
      <avail/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git;a=commit;h=f9dfda1ad0637a89a64d001cf81478bd8d9b6306">http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git;a=commit;h=f9dfda1ad0637a89a64d001cf81478bd8d9b6306</ref>
      <ref source="CONFIRM" url="http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.3">http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.3</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html">SUSE-SA:2008:030</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0169">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0169</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:167">MDVSA-2008:167</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0585.html">RHSA-2008:0585</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29134">29134</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-625-1">USN-625-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1543/references" adv="1">ADV-2008-1543</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42342">linux-kernel-sysutimensat-dos(42342)</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.6.22"/>
        <vers num="2.6.22.1"/>
        <vers num="2.6.22.2"/>
        <vers num="2.6.22.3"/>
        <vers num="2.6.22.4"/>
        <vers num="2.6.22.5"/>
        <vers num="2.6.22.6"/>
        <vers num="2.6.22.7"/>
        <vers num="2.6.22.8"/>
        <vers num="2.6.22.9"/>
        <vers num="2.6.22.10"/>
        <vers num="2.6.22.11"/>
        <vers num="2.6.22.12"/>
        <vers num="2.6.22.13"/>
        <vers num="2.6.22.14"/>
        <vers num="2.6.22.15"/>
        <vers num="2.6.22.16"/>
        <vers num="2.6.22.17"/>
        <vers num="2.6.22.18"/>
        <vers num="2.6.22.19"/>
        <vers num="2.6.22.20"/>
        <vers num="2.6.22.21"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2149" seq="2008-2149" published="2008-05-12" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the searchwn function in Wordnet 2.0, 2.1, and 3.0 might allow context-dependent attackers to execute arbitrary code via a long command line option.  NOTE: this issue probably does not cross privilege boundaries except in cases in which Wordnet is used as a back end.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1634">DSA-1634</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200810-01.xml">GLSA-200810-01</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:182">MDVSA-2008:182</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29208">29208</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1527/references">ADV-2008-1527</ref>
      <ref source="CONFIRM" url="https://bugs.gentoo.org/show_bug.cgi?id=211491">https://bugs.gentoo.org/show_bug.cgi?id=211491</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42378">wordnet-searchwn-bo(42378)</ref>
    </refs>
    <vuln_soft>
      <prod name="wordnet" vendor="wordnet">
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2152" seq="2008-2152" published="2008-06-10" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Integer overflow in the rtl_allocateMemory function in sal/rtl/source/alloc_global.c in OpenOffice.org (OOo) 2.0 through 2.4 allows remote attackers to execute arbitrary code via a crafted file that triggers a heap-based buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=714">20080610 Multiple Vendor OpenOffice rtl_allocateMemory() Integer Overflow Vulnerability</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200807-05.xml">GLSA-200807-05</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-237944-1">237944</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:137">MDVSA-2008:137</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:138">MDVSA-2008:138</ref>
      <ref source="CONFIRM" url="http://www.openoffice.org/security/cves/CVE-2008-2152.html">http://www.openoffice.org/security/cves/CVE-2008-2152.html</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0537.html">RHSA-2008:0537</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0538.html">RHSA-2008:0538</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29622">29622</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020219">1020219</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1773">ADV-2008-1773</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1804/references">ADV-2008-1804</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42957">openoffice-rtlallocatememory-bo(42957)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9787">oval:org.mitre.oval:def:9787</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00385.html">FEDORA-2008-5143</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00473.html">FEDORA-2008-5239</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00499.html">FEDORA-2008-5247</ref>
    </refs>
    <vuln_soft>
      <prod name="openoffice.org" vendor="openoffice">
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="2.2"/>
        <vers num="2.3"/>
        <vers num="2.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2154" seq="2008-2154" published="2009-06-03" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.0" CVSS_base_score="6.0" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="6.8" CVSS_vector="(AV:N/AC:M/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">IBM DB2 8 before FP17, 9.1 before FP5, and 9.5 before FP2 provides an INSTALL_JAR (aka sqlj.install_jar) procedure, which allows remote authenticated users to create or overwrite arbitrary files via unspecified calls.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v82/APARLIST.TXT" adv="1" patch="1">ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v82/APARLIST.TXT</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/35409">35409</ref>
      <ref source="AIXAPAR" url="http://www-01.ibm.com/support/docview.wss?uid=swg1IZ21983" adv="1">IZ21983</ref>
      <ref source="AIXAPAR" url="http://www-01.ibm.com/support/docview.wss?uid=swg1IZ22142" adv="1" patch="1">IZ22142</ref>
      <ref source="AIXAPAR" url="http://www-01.ibm.com/support/docview.wss?uid=swg1IZ22143" adv="1" patch="1">IZ22143</ref>
      <ref source="CONFIRM" url="http://www-01.ibm.com/support/docview.wss?uid=swg21318189" patch="1">http://www-01.ibm.com/support/docview.wss?uid=swg21318189</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/51105">db2-installjar-priv-escalation(51105)</ref>
    </refs>
    <vuln_soft>
      <prod name="db2" vendor="ibm">
        <vers num="8.0" edition="fp1"/>
        <vers num="8.0" edition="fp10"/>
        <vers num="8.0" edition="fp11"/>
        <vers num="8.0" edition="fp12"/>
        <vers num="8.0" edition="fp13"/>
        <vers num="8.0" edition="fp14"/>
        <vers num="8.0" edition="fp15"/>
        <vers num="8.0" edition="fp16"/>
        <vers num="9.1" edition="fp1"/>
        <vers num="9.1" edition="fp2"/>
        <vers num="9.1" edition="fp3"/>
        <vers num="9.1" edition="fp3a"/>
        <vers num="9.1" edition="fp4"/>
        <vers num="9.1" edition="fp4a"/>
        <vers num="9.5" edition="fp1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2157" seq="2008-2157" published="2008-05-29" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">robotd in the Library Manager in EMC AlphaStor 3.1 SP1 for Windows allows remote attackers to execute arbitrary commands via an unspecified string field in a packet to TCP port 3500.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=703">20080527 EMC AlphaStor Library Manager Arbitrary Command Execution Vulnerability</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020116">1020116</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1670">ADV-2008-1670</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42671">alphastor-librarymanager-code-execution(42671)</ref>
    </refs>
    <vuln_soft>
      <prod name="alphastor" vendor="emc_corporation">
        <vers num="3.1_sp1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2158" seq="2008-2158" published="2008-05-29" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple stack-based buffer overflows in the Command Line Interface process in the Server Agent in EMC AlphaStor 3.1 SP1 for Windows allow remote attackers to execute arbitrary code via crafted TCP packets to port 41025.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=702">20080527 EMC AlphaStor Server Agent Multiple Stack Buffer Overflow Vulnerabilities</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020115">1020115</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29399">29399</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1670">ADV-2008-1670</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42669">alphastor-commandline-bo(42669)</ref>
    </refs>
    <vuln_soft>
      <prod name="alphastor" vendor="emc_corporation">
        <vers num="3.1_sp1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2159" seq="2008-2159" published="2008-05-12" modified="2017-08-07" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Microsoft Internet Explorer 7 can save encrypted pages in the cache even when the DisableCachingOfSSLPages registry setting is enabled, which might allow local users to obtain sensitive information.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/468843">VU#468843</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29120">29120</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1470/references">ADV-2008-1470</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42307">ie-disablecachingofsslpages-weak-security(42307)</ref>
    </refs>
    <vuln_soft>
      <prod name="ie" vendor="microsoft">
        <vers num="7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2160" seq="2008-2160" published="2008-05-12" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple unspecified vulnerabilities in the JPEG (GDI+) and GIF image processing in Microsoft Windows CE 5.0 allow remote attackers to execute arbitrary code via crafted (1) JPEG and (2) GIF images.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MSKB" url="http://support.microsoft.com/kb/948812">948812</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29147">29147</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020007">1020007</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1469/references" adv="1">ADV-2008-1469</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42334">wince-jpeg-code-execution(42334)</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_ce" vendor="microsoft">
        <vers num="5.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2161" seq="2008-2161" published="2008-05-12" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in TFTP Server SP 1.4 and 1.5 on Windows, and possibly other versions, allows remote attackers to execute arbitrary code via a long TFTP error packet.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29111">29111</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1468/references">ADV-2008-1468</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42298">tftpserversp-errormessage-bo(42298)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5563">5563</ref>
    </refs>
    <vuln_soft>
      <prod name="tftp_server_sp" vendor="tftp">
        <vers num="1.4"/>
        <vers num="1.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2162" seq="2008-2162" published="2008-05-12" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in SonicWall Email Security 6.1.1 allows remote attackers to inject arbitrary web script or HTML via the Host header in a request to a non-existent web page, which is not properly sanitized in an error page.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2008-05/0226.html">20080508 SonicWall e-mail security Host Header XSS Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29107">29107</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019999">1019999</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42283">sonicwall-host-header-xss(42283)</ref>
    </refs>
    <vuln_soft>
      <prod name="e-mail_security" vendor="sonicwall">
        <vers num="6.1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2163" seq="2008-2163" published="2008-05-13" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in IBM Lotus Quickr 8.1 before Hotfix 5 for Windows and AIX, and before Hotfix 3 for i5/OS, allows remote attackers to inject arbitrary web script or HTML via unknown vectors related to "WYSIWYG editors."</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29175">29175</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1502/references">ADV-2008-1502</ref>
      <ref source="CONFIRM" url="http://www-01.ibm.com/support/docview.wss?uid=swg27013341">http://www-01.ibm.com/support/docview.wss?uid=swg27013341</ref>
      <ref source="CONFIRM" url="http://www-1.ibm.com/support/docview.wss?uid=swg24018711" patch="1">http://www-1.ibm.com/support/docview.wss?uid=swg24018711</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42360">ibm-lotus-quickr-wysiwyg-xss(42360)</ref>
    </refs>
    <vuln_soft>
      <prod name="lotus_quickr" vendor="ibm">
        <vers num="8.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2165" seq="2008-2165" published="2008-05-16" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in AccessCodeStart.asp in Cisco Building Broadband Service Manager (BBSM) Captive Portal 5.3 allows remote attackers to inject arbitrary web script or HTML via the msg parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3895">3895</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020018">1020018</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492043/100/0/threaded">20080513 Cisco BBSM Captive Portal Cross-site Scripting</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492093/100/0/threaded">20080514 Re: Cisco BBSM Captive Portal Cross-site Scripting</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29191">29191</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1535">ADV-2008-1535</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42395">cisco-bbsm-accesscodestart-xss(42395)</ref>
    </refs>
    <vuln_soft>
      <prod name="building_broadband_service_manager" vendor="cisco">
        <vers num="5.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2166" seq="2008-2166" published="2008-05-13" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the search module in Sun Java System Web Server 6.1 before SP9 and 7.0 before Update 2 allows remote attackers to inject arbitrary web script or HTML via unknown parameters in index.jsp.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-231467-1" patch="1">231467</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29087" patch="1">29087</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019987" patch="1">1019987</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1455/references">ADV-2008-1455</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42263">javasystem-search-xss(42263)</ref>
    </refs>
    <vuln_soft>
      <prod name="java_system_web_server" vendor="sun">
        <vers num="6.1" edition=":aix"/>
        <vers num="6.1" edition=":hp_ux"/>
        <vers num="6.1" edition=":linux"/>
        <vers num="6.1" edition=":sparc"/>
        <vers num="6.1" edition=":windows"/>
        <vers num="6.1" edition=":x86"/>
        <vers num="7.0" edition=":hp_ux"/>
        <vers num="7.0" edition=":linux"/>
        <vers num="7.0" edition=":sparc"/>
        <vers num="7.0" edition=":windows"/>
        <vers num="7.0" edition=":x86"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2167" seq="2008-2167" published="2008-05-13" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in ZyXEL ZyWALL 100 allows remote attackers to inject arbitrary web script or HTML via the Referer header, which is not properly handled in a 404 Error page.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2008-May/062152.html">20080508 ZYWALL Referer Header XSS Vulnerability</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3869">3869</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491818/100/0/threaded">20080508 ZYWALL Referer Header XSS Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29110">29110</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020000">1020000</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1501/references">ADV-2008-1501</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42282">zywall-referer-xss(42282)</ref>
    </refs>
    <vuln_soft>
      <prod name="zywall_100" vendor="zyxel">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2168" seq="2008-2168" published="2008-05-13" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Apache 2.2.6 and earlier allows remote attackers to inject arbitrary web script or HTML via UTF-7 encoded URLs that are not properly handled when displaying the 403 Forbidden error page.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01539432">HPSBUX02365</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=124654546101607&amp;w=2">SSRT090085</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=125631037611762&amp;w=2">HPSBUX02465</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3889">3889</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491862/100/0/threaded">20080508 Apache Server HTML Injection and UTF-7 XSS Vulnerability</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491901/100/0/threaded">20080510 Re: Apache Server HTML Injection and UTF-7 XSS Vulnerability</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491930/100/0/threaded">20080510 Re: Re: Apache Server HTML Injection and UTF-7 XSS Vulnerability</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491967/100/0/threaded">20080512 Re: Re: Re: Apache Server HTML Injection and UTF-7 XSS Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29112">29112</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/USN-731-1">USN-731-1</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42303">apache-403-xss(42303)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5143">oval:org.mitre.oval:def:5143</ref>
    </refs>
    <vuln_soft>
      <prod name="http_server" vendor="apache">
        <vers num="-"/>
        <vers num="2.0"/>
        <vers num="2.0.9"/>
        <vers num="2.0.28" edition="beta"/>
        <vers num="2.0.32" edition="beta"/>
        <vers num="2.0.34" edition="beta"/>
        <vers num="2.0.35"/>
        <vers num="2.0.36"/>
        <vers num="2.0.37"/>
        <vers num="2.0.38"/>
        <vers num="2.0.39"/>
        <vers num="2.0.40"/>
        <vers num="2.0.41"/>
        <vers num="2.0.42"/>
        <vers num="2.0.43"/>
        <vers num="2.0.44"/>
        <vers num="2.0.45"/>
        <vers num="2.0.46"/>
        <vers num="2.0.47"/>
        <vers num="2.0.48"/>
        <vers num="2.0.49"/>
        <vers num="2.0.50"/>
        <vers num="2.0.51"/>
        <vers num="2.0.52"/>
        <vers num="2.0.53"/>
        <vers num="2.0.54"/>
        <vers num="2.0.55"/>
        <vers num="2.0.56"/>
        <vers num="2.0.57"/>
        <vers num="2.0.58"/>
        <vers num="2.0.59"/>
        <vers num="2.0.60"/>
        <vers num="2.0.61"/>
        <vers num="2.1"/>
        <vers num="2.1.1"/>
        <vers num="2.1.2"/>
        <vers num="2.1.3"/>
        <vers num="2.1.4"/>
        <vers num="2.1.5"/>
        <vers num="2.1.6"/>
        <vers num="2.1.7"/>
        <vers num="2.1.8"/>
        <vers num="2.2"/>
        <vers num="2.2.1"/>
        <vers num="2.2.2"/>
        <vers num="2.2.3"/>
        <vers num="2.2.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2169" seq="2008-2169" published="2008-05-13" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="7.1" CVSS_base_score="7.1" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Avici routers allows remote attackers to cause a denial of service (dropped session) via crafted BGP UPDATE messages, leading to route flapping, possibly a related issue to CVE-2007-6372.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/929656">VU#929656</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28999">28999</ref>
    </refs>
    <vuln_soft>
      <prod name="router" vendor="avici">
        <vers num=""/>
      </prod>
      <prod name="gr2000" vendor="hitachi">
        <vers num="1b"/>
        <vers num="2b"/>
        <vers num="2b+"/>
        <vers num="bh"/>
      </prod>
      <prod name="gr3000" vendor="hitachi">
        <vers num=""/>
      </prod>
      <prod name="gr4000" vendor="hitachi">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2170" seq="2008-2170" published="2008-05-13" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="7.1" CVSS_base_score="7.1" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Century routers allows remote attackers to cause a denial of service (dropped session) via crafted BGP UPDATE messages, leading to route flapping, possibly a related issue to CVE-2007-6372.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/929656">VU#929656</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28999">28999</ref>
    </refs>
    <vuln_soft>
      <prod name="router" vendor="century_software">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2171" seq="2008-2171" published="2008-05-13" modified="2011-03-07" severity="High" CVSS_version="2.0" CVSS_score="7.1" CVSS_base_score="7.1" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in AlaxalA AX routers allows remote attackers to cause a denial of service (dropped session) via crafted BGP UPDATE messages, leading to route flapping, possibly a related issue to CVE-2007-6372.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/929656">VU#929656</ref>
      <ref source="CONFIRM" url="http://www.kb.cert.org/vuls/id/MIMG-79UV2A">http://www.kb.cert.org/vuls/id/MIMG-79UV2A</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28999">28999</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1407/references">ADV-2008-1407</ref>
    </refs>
    <vuln_soft>
      <prod name="ax_router" vendor="alaxala">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2172" seq="2008-2172" published="2008-05-13" modified="2011-03-07" severity="High" CVSS_version="2.0" CVSS_score="7.1" CVSS_base_score="7.1" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Hitachi GR routers allows remote attackers to cause a denial of service (dropped session) via crafted BGP UPDATE messages, leading to route flapping, possibly a related issue to CVE-2007-6372.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/929656">VU#929656</ref>
      <ref source="CONFIRM" url="http://www.kb.cert.org/vuls/id/MIMG-79UV2A">http://www.kb.cert.org/vuls/id/MIMG-79UV2A</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28999">28999</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1405">ADV-2008-1405</ref>
    </refs>
    <vuln_soft>
      <prod name="gr2000" vendor="hitachi">
        <vers num="1b"/>
        <vers num="2b"/>
        <vers num="2b+"/>
        <vers num="bh"/>
      </prod>
      <prod name="gr3000" vendor="hitachi">
        <vers num=""/>
      </prod>
      <prod name="gr4000" vendor="hitachi">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2173" seq="2008-2173" published="2008-05-13" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="7.1" CVSS_base_score="7.1" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Yamaha routers allows remote attackers to cause a denial of service (dropped session) via crafted BGP UPDATE messages, leading to route flapping, possibly a related issue to CVE-2007-6372.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/929656">VU#929656</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28999">28999</ref>
    </refs>
    <vuln_soft>
      <prod name="router" vendor="yamaha">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2174" seq="2008-2174" published="2008-05-13" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple unspecified vulnerabilities in Robin Rawson-Tetley Animal Shelter Manager (ASM) before 2.2.2 have unknown impact and attack vectors, related to "various areas where security was missing."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/forum/forum.php?forum_id=818214" patch="1">http://sourceforge.net/forum/forum.php?forum_id=818214</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?group_id=82533&amp;release_id=596220" patch="1">http://sourceforge.net/project/shownotes.php?group_id=82533&amp;release_id=596220</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29022">29022</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42139">asm-unspecified-security-bypass(42139)</ref>
    </refs>
    <vuln_soft>
      <prod name="animal_shelter_manager" vendor="shelter_manager">
        <vers num="1.1"/>
        <vers num="1.3"/>
        <vers num="1.11"/>
        <vers num="1.12"/>
        <vers num="1.20"/>
        <vers num="1.22"/>
        <vers num="1.30"/>
        <vers num="1.30.1"/>
        <vers num="1.30.2"/>
        <vers num="1.30_beta"/>
        <vers num="1.31"/>
        <vers num="1.32"/>
        <vers num="1.33"/>
        <vers num="1.34"/>
        <vers num="1.35"/>
        <vers num="1.36"/>
        <vers num="1.37"/>
        <vers num="1.38"/>
        <vers num="1.39"/>
        <vers num="1.40"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.0.6"/>
        <vers num="2.0.8"/>
        <vers num="2.0.14"/>
        <vers num="2.0.15"/>
        <vers num="2.0.16"/>
        <vers num="2.0.17"/>
        <vers num="2.0.18"/>
        <vers num="2.0.21"/>
        <vers num="2.0.22"/>
        <vers num="2.1.0"/>
        <vers num="2.1.1"/>
        <vers num="2.2.0"/>
        <vers num="2.2.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2175" seq="2008-2175" published="2008-05-13" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in comments.php in Gamma Scripts BlogMe PHP 1.1 allows remote attackers to execute arbitrary SQL commands via the id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29030">29030</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42193">blogmephp-comments-sql-injection(42193)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5533">5533</ref>
    </refs>
    <vuln_soft>
      <prod name="blogme_php" vendor="gamma_scripts">
        <vers num="1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2176" seq="2008-2176" published="2008-05-13" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in admin/category.php in Zomplog 3.8.2 allows remote attackers to inject arbitrary web script or HTML via the catname parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3870">3870</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491553/100/0/threaded">20080502 Zomplog 3.8.2 XSS Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29021">29021</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42146">zomplog-category-xss(42146)</ref>
    </refs>
    <vuln_soft>
      <prod name="zomplog" vendor="zomp">
        <vers num="3.8.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2177" seq="2008-2177" published="2008-05-13" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in phpDirectorySource 1.1.06, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary SQL commands via the (1) lid parameter to show.php and the (2) login parameter to admin.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29039">29039</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1432/references">ADV-2008-1432</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42212">phpdirectorysource-show-sql-injection(42212)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42213">phpdirectorysource-admin-sql-injection(42213)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5537">5537</ref>
    </refs>
    <vuln_soft>
      <prod name="phpdirectorysource" vendor="php_directory_source">
        <vers num="1.1.06"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2178" seq="2008-2178" published="2008-05-13" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in admin.php in LifeType 1.2.7 allows remote attackers to inject arbitrary web script or HTML via the searchTerms parameter in an editArticleCategories operation (aka an admin category search).</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://lifetype.net/post/2008/05/04/lifetype-1.2.8-released" patch="1">http://lifetype.net/post/2008/05/04/lifetype-1.2.8-released</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3871">3871</ref>
      <ref source="CONFIRM" url="http://wiki.lifetype.net/index.php/Release_notes_Lifetype_1.2.8" patch="1">http://wiki.lifetype.net/index.php/Release_notes_Lifetype_1.2.8</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491550/100/0/threaded">20080502 Lifetype 1.2.7 XSS Vulnerability</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491597/100/0/threaded">20080504 Re: Lifetype 1.2.7 XSS Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29017" patch="1">29017</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42151">lifetype-admin-xss(42151)</ref>
    </refs>
    <vuln_soft>
      <prod name="lifetype" vendor="lifetype">
        <vers num="1.2.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2179" seq="2008-2179" published="2008-05-13" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in SystemList.jsp in SysAid 5.1.08 allows remote attackers to inject arbitrary web script or HTML via the searchField parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29037">29037</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42243">sysaid-searchfield-xss(42243)</ref>
    </refs>
    <vuln_soft>
      <prod name="sysaid" vendor="ilient">
        <vers num="5.1.08"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2180" seq="2008-2180" published="2008-05-13" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in cpLinks 1.03, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary SQL commands via the (1) admin_username parameter (aka the username field) to admin/index.php and the (2) search_text and (3) search_category parameters to search.php.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29035">29035</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1431/references">ADV-2008-1431</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42170">cplinks-index-search-sql-injection(42170)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5538">5538</ref>
    </refs>
    <vuln_soft>
      <prod name="cplinks" vendor="cplinks">
        <vers num="1.03"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2181" seq="2008-2181" published="2008-05-13" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in search.php in cpLinks 1.03 allow remote attackers to inject arbitrary web script or HTML via the (1) search_text and (2) search_category parameters.  NOTE: the XSS reportedly occurs in a forced SQL error message.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29035">29035</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1431/references">ADV-2008-1431</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42171">cplinks-search-xss(42171)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5538">5538</ref>
    </refs>
    <vuln_soft>
      <prod name="cplinks" vendor="cplinks">
        <vers num="1.03"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2182" seq="2008-2182" published="2008-05-13" modified="2019-03-08" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the powermail extension before 1.1.10 for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://typo3.org/teams/security/security-bulletins/typo3-20080505-2/">http://typo3.org/teams/security/security-bulletins/typo3-20080505-2/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29040" adv="1">29040</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42188" adv="1">powermail-typo3-unspecified-xss(42188)</ref>
    </refs>
    <vuln_soft>
      <prod name="powermail" vendor="in2code">
        <vers num="0.1.3" edition="alpha:~~~typo3~~"/>
        <vers num="0.1.4" edition="alpha:~~~typo3~~"/>
        <vers num="0.2.0" edition="alpha:~~~typo3~~"/>
        <vers num="0.2.1" edition="alpha:~~~typo3~~"/>
        <vers num="0.3.0" edition="alpha:~~~typo3~~"/>
        <vers num="0.3.1" edition="alpha:~~~typo3~~"/>
        <vers num="0.3.2" edition="alpha:~~~typo3~~"/>
        <vers num="0.3.3" edition="alpha:~~~typo3~~"/>
        <vers num="0.3.4" edition="alpha:~~~typo3~~"/>
        <vers num="0.4.0" edition="alpha:~~~typo3~~"/>
        <vers num="0.4.1" edition="alpha:~~~typo3~~"/>
        <vers num="0.5.0" edition="beta:~~~typo3~~"/>
        <vers num="0.5.1" edition="beta:~~~typo3~~"/>
        <vers num="0.5.2" edition="beta:~~~typo3~~"/>
        <vers num="0.5.3" edition="beta:~~~typo3~~"/>
        <vers num="0.5.4" edition="beta:~~~typo3~~"/>
        <vers num="0.5.5" edition="beta:~~~typo3~~"/>
        <vers num="0.5.6" edition="beta:~~~typo3~~"/>
        <vers num="0.5.7" edition="beta:~~~typo3~~"/>
        <vers num="0.5.8" edition="beta:~~~typo3~~"/>
        <vers num="0.5.9" edition="beta:~~~typo3~~"/>
        <vers num="0.6.0" edition="beta:~~~typo3~~"/>
        <vers num="0.6.1" edition="beta:~~~typo3~~"/>
        <vers num="0.6.2" edition="beta:~~~typo3~~"/>
        <vers num="0.6.3" edition="beta:~~~typo3~~"/>
        <vers num="0.7.0" edition="beta:~~~typo3~~"/>
        <vers num="0.7.1" edition="beta:~~~typo3~~"/>
        <vers num="0.7.2" edition="beta:~~~typo3~~"/>
        <vers num="1.0.0" edition=":~~~typo3~~"/>
        <vers num="1.0.1" edition=":~~~typo3~~"/>
        <vers num="1.0.2" edition=":~~~typo3~~"/>
        <vers num="1.0.3" edition=":~~~typo3~~"/>
        <vers num="1.0.4" edition=":~~~typo3~~"/>
        <vers num="1.0.5" edition=":~~~typo3~~"/>
        <vers num="1.0.6" edition=":~~~typo3~~"/>
        <vers num="1.0.7" edition=":~~~typo3~~"/>
        <vers num="1.0.8" edition=":~~~typo3~~"/>
        <vers num="1.0.9" edition=":~~~typo3~~"/>
        <vers num="1.0.10" edition=":~~~typo3~~"/>
        <vers num="1.0.11" edition=":~~~typo3~~"/>
        <vers num="1.0.12" edition=":~~~typo3~~"/>
        <vers num="1.1.0" edition=":~~~typo3~~"/>
        <vers num="1.1.1" edition=":~~~typo3~~"/>
        <vers num="1.1.2" edition=":~~~typo3~~"/>
        <vers num="1.1.3" edition=":~~~typo3~~"/>
        <vers num="1.1.4" edition=":~~~typo3~~"/>
        <vers num="1.1.5" edition=":~~~typo3~~"/>
        <vers num="1.1.6" edition=":~~~typo3~~"/>
        <vers num="1.1.7" edition=":~~~typo3~~"/>
        <vers num="1.1.8" edition=":~~~typo3~~"/>
        <vers num="1.1.9" edition=":~~~typo3~~"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2183" seq="2008-2183" published="2008-05-13" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in SMartBlog (aka SMBlog) 1.3 allows remote attackers to execute arbitrary SQL commands via the idt parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29033">29033</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42190">smartblog-index-logon-sql-injection(42190)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5535">5535</ref>
    </refs>
    <vuln_soft>
      <prod name="smartblog" vendor="toocharger">
        <vers num="1.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2184" seq="2008-2184" published="2008-05-13" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in SMartBlog (aka SMBlog) 1.3 allow remote attackers to execute arbitrary SQL commands via the (1) mois, (2) an, (3) jour, and (4) id parameters to index.php, and the (5) login parameter to gestion/logon.php, different vectors than CVE-2008-2183.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29043">29043</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42190">smartblog-index-logon-sql-injection(42190)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42245">smartblog-logon-sql-injection(42245)</ref>
    </refs>
    <vuln_soft>
      <prod name="smartblog" vendor="toocharger">
        <vers num="1.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2185" seq="2008-2185" published="2008-05-13" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in index.php in SMartBlog (aka SMBlog) 1.3 allows remote attackers to include arbitrary local files via directory traversal sequences in the page parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29043">29043</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42192">smartblog-page-file-include(42192)</ref>
    </refs>
    <vuln_soft>
      <prod name="smartblog" vendor="toocharger">
        <vers num="1.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2186" seq="2008-2186" published="2008-05-13" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php in Chilek Content Management System (aka ChiCoMaS) 2.0.4 allows remote attackers to inject arbitrary web script or HTML via the q parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=120975560407192&amp;w=2">20080502 chicomas.2.0.4</ref>
      <ref source="MISC" url="http://www.bugreport.ir/index_59.htm">http://www.bugreport.ir/index_59.htm</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/499458/100/0/threaded">20081220 chicomas &lt;=2.0.4 Multiple Vulnerabilities</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/499459/100/0/threaded">20081220 Re: chicomas &lt;=2.0.4 Multiple Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29025">29025</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42156">chicomas-index-xss(42156)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/7532">7532</ref>
    </refs>
    <vuln_soft>
      <prod name="chicomas" vendor="cilekyazilim">
        <vers num="2.0.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2187" seq="2008-2187" published="2008-05-13" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in mjguest.php in Mjguest 6.7 GT Rev.01 allows remote attackers to inject arbitrary web script or HTML via the level parameter in a redirect action, possibly involving interface/redirect.htm.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3872">3872</ref>
      <ref source="CONFIRM" url="http://www.mdsjack.bo.it/public/phpBB3/viewtopic.php?t=2049">http://www.mdsjack.bo.it/public/phpBB3/viewtopic.php?t=2049</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491523/100/0/threaded">20080501 mjguest 6.7 (ALL VERSION) Xss &amp; Redirection Vuln</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492384/100/0/threaded">20080521 Re: mjguest 6.7 (ALL VERSION) Xss &amp; Redirection Vuln</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29002">29002</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42129">mjguest-mjguest-xss(42129)</ref>
    </refs>
    <vuln_soft>
      <prod name="mjguest" vendor="mdsjack">
        <vers num="6.7" edition="gt_rev1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2188" seq="2008-2188" published="2008-05-13" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in EJ3 BlackBook 1.0 allow remote attackers to inject arbitrary web script or HTML via the (1) bookCopyright and (2) ver parameters to (a) footer.php, and the (3) bookName, (4) bookMetaTags, and (5) estiloCSS parameters to (b) header.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3873">3873</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491549/100/0/threaded">20080502 BlackBook v1.0 Multiple XSS Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29015">29015</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42147">blackbook-multiple-xss(42147)</ref>
    </refs>
    <vuln_soft>
      <prod name="blackbook" vendor="eejj33">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2189" seq="2008-2189" published="2008-05-14" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in viewfaqs.php in AnServ Auction XL allows remote attackers to execute arbitrary SQL commands via the cat parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3874">3874</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491608/100/0/threaded">20080505 [ECHO_ADV_92$2008] Anserv Auction XL (viewfaqs.php cat) Blind Sql Injection Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29053">29053</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42214">auctionxl-viewfaqs-sql-injection(42214)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5543">5543</ref>
    </refs>
    <vuln_soft>
      <prod name="auction_xl" vendor="anserv">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2190" seq="2008-2190" published="2008-05-14" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in Online Rent (aka Online Rental Property Script) 4.5 and earlier allows remote attackers to execute arbitrary SQL commands via the pid parameter.  NOTE: it was later reported that 5.0 and earlier are also affected.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3875">3875</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491607/100/0/threaded">20080505 [ECHO_ADV_91$2008] Online Rental Property Script &lt;= 4.5 (pid) Blind Sql Injection Vulnerability</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491816/100/0/threaded">20080508 Re: [ECHO_ADV_91$2008] Online Rental Property Script &lt;= 4.5 (pid) Blind Sql Injection Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29052">29052</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/35005">35005</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/1366">ADV-2009-1366</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42191">onlinerental-index-sql-injection(42191)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5542">5542</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/8711">8711</ref>
    </refs>
    <vuln_soft>
      <prod name="online_rent_property_script" vendor="romedchim_international_srl">
        <vers num="4.2"/>
        <vers num="4.3"/>
        <vers num="4.4"/>
        <vers num="4.5" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2191" seq="2008-2191" published="2008-05-14" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the pnEncyclopedia module 0.2.0 and earlier for PostNuke allows remote attackers to execute arbitrary SQL commands via the id parameter in a display_term action to index.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3876">3876</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491606/100/0/threaded">20080505 [ECHO_ADV_90$2008] PostNuke Module pnEncyclopedia &lt;= 0.2.0 (id) Blind Sql Injection Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29046">29046</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42185">pnencyclopedia-index-sql-injection(42185)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5541">5541</ref>
    </refs>
    <vuln_soft>
      <prod name="pnencyclopedia" vendor="postnuke_software_foundation">
        <vers num="0.2.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2192" seq="2008-2192" published="2008-05-14" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Static code injection vulnerability in box/minichat/boxpop.php in IT!CMS (aka itcms) 1.9 allows remote attackers to inject arbitrary PHP code into box/MiniChat/data/shouts.php via the shout parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29028">29028</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42172">itcms-boxpop-file-include(42172)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5532">5532</ref>
    </refs>
    <vuln_soft>
      <prod name="itcms" vendor="itcms">
        <vers num="1.9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2193" seq="2008-2193" published="2008-05-14" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in example.php in Thomas Gossmann ScorpNews 2.0 allows remote attackers to execute arbitrary PHP code via a URL in the site parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29041">29041</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1430/references">ADV-2008-1430</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42517">scorpnews-example-file-include(42517)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5539">5539</ref>
    </refs>
    <vuln_soft>
      <prod name="scorpnews" vendor="scorpnews">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2194" seq="2008-2194" published="2008-05-14" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in forums.php in DeluxeBB 1.2 and earlier allows remote attackers to execute arbitrary SQL commands via the sort parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29062">29062</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42224">deluxebb-forums-sql-injection(42224)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5550">5550</ref>
    </refs>
    <vuln_soft>
      <prod name="deluxebb" vendor="deluxebb">
        <vers num="1.1" prev="1"/>
        <vers num="1.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2195" seq="2008-2195" published="2008-05-14" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Static code injection vulnerability in admincp.php in DeluxeBB 1.2 and earlier allows remote authenticated administrators to inject arbitrary PHP code into logs/cp.php via the URI.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29062">29062</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42225">deluxebb-admincp-code-execution(42225)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5550">5550</ref>
    </refs>
    <vuln_soft>
      <prod name="deluxebb" vendor="deluxebb">
        <vers num="1.1" prev="1"/>
        <vers num="1.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2196" seq="2008-2196" published="2008-05-14" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in admin.php in LifeType 1.2.8 allows remote attackers to inject arbitrary web script or HTML via the newBlogUserName parameter in an addBlogUser action, a different vector than CVE-2008-2178.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3879">3879</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491600/100/0/threaded">20080505 LifeType 1.2.8</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29050">29050</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42228">lifetype-newblogusername-xss(42228)</ref>
    </refs>
    <vuln_soft>
      <prod name="lifetype" vendor="lifetype">
        <vers num="1.2.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2197" seq="2008-2197" published="2008-05-14" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the blogwriter module 2.0 for Miniweb allows remote attackers to execute arbitrary SQL commands via the historymonth parameter to index.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29061">29061</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42220">blogwriter-historymonth-sql-injection(42220)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5548">5548</ref>
    </refs>
    <vuln_soft>
      <prod name="blog_writer" vendor="miniweb2">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2198" seq="2008-2198" published="2008-05-14" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in kmitaadmin/kmitat/htmlcode.php in Kmita Tellfriend 2.0 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the file parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3877">3877</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491616/100/0/threaded">20080505 [ECHO_ADV_93$2008] Kmita Tellfriend &lt;= 2.0 (file) Remote File Inclusion Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29042">29042</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42186">kmitatellfriend-htmlcode-file-include(42186)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5544">5544</ref>
    </refs>
    <vuln_soft>
      <prod name="tellfriend" vendor="kmita_tellfriend">
        <vers num="2.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2199" seq="2008-2199" published="2008-05-14" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in kmitaadmin/kmitam/htmlcode.php in Kmita Mail 3.0 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the file parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3878">3878</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491609/100/0/threaded">20080505 [ECHO_ADV_94$2008] Kmita Mail &lt;= 3.0 (file) Remote File Inclusion Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29044">29044</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42187">kmitamail-htmlcode-file-include(42187)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5545">5545</ref>
    </refs>
    <vuln_soft>
      <prod name="kmita_mail" vendor="kkeim">
        <vers num="3.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2200" seq="2008-2200" published="2008-05-14" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in Maian Weblog 4.0 allow remote attackers to inject arbitrary web script or HTML via the (1) keywords parameter to admin/index.php in a blogs search action, the (2) msg_charset and (3) msg_header9 parameters to admin/inc/header.php, and the (4) keywords parameter to index.php in a search action.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3880">3880</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491588/100/0/threaded">20080503 Maian Weblog v4.0 XSS Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29032">29032</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42207">maian-weblog-index-header-xss(42207)</ref>
    </refs>
    <vuln_soft>
      <prod name="maian_weblog" vendor="maianscriptworld">
        <vers num="4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2201" seq="2008-2201" published="2008-05-14" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in admin/inc/header.php in Maian Recipe 1.2 allow remote attackers to inject arbitrary web script or HTML via the (1) header, (2) header2, (3) header3, (4) header4, (5) header5, (6) header6, (7) header7, (8) header8, and (9) header9 parameters.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3881">3881</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491589/100/0/threaded">20080503 Maian Recipe v1.2 Xss Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29032">29032</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42206">maian-recipe-header-xss(42206)</ref>
    </refs>
    <vuln_soft>
      <prod name="maian_recipe" vendor="maianscriptworld">
        <vers num="1.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2202" seq="2008-2202" published="2008-05-14" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in Maian Uploader 4.0 allow remote attackers to inject arbitrary web script or HTML via the (1) keywords parameter to upload/admin/index.php in a search action, the (2) msg_charset and (3) msg_header9 parameters to admin/inc/header.php, and the (4) keywords parameter to index.php in a search action.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3882">3882</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491599/100/0/threaded">20080505 Maian Uploader v4.0 XSS Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29051">29051</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42203">maian-uploader-index-header-xss(42203)</ref>
    </refs>
    <vuln_soft>
      <prod name="maian_uploader" vendor="maianscriptworld">
        <vers num="4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2203" seq="2008-2203" published="2008-05-14" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in search.php in Maian Search 1.1 allows remote attackers to execute arbitrary SQL commands via the keywords parameter in a search action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3883">3883</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491586/100/0/threaded">20080503 Maian Search v1.1 Multiple Vulnerabilities (XSS/SQL INJECTION)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29032">29032</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42196">maian-search-search-sql-injection(42196)</ref>
    </refs>
    <vuln_soft>
      <prod name="maian_search" vendor="maianscriptworld">
        <vers num="1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2204" seq="2008-2204" published="2008-05-14" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in admin/inc/header.php in Maian Search 1.1 allow remote attackers to inject arbitrary web script or HTML via the (1) header, (2) header2, (3) header3, (4) header4, (5) header5, (6) header6, (7) header7, (8) header8, and (9) header9 parameters.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3883">3883</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491586/100/0/threaded">20080503 Maian Search v1.1 Multiple Vulnerabilities (XSS/SQL INJECTION)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29032">29032</ref>
    </refs>
    <vuln_soft>
      <prod name="maian_search" vendor="maianscriptworld">
        <vers num="1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2205" seq="2008-2205" published="2008-05-14" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in Maian Music 1.1 allows remote attackers to execute arbitrary SQL commands via the album parameter in an album action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3884">3884</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491590/100/0/threaded">20080503 Maian Music v1.1 Multiple Vulnerabilities (Xss/SQL Injection)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29032">29032</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42209">maian-music-album-sql-injection(42209)</ref>
    </refs>
    <vuln_soft>
      <prod name="maian_music" vendor="maianscriptworld">
        <vers num="1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2206" seq="2008-2206" published="2008-05-14" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in Maian Music 1.1 allow remote attackers to inject arbitrary web script or HTML via the (1) keywords parameter in a search action to index.php, and the (2) msg_script parameter to admin/inc/footer.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3884">3884</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491590/100/0/threaded">20080503 Maian Music v1.1 Multiple Vulnerabilities (Xss/SQL Injection)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29032">29032</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42210">maian-music-index-footer-xss(42210)</ref>
    </refs>
    <vuln_soft>
      <prod name="maian_music" vendor="maianscriptworld">
        <vers num="1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2207" seq="2008-2207" published="2008-05-14" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in admin/index.php in Maian Gallery 2.0 allows remote attackers to inject arbitrary web script or HTML via the keywords parameter in a search action.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3885">3885</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491583/100/0/threaded">20080503 Maian Gallery v2.0 XSS Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29032">29032</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42195">maian-gallery-keywords-xss(42195)</ref>
    </refs>
    <vuln_soft>
      <prod name="maian_gallery" vendor="maianscriptworld">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2208" seq="2008-2208" published="2008-05-14" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in Maian Greeting 2.1 allows remote attackers to execute arbitrary SQL commands via the keywords parameter in a search action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3887">3887</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491582/100/0/threaded">20080503 Maian Greeting v2.1 Multiple Vulnerabilities (XSS/SQL INJECTION)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29032">29032</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42199">maian-greeting-keywords-sql-injection(42199)</ref>
    </refs>
    <vuln_soft>
      <prod name="maian_greeting" vendor="maianscriptworld">
        <vers num="2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2209" seq="2008-2209" published="2008-05-14" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in admin/inc/header.php in Maian Greeting 2.1 allow remote attackers to inject arbitrary web script or HTML via the (1) msg_script and (2) msg_script2 parameters.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3887">3887</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491582/100/0/threaded">20080503 Maian Greeting v2.1 Multiple Vulnerabilities (XSS/SQL INJECTION)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29032">29032</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42200">maian-greeting-header-xss(42200)</ref>
    </refs>
    <vuln_soft>
      <prod name="maian_greeting" vendor="maianscriptworld">
        <vers num="2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2210" seq="2008-2210" published="2008-05-14" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in Maian Support 1.3 allow remote attackers to inject arbitrary web script or HTML via the (1) msg_script, (2) msg_script2, and (3) msg_script3 parameters to admin/inc/footer.php; and the (4) msg_script2 parameter to admin/inc/header.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3888">3888</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491587/100/0/threaded">20080503 Maian Support v1.3 Xss Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29032">29032</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42205">maian-support-footer-header-xss(42205)</ref>
    </refs>
    <vuln_soft>
      <prod name="maian_support" vendor="maianscriptworld">
        <vers num="1.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2211" seq="2008-2211" published="2008-05-14" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in admin/inc/footer.php in Maian Guestbook 3.2 allow remote attackers to inject arbitrary web script or HTML via the (1) msg_script2 and (2) msg_script3 parameters.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3890">3890</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491584/100/0/threaded">20080503 Maian Guestbook v3.2 XSS Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29032">29032</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42198">maian-guestbook-footer-xss(42198)</ref>
    </refs>
    <vuln_soft>
      <prod name="maian_guestbook" vendor="maianscriptworld">
        <vers num="3.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2212" seq="2008-2212" published="2008-05-14" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in Maian Cart 1.1 allow remote attackers to inject arbitrary web script or HTML via the (1) msg_adminheader, (2) msg_adminheader2, (3) msg_adminheader3, (4) msg_adminheader4, and unspecified other parameters to admin/inc/header.php; the (5) msg_script3 and unspecified other parameters to admin/inc/footer.php; and the (6) keywords parameter to index.php in a search action.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3891">3891</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491581/100/0/threaded">20080503 Maian Cart v1.1 XSS Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29032">29032</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42194">maian-cart-multiple-xss(42194)</ref>
    </refs>
    <vuln_soft>
      <prod name="maian_cart" vendor="maianscriptworld">
        <vers num="1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2213" seq="2008-2213" published="2008-05-14" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in admin/inc/footer.php in Maian Links 3.1 allow remote attackers to inject arbitrary web script or HTML via the (1) msg_script2 and (2) msg_script3 parameters.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3892">3892</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491591/100/0/threaded">20080503 Maian Links v3.1 XSS Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29032">29032</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42208">maian-links-footer-xss(42208)</ref>
    </refs>
    <vuln_soft>
      <prod name="maian_links" vendor="maianscriptworld">
        <vers num="3.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2214" seq="2008-2214" published="2008-05-14" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the Network Manager in Castle Rock Computing SNMPc 7.1 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a long community string in an SNMP TRAP packet.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3886">3886</ref>
      <ref source="MISC" url="http://www.ngssoftware.com/advisories/critical-vulnerability-in-snmpc/" patch="1">http://www.ngssoftware.com/advisories/critical-vulnerability-in-snmpc/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491454/100/0/threaded">20080430 Critical Vulnerability in SNMPc</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28990">28990</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019953">1019953</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1403/references">ADV-2008-1403</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42104">snmpc-snmptrap-bo(42104)</ref>
    </refs>
    <vuln_soft>
      <prod name="snmpc" vendor="castle_rock">
        <vers num="7.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2215" seq="2008-2215" published="2008-05-14" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Multiple directory traversal vulnerabilities in Project-Based Calendaring System (PBCS) 0.7.1-1 allow remote attackers to read arbitrary files via a .. (dot dot) in the filename parameter to (1) src/yopy_sync.php and (2) system-logger/print_logs.php.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28991">28991</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42106">pbcs-filename-directory-traversal(42106)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5523">5523</ref>
    </refs>
    <vuln_soft>
      <prod name="project-based_calendaring__system" vendor="pbcs">
        <vers num="0.7.1-1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2216" seq="2008-2216" published="2008-05-14" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="9.0" CVSS_base_score="9.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unrestricted file upload vulnerability in src/yopy_upload.php in Project-Based Calendaring System (PBCS) 0.7.1 allows remote authenticated users to upload arbitrary files to tmp/uploads.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28991">28991</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42105">pbcs-yopyupload-file-upload(42105)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5523">5523</ref>
    </refs>
    <vuln_soft>
      <prod name="project-based_calendaring__system" vendor="pbcs">
        <vers num="0.7.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2217" seq="2008-2217" published="2008-05-14" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in cm/graphie.php in Content Management System 0.6.1 for Phprojekt allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the cm_imgpath parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28958">28958</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42510">cmsphprojekt-graphie-file-include(42510)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5510">5510</ref>
    </refs>
    <vuln_soft>
      <prod name="content_management_system" vendor="mario_valdez">
        <vers num="0.6.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2218" seq="2008-2218" published="2008-05-14" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in the Multimedia PC Client in Nortel Multimedia Communication Server (MCS) before Maintenance Release 3.5.8.3 and 4.0.25.3 allows remote attackers to cause a denial of service (crash) via a flood of "extraneous" messages, as demonstrated by the Nessus "Generic flood" denial of service plugin.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&amp;id=719698">http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&amp;id=719698</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28994">28994</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019957">1019957</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1404/references">ADV-2008-1404</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42115">nortel-mcs-client-bo(42115)</ref>
    </refs>
    <vuln_soft>
      <prod name="multimedia_communications_server" vendor="nortel">
        <vers num="3.5.8.3" prev="1"/>
        <vers num="4.0.25.3" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2219" seq="2008-2219" published="2008-05-14" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in install.php in C-News.fr C-News 1.0.1 allows remote attackers to inject arbitrary web script or HTML via the etape parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28989">28989</ref>
      <ref source="MISC" url="http://www.z0rlu.ownspace.org/index.php?/archives/70-cnews-1.0.1-XSS.html">http://www.z0rlu.ownspace.org/index.php?/archives/70-cnews-1.0.1-XSS.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42509">cnews-install-xss(42509)</ref>
    </refs>
    <vuln_soft>
      <prod name="c-news" vendor="c-news.fr">
        <vers num="1.0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2220" seq="2008-2220" published="2008-05-14" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple PHP remote file inclusion vulnerabilities in Interact Learning Community Environment Interact 2.4.1, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the (1) CONFIG[LANGUAGE_CPATH] parameter to modules/forum/embedforum.php and the (2) CONFIG[BASE_PATH] parameter to modules/scorm/lib.inc.php, different vectors than CVE-2006-4448.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28996">28996</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42113">interact-embedforum-file-include(42113)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5526">5526</ref>
    </refs>
    <vuln_soft>
      <prod name="interact" vendor="interact">
        <vers num="2.4.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2221" seq="2008-2221" published="2008-05-14" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Java plugin in IBM WebSphere Application Server 5.0.2 allows untrusted applets to gain privileges via unknown attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/28997">28997</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1019956">1019956</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1411/references">ADV-2008-1411</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/docview.wss?uid=swg1PK65161">PK65161</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42116">websphere-javaplugin-privilege-escalation(42116)</ref>
    </refs>
    <vuln_soft>
      <prod name="websphere_application_server" vendor="ibm">
        <vers num="5.0.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2222" seq="2008-2222" published="2008-05-14" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in login.php in EQdkp 1.3.2f allows remote attackers to bypass EQdkp user authentication via the user_id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29184">29184</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42381">eqdkp-userid-sql-injection(42381)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5603">5603</ref>
    </refs>
    <vuln_soft>
      <prod name="eqdkp" vendor="eqdkp">
        <vers num="1.3.2f"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2223" seq="2008-2223" published="2008-05-14" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in group_posts.php in vShare YouTube Clone 2.6 allows remote attackers to execute arbitrary SQL commands via the tid parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://forums.buyscripts.in/viewtopic.php?f=7&amp;t=3389" patch="1">http://forums.buyscripts.in/viewtopic.php?f=7&amp;t=3389</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29114" patch="1">29114</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42285">youtubeclone-groupposts-sql-injection(42285)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5565">5565</ref>
    </refs>
    <vuln_soft>
      <prod name="vshare_youtube_clone" vendor="buyscripts">
        <vers num="2.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2224" seq="2008-2224" published="2008-05-14" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple PHP remote file inclusion vulnerabilities in SazCart 1.5.1, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the (1) _saz[settings][site_dir] parameter to layouts/default/header.saz.php and the (2) _saz[settings][site_url] parameter to admin/alayouts/default/pages/login.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29113">29113</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42289">sazcart-headersaz-file-include(42289)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5566">5566</ref>
    </refs>
    <vuln_soft>
      <prod name="sazcart" vendor="sazcart">
        <vers num="1.5.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2225" seq="2008-2225" published="2008-05-14" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in gameCMS Lite 1.0 allows remote attackers to execute arbitrary SQL commands via the systemId parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29093">29093</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42251">gamecmslite-index-sql-injection(42251)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5555">5555</ref>
    </refs>
    <vuln_soft>
      <prod name="gamecms_lite" vendor="gamecms">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2226" seq="2008-2226" published="2008-05-14" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the export feature in OpenKM before 2.0 allows remote attackers to export arbitrary documents via unspecified vectors.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=597940">http://sourceforge.net/project/shownotes.php?release_id=597940</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29117">29117</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42297">openkm-export-information-disclosure(42297)</ref>
    </refs>
    <vuln_soft>
      <prod name="openkm" vendor="openkm">
        <vers num="1.0"/>
        <vers num="1.1"/>
        <vers num="1.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2227" seq="2008-2227" published="2008-05-14" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple directory traversal vulnerabilities in PHP-Fusion Forum Rank System 6 allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the settings[locale] parameter to (1) forum.php and (2) profile.php in infusions/rank_system/.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29077">29077</ref>
      <ref source="MISC" url="http://www.securityfocus.com/bid/29077/exploit">http://www.securityfocus.com/bid/29077/exploit</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42244">forumranksystem-settingslocale-file-include(42244)</ref>
    </refs>
    <vuln_soft>
      <prod name="forum_rank_system" vendor="php-fusion">
        <vers num="6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2228" seq="2008-2228" published="2008-05-14" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in portfolio/commentaires/derniers_commentaires.php in Cyberfolio 7.12, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the rep parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29124">29124</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42286">cyberfolio-rep-file-include(42286)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5567">5567</ref>
    </refs>
    <vuln_soft>
      <prod name="cyberfolio" vendor="cyberfolio">
        <vers num="7.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2230" seq="2008-2230" published="2008-06-10" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Untrusted search path vulnerability in (1) reportbug 3.8 and 3.31, and (2) reportbug-ng before 0.2008.06.04, allows local users to execute arbitrary code via a malicious module file in the current working directory.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484311">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484311</ref>
      <ref source="CONFIRM" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484474">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484474</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43001">reportbug-searchpath-code-execution(43001)</ref>
    </refs>
    <vuln_soft>
      <prod name="reportbug" vendor="reportbug-ng">
        <vers num="3.8"/>
        <vers num="3.31"/>
      </prod>
      <prod name="reportbug-ng" vendor="reportbug-ng">
        <vers num="0.2007.03.10"/>
        <vers num="0.2007.03.11"/>
        <vers num="0.2007.03.13"/>
        <vers num="0.2007.03.14"/>
        <vers num="0.2007.03.15"/>
        <vers num="0.2007.03.17"/>
        <vers num="0.2007.03.19"/>
        <vers num="0.2007.03.19.2"/>
        <vers num="0.2007.03.20"/>
        <vers num="0.2007.03.24"/>
        <vers num="0.2007.03.27"/>
        <vers num="0.2007.03.28"/>
        <vers num="0.2007.03.29"/>
        <vers num="0.2007.04.07"/>
        <vers num="0.2007.04.07.2"/>
        <vers num="0.2007.04.13"/>
        <vers num="0.2007.04.16"/>
        <vers num="0.2007.04.20"/>
        <vers num="0.2007.04.23"/>
        <vers num="0.2007.04.27"/>
        <vers num="0.2007.05.02"/>
        <vers num="0.2007.05.27"/>
        <vers num="0.2007.05.28"/>
        <vers num="0.2007.05.31"/>
        <vers num="0.2007.06.13"/>
        <vers num="0.2007.06.27"/>
        <vers num="0.2007.07.08"/>
        <vers num="0.2007.07.12"/>
        <vers num="0.2007.07.18"/>
        <vers num="0.2007.07.19"/>
        <vers num="0.2007.08.02"/>
        <vers num="0.2007.08.03"/>
        <vers num="0.2007.08.03.2"/>
        <vers num="0.2007.08.12"/>
        <vers num="0.2007.08.20"/>
        <vers num="0.2007.10.30"/>
        <vers num="0.2008.01.20"/>
        <vers num="0.2008.03.26"/>
        <vers num="0.2008.03.28"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2231" seq="2008-2231" published="2008-06-05" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in Slashdot Like Automated Storytelling Homepage (Slash) (aka Slashcode) R_2_5_0_94 and earlier allows remote attackers to execute SQL commands and read table information via the id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484499">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484499</ref>
      <ref source="MLIST" url="http://marc.info/?l=oss-security&amp;m=121258731028005&amp;w=2">[oss-security] 20080604 CVE id request: slash</ref>
      <ref source="MLIST" url="http://marc.info/?l=oss-security&amp;m=121260265427728&amp;w=2">[oss-security] 20080604 Re: CVE id request: slash</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3923">3923</ref>
      <ref source="CONFIRM" url="http://slashcode.cvs.sourceforge.net/slashcode/slash/Slash/Utility/Environment/Environment.pm?r1=1.223&amp;r2=1.225">http://slashcode.cvs.sourceforge.net/slashcode/slash/Slash/Utility/Environment/Environment.pm?r1=1.223&amp;r2=1.225</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1633">DSA-1633</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29548">29548</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020206">1020206</ref>
      <ref source="CONFIRM" url="http://www.slashcode.com/article.pl?sid=08/01/04/1950244&amp;tid=4">http://www.slashcode.com/article.pl?sid=08/01/04/1950244&amp;tid=4</ref>
      <ref source="CONFIRM" url="http://www.slashcode.com/article.pl?sid=08/01/07/2314232">http://www.slashcode.com/article.pl?sid=08/01/07/2314232</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42880">slash-id-sql-injection(42880)</ref>
    </refs>
    <vuln_soft>
      <prod name="slash" vendor="slashcode.com">
        <vers num="r_2_5_0_94" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2232" seq="2008-2232" published="2008-07-17" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The expand_template function in afuse.c in afuse 0.2 allows local users to gain privileges via shell metacharacters in a pathname.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=490921">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=490921</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1611">DSA-1611</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30245">30245</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43834">afuse-filenames-command-execution(43834)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00921.html">FEDORA-2009-8792</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00947.html">FEDORA-2009-8816</ref>
    </refs>
    <vuln_soft>
      <prod name="afuse" vendor="afuse">
        <vers num="0.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2233" seq="2008-2233" published="2008-08-18" modified="2011-03-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The client in Openwsman 1.2.0 and 2.0.0, in unknown configurations, allows remote Openwsman servers to replay SSL sessions via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00003.html" patch="1">SUSE-SA:2008:041</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30694">30694</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2397">ADV-2008-2397</ref>
    </refs>
    <vuln_soft>
      <prod name="openwsman" vendor="openwsman">
        <vers num="1.2.0"/>
        <vers num="2.0.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2234" seq="2008-2234" published="2008-08-18" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple buffer overflows in Openwsman 1.2.0 and 2.0.0 allow remote attackers to execute arbitrary code via a crafted "Authorization: Basic" HTTP header.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00003.html">SUSE-SA:2008:041</ref>
      <ref source="MLIST" url="http://lists.vmware.com/pipermail/security-announce/2008/000034.html">[security-announce] 20080918 VMSA-2008-0015 Updated ESXi and ESX 3.5 packages address critical security issue in openwsman</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/496528/100/0/threaded">20080919 VMSA-2008-0015 Updated ESXi and ESX 3.5 packages address critical security issue in openwsman</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30694">30694</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2008-0015.html">http://www.vmware.com/security/advisories/VMSA-2008-0015.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2397">ADV-2008-2397</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2624">ADV-2008-2624</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/44481">openwsman-authentication-header-bo(44481)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/44484">openwsman-session-replay-code-execution(44484)</ref>
    </refs>
    <vuln_soft>
      <prod name="openwsman" vendor="openwsman">
        <vers num="1.2.0"/>
        <vers num="2.0.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2235" seq="2008-2235" published="2008-08-01" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.9" CVSS_base_score="4.9" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:C/A:N)">
    <desc>
      <descript source="cve">OpenSC before 0.11.5 uses weak permissions (ADMIN file control information of 00) for the 5015 directory on smart cards and USB crypto tokens running Siemens CardOS M4, which allows physically proximate attackers to change the PIN.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html">SUSE-SR:2008:019</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html">SUSE-SR:2009:004</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200812-09.xml">GLSA-200812-09</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:183">MDVSA-2008:183</ref>
      <ref source="MLIST" url="http://www.opensc-project.org/pipermail/opensc-announce/2008-July/000020.html">[opensc-announce] 20080731 OpenSC Security Vulnerability and new Versions of OpenSC, OpenCT, LibP11, Pam_P11, Engine_PKCS11</ref>
      <ref source="CONFIRM" url="http://www.opensc-project.org/security.html">http://www.opensc-project.org/security.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30473" patch="1">30473</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/44140">opensc-smartcard-cryptotoken-weak-security(44140)</ref>
      <ref source="DEBIAN" url="https://www.debian.org/security/2008/dsa-1627">DSA-1627</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00686.html">FEDORA-2009-2267</ref>
    </refs>
    <vuln_soft>
      <prod name="opensc" vendor="opensc-project">
        <vers num="0.3.2"/>
        <vers num="0.3.5"/>
        <vers num="0.4.0"/>
        <vers num="0.6.0"/>
        <vers num="0.6.1"/>
        <vers num="0.7.0"/>
        <vers num="0.8"/>
        <vers num="0.8.0.0"/>
        <vers num="0.8.1"/>
        <vers num="0.9"/>
        <vers num="0.9.6"/>
        <vers num="0.9.7" edition="b"/>
        <vers num="0.9.7" edition="d"/>
        <vers num="0.9.8"/>
        <vers num="0.11.0"/>
        <vers num="0.11.1"/>
        <vers num="0.11.2"/>
        <vers num="0.11.3" edition="pre3"/>
        <vers num="0.11.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2236" seq="2008-2236" published="2008-10-03" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in blosxom.cgi in Blosxom before 2.1.2 allows remote attackers to inject arbitrary web script or HTML via the flav parameter (flavour variable).  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="JVN" url="http://jvn.jp/en/jp/JVN03300113/index.html">JVN#03300113</ref>
      <ref source="JVNDB" url="http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000073.html">JVNDB-2008-000073</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=630149">http://sourceforge.net/project/shownotes.php?release_id=630149</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/31535">31535</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/45600">blosxom-flav-xss(45600)</ref>
    </refs>
    <vuln_soft>
      <prod name="blosxom" vendor="blosxom">
        <vers num="0.1.5"/>
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="2.0"/>
        <vers num="2.0-3"/>
        <vers num="2.0-4"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.0.5"/>
        <vers num="2.0.6"/>
        <vers num="2.0.7"/>
        <vers num="2.0.8"/>
        <vers num="2.0.9"/>
        <vers num="2.1.0"/>
        <vers num="2.1.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2237" seq="2008-2237" published="2008-10-30" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in OpenOffice.org (OOo) 2.x before 2.4.2 allows remote attackers to execute arbitrary code via a crafted WMF file associated with a StarOffice/StarSuite document.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html">SUSE-SR:2008:026</ref>
      <ref source="CONFIRM" url="http://neowiki.neooffice.org/index.php/NeoOffice_2.2.5_Patch_3_New_Features#Security_fixes">http://neowiki.neooffice.org/index.php/NeoOffice_2.2.5_Patch_3_New_Features#Security_fixes</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200812-13.xml">GLSA-200812-13</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-242627-1">242627</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1661" patch="1">DSA-1661</ref>
      <ref source="CONFIRM" url="http://www.openoffice.org/security/cves/CVE-2008-2237.html" patch="1">http://www.openoffice.org/security/cves/CVE-2008-2237.html</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0939.html">RHSA-2008:0939</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/31962" patch="1">31962</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1021120">1021120</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-677-1">USN-677-1</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-677-2">USN-677-2</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2947">ADV-2008-2947</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/3103">ADV-2008-3103</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/46165">openoffice-wmf-bo(46165)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10784">oval:org.mitre.oval:def:10784</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00905.html">FEDORA-2008-9313</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00923.html">FEDORA-2008-9333</ref>
    </refs>
    <vuln_soft>
      <prod name="openoffice.org" vendor="openoffice">
        <vers num="2.0"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
        <vers num="2.0.4"/>
        <vers num="2.1"/>
        <vers num="2.2"/>
        <vers num="2.2.1"/>
        <vers num="2.3"/>
        <vers num="2.3.1"/>
        <vers num="2.4"/>
        <vers num="2.4.1" prev="1" edition=":64-bit"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2238" seq="2008-2238" published="2008-10-30" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple integer overflows in OpenOffice.org (OOo) 2.x before 2.4.2 allow remote attackers to execute arbitrary code via crafted EMR records in an EMF file associated with a StarOffice/StarSuite document, which trigger a heap-based buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=750">20081031 OpenOffice EMF Record Parsing Multiple Integer Overflow Vulnerabilities</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html">SUSE-SR:2008:026</ref>
      <ref source="CONFIRM" url="http://neowiki.neooffice.org/index.php/NeoOffice_2.2.5_Patch_3_New_Features#Security_fixes">http://neowiki.neooffice.org/index.php/NeoOffice_2.2.5_Patch_3_New_Features#Security_fixes</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200812-13.xml">GLSA-200812-13</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-243226-1">243226</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1661" patch="1">DSA-1661</ref>
      <ref source="CONFIRM" url="http://www.openoffice.org/security/cves/CVE-2008-2238.html" patch="1">http://www.openoffice.org/security/cves/CVE-2008-2238.html</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0939.html">RHSA-2008:0939</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/31962" patch="1">31962</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1021121">1021121</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-677-1">USN-677-1</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-677-2">USN-677-2</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2947">ADV-2008-2947</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/3103">ADV-2008-3103</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/3153">ADV-2008-3153</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/46166">openoffice-emf-file-bo(46166)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10849">oval:org.mitre.oval:def:10849</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00905.html">FEDORA-2008-9313</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00923.html">FEDORA-2008-9333</ref>
    </refs>
    <vuln_soft>
      <prod name="openoffice.org" vendor="openoffice">
        <vers num="2.0"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
        <vers num="2.0.4"/>
        <vers num="2.1"/>
        <vers num="2.2"/>
        <vers num="2.2.1"/>
        <vers num="2.3"/>
        <vers num="2.3.1"/>
        <vers num="2.4"/>
        <vers num="2.4.1" prev="1" edition=":64-bit"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2240" seq="2008-2240" published="2008-05-22" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the Web Server service in IBM Lotus Domino before 7.0.3 FP1, and 8.x before 8.0.1, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a long Accept-Language HTTP header.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="VIM" url="http://www.attrition.org/pipermail/vim/2008-May/001988.html">20080522 Who's Right</ref>
      <ref source="VIM" url="http://www.attrition.org/pipermail/vim/2008-May/001989.html">20080522 Who's Right</ref>
      <ref source="MISC" url="http://www.mwrinfosecurity.com/publications/mwri_ibm-lotus-domino-accept-language-stack-overflow_2008-05-20.pdf" patch="1">http://www.mwrinfosecurity.com/publications/mwri_ibm-lotus-domino-accept-language-stack-overflow_2008-05-20.pdf</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29310">29310</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020098">1020098</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1597">ADV-2008-1597</ref>
      <ref source="CONFIRM" url="http://www-1.ibm.com/support/docview.wss?uid=swg21303057" patch="1">http://www-1.ibm.com/support/docview.wss?uid=swg21303057</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42552">ibm-lotusdomino-acceptlanguage-bo(42552)</ref>
    </refs>
    <vuln_soft>
      <prod name="lotus_domino" vendor="ibm">
        <vers num="6.0"/>
        <vers num="6.5"/>
        <vers num="7.0"/>
        <vers num="8.0"/>
        <vers num="8.0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2241" seq="2008-2241" published="2008-05-21" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in caloggerd in CA BrightStor ARCServe Backup 11.0, 11.1, and 11.5 allows remote attackers to append arbitrary data to arbitrary files via directory traversal sequences in unspecified input fields, which are used in log messages.  NOTE: this can be leveraged for code execution in many installation environments by writing to a startup file or configuration file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492266/100/0/threaded">20080519 ZDI-08-027: CA BrightStor ARCserve Backup Arbitrary File Writing Vulnerability</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492274/100/0/threaded">20080519 CA ARCserve Backup caloggerd and xdr Functions Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29283" patch="1">29283</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020043">1020043</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1573/references">ADV-2008-1573</ref>
      <ref source="MISC" url="http://www.zerodayinitiative.com/advisories/ZDI-08-027/">http://www.zerodayinitiative.com/advisories/ZDI-08-027/</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42524">ca-arcservebackup-caloggerd-code-execution(42524)</ref>
      <ref source="CONFIRM" url="https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=176798" patch="1">https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=176798</ref>
    </refs>
    <vuln_soft>
      <prod name="brightstor_arcserve_backup" vendor="ca">
        <vers num="11.0"/>
        <vers num="11.1"/>
        <vers num="11.5"/>
        <vers num="r11.0"/>
      </prod>
      <prod name="business_protection_suite" vendor="ca">
        <vers num="2.0" edition=":microsoft_small_business_server_premium"/>
        <vers num="2.0" edition=":microsoft_small_business_server_standard"/>
      </prod>
      <prod name="server_protection_suite" vendor="ca">
        <vers num="2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2242" seq="2008-2242" published="2008-05-21" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple buffer overflows in xdr functions in the server in CA BrightStor ARCServe Backup 11.0, 11.1, and 11.5 allow remote attackers to execute arbitrary code, as demonstrated by a stack-based buffer overflow via a long parameter to the xdr_rwsstring function.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492274/100/0/threaded">20080519 CA ARCserve Backup caloggerd and xdr Functions Vulnerabilities</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492291/100/0/threaded">20080519 ZDI-08-026: CA BrightStor ARCserve Backup Remote Buffer Overflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29283" patch="1">29283</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020044">1020044</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1573/references">ADV-2008-1573</ref>
      <ref source="MISC" url="http://www.zerodayinitiative.com/advisories/ZDI-08-026/">http://www.zerodayinitiative.com/advisories/ZDI-08-026/</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42527">ca-arcservebackup-xdrrwsstring-bo(42527)</ref>
      <ref source="CONFIRM" url="https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=176798">https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=176798</ref>
    </refs>
    <vuln_soft>
      <prod name="brightstor_arcserve_backup" vendor="ca">
        <vers num="11.0"/>
        <vers num="11.1"/>
        <vers num="11.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2243" seq="2008-2243" published="2017-05-11" modified="2017-05-11" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2008. Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2008-2244" seq="2008-2244" published="2008-07-09" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Microsoft Office Word 2002 SP3 allows remote attackers to execute arbitrary code via a .doc file that contains malformed data, as exploited in the wild in July 2008, and as demonstrated by attachement.doc.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://blogs.technet.com/msrc/archive/2008/07/08/vulnerability-in-microsoft-word-could-allow-remote-code-execution.aspx">http://blogs.technet.com/msrc/archive/2008/07/08/vulnerability-in-microsoft-word-could-allow-remote-code-execution.aspx</ref>
      <ref source="MISC" url="http://isc.sans.org/diary.html?storyid=4696">http://isc.sans.org/diary.html?storyid=4696</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=121915960406986&amp;w=2">SSRT080117</ref>
      <ref source="CONFIRM" url="http://www.microsoft.com/technet/security/advisory/953635.mspx">http://www.microsoft.com/technet/security/advisory/953635.mspx</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30124">30124</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020447">1020447</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-225A.html">TA08-225A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2028">ADV-2008-2028</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43663">microsoft-word-unspecified-code-execution(43663)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5897">oval:org.mitre.oval:def:5897</ref>
    </refs>
    <vuln_soft>
      <prod name="office_word" vendor="microsoft">
        <vers num="2002" edition="sp3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2245" seq="2008-2245" published="2008-08-12" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in the InternalOpenColorProfile function in mscms.dll in Microsoft Windows Image Color Management System (MSCMS) in the Image Color Management (ICM) component on Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2 allows remote attackers to execute arbitrary code via a crafted image file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=742">20080812 Microsoft Windows Color Management Module Heap Buffer Overflow Vulnerability</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=121915960406986&amp;w=2">HPSBST02360</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/309739" patch="1">VU#309739</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30594" patch="1">30594</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020675">1020675</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-225A.html">TA08-225A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2350" adv="1">ADV-2008-2350</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-046">MS08-046</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5923">oval:org.mitre.oval:def:5923</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/6732">6732</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_2000" vendor="microsoft">
        <vers num="" edition="sp4"/>
      </prod>
      <prod name="windows_2003_server" vendor="microsoft">
        <vers num="" edition="sp1"/>
        <vers num="" edition="sp2"/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition="sp2"/>
        <vers num="" edition="sp3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2246" seq="2008-2246" published="2008-08-12" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:N/A:N)">
    <desc>
      <descript source="cve">Microsoft Windows Vista through SP1 and Server 2008 do not properly import the default IPsec policy from a Windows Server 2003 domain to a Windows Server 2008 domain, which prevents IPsec rules from being enforced and allows remote attackers to bypass intended access restrictions.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=121915960406986&amp;w=2">HPSBST02360</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30634" patch="1">30634</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020678">1020678</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-225A.html">TA08-225A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2351">ADV-2008-2351</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-047">MS08-047</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6060">oval:org.mitre.oval:def:6060</ref>
    </refs>
    <vuln_soft>
      <prod name="windows-nt" vendor="microsoft">
        <vers num="2008"/>
      </prod>
      <prod name="windows_vista" vendor="microsoft">
        <vers num="-" edition="sp1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2247" seq="2008-2247" published="2008-07-08" modified="2018-10-12" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Outlook Web Access (OWA) for Exchange Server 2003 SP2 allows remote attackers to inject arbitrary web script or HTML via unspecified e-mail fields, a different vulnerability than CVE-2008-2248.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/30130" adv="1">30130</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020439" adv="1">1020439</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-190A.html" adv="1">TA08-190A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2021/references">ADV-2008-2021</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-039">MS08-039</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43328" adv="1">exchange-owa-email-fields-xss(43328)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5354">oval:org.mitre.oval:def:5354</ref>
    </refs>
    <vuln_soft>
      <prod name="exchange_server" vendor="microsoft">
        <vers num="2003" edition="sp2"/>
        <vers num="2007" edition="sp1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2248" seq="2008-2248" published="2008-07-08" modified="2019-05-31" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Outlook Web Access (OWA) for Exchange Server 2003 SP2 allows remote attackers to inject arbitrary web script or HTML via unspecified HTML, a different vulnerability than CVE-2008-2247.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/30078">30078</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020439" adv="1">1020439</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-190A.html" adv="1">TA08-190A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2021/references">ADV-2008-2021</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-039">MS08-039</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43329" adv="1">exchange-owa-html-xss(43329)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5695">oval:org.mitre.oval:def:5695</ref>
    </refs>
    <vuln_soft>
      <prod name="exchange_server" vendor="microsoft">
        <vers num="2003" edition="sp2"/>
        <vers num="2007" edition="sp1"/>
      </prod>
      <prod name="outlook_web_access" vendor="microsoft">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2249" seq="2008-2249" published="2008-12-10" modified="2019-02-26" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Integer overflow in GDI in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows remote attackers to execute arbitrary code via a malformed header in a crafted WMF file, which triggers a buffer overflow, aka "GDI Integer Overflow Vulnerability."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=762">20081209 Microsoft Windows Graphics Device Interface Integer Overflow Vulnerability</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1021365">1021365</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-344A.html">TA08-344A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/3383">ADV-2008-3383</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-071">MS08-071</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5984">oval:org.mitre.oval:def:5984</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_2000" vendor="microsoft">
        <vers num="" edition="sp4"/>
      </prod>
      <prod name="windows_2003_server" vendor="microsoft">
        <vers num="" edition="sp1"/>
        <vers num="" edition="sp2:x64"/>
      </prod>
      <prod name="windows_server_2003" vendor="microsoft">
        <vers num="" edition="sp1:itanium"/>
        <vers num="" edition="sp2"/>
        <vers num="" edition="x64"/>
      </prod>
      <prod name="windows_server_2008" vendor="microsoft">
        <vers num="" edition=":itanium"/>
        <vers num="" edition=":x32"/>
        <vers num="" edition=":x64"/>
      </prod>
      <prod name="windows_vista" vendor="microsoft">
        <vers num="" edition=":x64"/>
        <vers num="" edition="sp1:x64"/>
        <vers num="gold"/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition=":pro_x64"/>
        <vers num="" edition="sp2:pro_x64"/>
        <vers num="" edition="sp3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2250" seq="2008-2250" published="2008-10-14" modified="2019-02-26" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 does not properly validate window properties sent from a parent window to a child window during creation of a new window, which allows local users to gain privileges via a crafted application, aka "Windows Kernel Window Creation Vulnerability."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=122479227205998&amp;w=2">SSRT080143</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/31651" patch="1">31651</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1021046">1021046</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-288A.html">TA08-288A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2812">ADV-2008-2812</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-061">MS08-061</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/45541">win-kernel-window-privilege-escalation(45541)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/45544">win-ms08kb954211-update(45544)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5902">oval:org.mitre.oval:def:5902</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_2000" vendor="microsoft">
        <vers num="" edition="sp4"/>
      </prod>
      <prod name="windows_server_2003" vendor="microsoft">
        <vers num="" edition="sp1:itanium"/>
        <vers num="" edition="sp1:x64"/>
        <vers num="" edition="sp2"/>
      </prod>
      <prod name="windows_server_2008" vendor="microsoft">
        <vers num="" edition=":itanium"/>
        <vers num="" edition=":x32"/>
        <vers num="" edition=":x64"/>
      </prod>
      <prod name="windows_vista" vendor="microsoft">
        <vers num="" edition=":x64"/>
        <vers num="" edition="sp1:x64"/>
        <vers num="sp1"/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition="sp2:x64"/>
        <vers num="" edition="sp3"/>
        <vers num="" edition="x64"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2251" seq="2008-2251" published="2008-10-14" modified="2019-02-26" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Double free vulnerability in the kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows local users to gain privileges via a crafted application that makes system calls within multiple threads, aka "Windows Kernel Unhandled Exception Vulnerability." NOTE: according to Microsoft, this is not a duplicate of CVE-2008-4510.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=122479227205998&amp;w=2">SSRT080143</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/31653" patch="1">31653</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1021046">1021046</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-288A.html">TA08-288A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2812">ADV-2008-2812</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-061">MS08-061</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/45542">win-kernel-system-calls-privilege-escalation(45542)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/45544">win-ms08kb954211-update(45544)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6010">oval:org.mitre.oval:def:6010</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_2000" vendor="microsoft">
        <vers num="" edition="sp4"/>
      </prod>
      <prod name="windows_server_2003" vendor="microsoft">
        <vers num="" edition="sp1:itanium"/>
        <vers num="" edition="sp1:x64"/>
        <vers num="" edition="sp2"/>
      </prod>
      <prod name="windows_server_2008" vendor="microsoft">
        <vers num="" edition=":itanium"/>
        <vers num="" edition=":x32"/>
        <vers num="" edition=":x64"/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition="sp2:x64"/>
        <vers num="" edition="sp3"/>
        <vers num="" edition="x64"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2252" seq="2008-2252" published="2008-10-14" modified="2019-10-09" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 does not properly validate parameters sent from user mode to the kernel, which allows local users to gain privileges via a crafted application, aka "Windows Kernel Memory Corruption Vulnerability."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=122479227205998&amp;w=2" adv="1">SSRT080143</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/31652" adv="1" patch="1">31652</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1021046" adv="1">1021046</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-288A.html" adv="1">TA08-288A</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-061" adv="1" patch="1">MS08-061</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/45543">win-kernel-input-privilege-escalation(45543)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/45544">win-ms08kb954211-update(45544)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6045" adv="1">oval:org.mitre.oval:def:6045</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_2000" vendor="microsoft">
        <vers num="-" edition="sp4"/>
      </prod>
      <prod name="windows_server_2003" vendor="microsoft">
        <vers num="-" edition="sp1:~~~~itanium~"/>
        <vers num="-" edition="sp1:~~~~x64~"/>
        <vers num="-" edition="sp2"/>
      </prod>
      <prod name="windows_server_2008" vendor="microsoft">
        <vers num="-" edition=":itanium"/>
      </prod>
      <prod name="windows_vista" vendor="microsoft">
        <vers num="-" edition=":~~~~x64~"/>
        <vers num="-" edition="sp1:~~~~x64~"/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="-" edition=":~~~~x64~"/>
        <vers num="-" edition="sp2:~~~~x64~"/>
        <vers num="-" edition="sp3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2253" seq="2008-2253" published="2008-09-10" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Microsoft Windows Media Player 11 allows remote attackers to execute arbitrary code via a crafted audio-only file that is streamed from a Server-Side Playlist (SSPL) on Windows Media Server, aka "Windows Media Player Sampling Rate Vulnerability."</descript>
      <descript source="nvd">http://www.microsoft.com/technet/security/Bulletin/MS08-054.mspx


Security updates are available from Microsoft Update, Windows Update, and Office Update. Security updates are also available from the Microsoft Download Center. You can find them most easily by doing a keyword search for "security update.

*Windows Server 2008 server core installation not affected. The vulnerability addressed by this update does not affect supported editions of Windows Server 2008 if Windows Server 2008 was installed using the Server Core installation option, even though the files affected by this vulnerability may be present on the system. However, users with the affected files will still be offered this update because the update files are newer (with higher version numbers) than the files that are currently on your system. For more information on this installation option, see Server Core. Note that the Server Core installation option does not apply to certain editions of Windows Server 2008; see Compare Server Core Installation Options.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=122235754013992&amp;w=2" adv="1">HPSBST02372</ref>
      <ref source="CONFIRM" url="http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&amp;id=766863#PRODUCTS">http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&amp;id=766863#PRODUCTS</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30550" adv="1">30550</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020831" adv="1">1020831</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-253A.html" adv="1">TA08-253A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2522" adv="1">ADV-2008-2522</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-054">MS08-054</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5615" adv="1">oval:org.mitre.oval:def:5615</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_media_player" vendor="microsoft">
        <vers num="11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2254" seq="2008-2254" published="2008-08-13" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Microsoft Internet Explorer 6 and 7 accesses uninitialized memory, which allows remote attackers to cause a denial of service (crash) and execute arbitrary code via unknown vectors, aka "HTML Object Memory Corruption Vulnerability."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=121915960406986&amp;w=2">HPSBST02360</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30614">30614</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020674">1020674</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-225A.html">TA08-225A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2349" adv="1">ADV-2008-2349</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-045">MS08-045</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5820">oval:org.mitre.oval:def:5820</ref>
    </refs>
    <vuln_soft>
      <prod name="ie" vendor="microsoft">
        <vers num="6"/>
        <vers num="7"/>
      </prod>
      <prod name="internet_explorer" vendor="microsoft">
        <vers num="6" edition="sp1"/>
        <vers num="6" edition="sp2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2255" seq="2008-2255" published="2008-08-13" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Microsoft Internet Explorer 5.01, 6, and 7 accesses uninitialized memory, which allows remote attackers to cause a denial of service (crash) and execute arbitrary code via unknown vectors, a different vulnerability than CVE-2008-2254, aka "HTML Object Memory Corruption Vulnerability."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=121915960406986&amp;w=2">HPSBST02360</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020674">1020674</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-225A.html">TA08-225A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2349">ADV-2008-2349</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-045">MS08-045</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5602">oval:org.mitre.oval:def:5602</ref>
    </refs>
    <vuln_soft>
      <prod name="ie" vendor="microsoft">
        <vers num="5.01"/>
        <vers num="6"/>
        <vers num="7"/>
      </prod>
      <prod name="internet_explorer" vendor="microsoft">
        <vers num="6" edition="sp1"/>
        <vers num="6" edition="sp2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2256" seq="2008-2256" published="2008-08-13" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Microsoft Internet Explorer 5.01, 6, and 7 does not properly handle objects that have been incorrectly initialized or deleted, which allows remote attackers to cause a denial of service (crash) and execute arbitrary code via unknown vectors, aka "Uninitialized Memory Corruption Vulnerability."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=121915960406986&amp;w=2">HPSBST02360</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30611">30611</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020674">1020674</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-225A.html">TA08-225A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2349">ADV-2008-2349</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-045">MS08-045</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5366">oval:org.mitre.oval:def:5366</ref>
    </refs>
    <vuln_soft>
      <prod name="ie" vendor="microsoft">
        <vers num="5.01"/>
        <vers num="6"/>
        <vers num="7"/>
      </prod>
      <prod name="internet_explorer" vendor="microsoft">
        <vers num="6" edition="sp1"/>
        <vers num="6" edition="sp2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2257" seq="2008-2257" published="2008-08-13" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Microsoft Internet Explorer 5.01, 6, and 7 accesses uninitialized memory in certain conditions, which allows remote attackers to cause a denial of service (crash) and execute arbitrary code via vectors related to a document object "appended in a specific order," aka "HTML Objects Memory Corruption Vulnerability" or "XHTML Rendering Memory Corruption Vulnerability," a different vulnerability than CVE-2008-2258.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=121915960406986&amp;w=2">HPSBST02360</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/495430/100/0/threaded">20080812 ZDI-08-050: Microsoft Internet Explorer XHTML Rendering Memory Corruption Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30613">30613</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020674">1020674</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-225A.html">TA08-225A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2349" adv="1">ADV-2008-2349</ref>
      <ref source="MISC" url="http://www.zerodayinitiative.com/advisories/ZDI-08-050/">http://www.zerodayinitiative.com/advisories/ZDI-08-050/</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-045">MS08-045</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5266">oval:org.mitre.oval:def:5266</ref>
    </refs>
    <vuln_soft>
      <prod name="ie" vendor="microsoft">
        <vers num="5.01"/>
        <vers num="6"/>
        <vers num="7"/>
      </prod>
      <prod name="internet_explorer" vendor="microsoft">
        <vers num="6" edition="sp1"/>
        <vers num="6" edition="sp2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2258" seq="2008-2258" published="2008-08-13" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Microsoft Internet Explorer 5.01, 6, and 7 accesses uninitialized memory in certain conditions, which allows remote attackers to cause a denial of service (crash) and execute arbitrary code via vectors related to a document object "appended in a specific order" with "particular functions ... performed on" document objects, aka "HTML Objects Memory Corruption Vulnerability" or "Table Layout Memory Corruption Vulnerability," a different vulnerability than CVE-2008-2257.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=121915960406986&amp;w=2">HPSBST02360</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/495431/100/0/threaded">20080812 ZDI-08-051: Microsoft Internet Explorer Table Layout Memory Corruption Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30610">30610</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020674">1020674</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-225A.html">TA08-225A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2349" adv="1">ADV-2008-2349</ref>
      <ref source="MISC" url="http://www.zerodayinitiative.com/advisories/ZDI-08-051/">http://www.zerodayinitiative.com/advisories/ZDI-08-051/</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-045">MS08-045</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6025">oval:org.mitre.oval:def:6025</ref>
    </refs>
    <vuln_soft>
      <prod name="ie" vendor="microsoft">
        <vers num="5.01"/>
        <vers num="6"/>
        <vers num="7"/>
      </prod>
      <prod name="internet_explorer" vendor="microsoft">
        <vers num="6" edition="sp1"/>
        <vers num="6" edition="sp2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2259" seq="2008-2259" published="2008-08-13" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Microsoft Internet Explorer 6 and 7 does not perform proper "argument validation" during print preview, which allows remote attackers to execute arbitrary code via unknown vectors, aka "HTML Component Handling Vulnerability."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=121915960406986&amp;w=2">HPSBST02360</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30612">30612</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020674">1020674</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-225A.html">TA08-225A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2349">ADV-2008-2349</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-045">MS08-045</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5913">oval:org.mitre.oval:def:5913</ref>
    </refs>
    <vuln_soft>
      <prod name="ie" vendor="microsoft">
        <vers num="6"/>
        <vers num="7"/>
      </prod>
      <prod name="internet_explorer" vendor="microsoft">
        <vers num="6" edition="sp1"/>
        <vers num="6" edition="sp2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2260" seq="2008-2260" published="2017-05-11" modified="2017-05-11" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2008. Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2008-2261" seq="2008-2261" published="2017-05-11" modified="2017-05-11" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2008. Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2008-2262" seq="2008-2262" published="2017-05-11" modified="2017-05-11" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2008. Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2008-2263" seq="2008-2263" published="2008-05-16" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in linking.page.php in Automated Link Exchange Portal allows remote attackers to execute arbitrary SQL commands via the cat_id parameter.  NOTE: linking.page.php is commonly renamed to link.php, links.php, etc.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29205">29205</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42401">automatedlinkexchange-catid-sql-injection(42401)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5611">5611</ref>
    </refs>
    <vuln_soft>
      <prod name="automated_link_exchange_portal" vendor="cmsnx">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2264" seq="2008-2264" published="2008-05-16" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php in CyrixMED 1.4 allows remote attackers to inject arbitrary web script or HTML via the msg_erreur parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29153">29153</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42353">cyrixmed-index-xss(42353)</ref>
    </refs>
    <vuln_soft>
      <prod name="cyrixmed" vendor="oued">
        <vers num="1.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2265" seq="2008-2265" published="2008-05-16" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in news.php in EMO Realty Manager allows remote attackers to execute arbitrary SQL commands via the ida parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29202">29202</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1525/references">ADV-2008-1525</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42404">emorealtymanager-news-sql-injection(42404)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5609">5609</ref>
    </refs>
    <vuln_soft>
      <prod name="emo_realty_manager" vendor="emophp">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2266" seq="2008-2266" published="2008-05-16" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.4" CVSS_base_score="4.4" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">uulib/uunconc.c in UUDeview 0.5.20, as used in nzbget before 0.3.0 and possibly other products, allows local users to overwrite arbitrary files via a symlink attack on a temporary filename generated by the tempnam function.  NOTE: this may be a CVE-2004-2265 regression.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=480972">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=480972</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200808-11.xml">GLSA-200808-11</ref>
      <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/05/14/10">[oss-security] 20080514 Re: CVE id request: uudeview</ref>
      <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/05/30/1">[oss-security] 20080530 Re: CVE id request: uudeview</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29211">29211</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42407">uudeview-tempnam-symlink(42407)</ref>
    </refs>
    <vuln_soft>
      <prod name="nzbget" vendor="nzbget">
        <vers num="0.1.0a"/>
        <vers num="0.1.1"/>
        <vers num="0.1.2"/>
        <vers num="0.2.0"/>
        <vers num="0.2.1"/>
        <vers num="0.2.2" prev="1"/>
      </prod>
      <prod name="uudeview" vendor="uudeview">
        <vers num="0.5.20"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2267" seq="2008-2267" published="2008-05-16" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Incomplete blacklist vulnerability in javaUpload.php in Postlet in the FileManager module in CMS Made Simple 1.2.4 and earlier allows remote attackers to execute arbitrary code by uploading a file with a name ending in (1) .jsp, (2) .php3, (3) .cgi, (4) .dhtml, (5) .phtml, (6) .php5, or (7) .jar, then accessing it via a direct request to the file in modules/FileManager/postlet/.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://blog.cmsmadesimple.org/2008/05/12/announcing-cms-made-simple-125/">http://blog.cmsmadesimple.org/2008/05/12/announcing-cms-made-simple-125/</ref>
      <ref source="VIM" url="http://www.attrition.org/pipermail/vim/2008-May/001978.html">20080514 PHP File Upload Vulnerability with extra Extension</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29170">29170</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42371">cmsmadesimple-javaupload-file-upload(42371)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5600">5600</ref>
    </refs>
    <vuln_soft>
      <prod name="cms_made_simple" vendor="cms_made_simple">
        <vers num="1.2.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2268" seq="2008-2268" published="2008-05-16" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Open redirect vulnerability in interface/redirect.htm.php in Mjguest 6.7 GT Rev.01 allows user-assisted remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the goto parameter in a redirect action to mjguest.php.  NOTE: this is user-assisted because there is a delay and a notification before redirection occurs.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3872">3872</ref>
      <ref source="CONFIRM" url="http://www.mdsjack.bo.it/public/phpBB3/viewtopic.php?t=2049">http://www.mdsjack.bo.it/public/phpBB3/viewtopic.php?t=2049</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491523/100/0/threaded">20080501 mjguest 6.7 (ALL VERSION) Xss &amp; Redirection Vuln</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492384/100/0/threaded">20080521 Re: mjguest 6.7 (ALL VERSION) Xss &amp; Redirection Vuln</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42130">mjguest-mjguest-security-bypass(42130)</ref>
    </refs>
    <vuln_soft>
      <prod name="mjguest" vendor="mdsjack">
        <vers num="6.7_gt_rev1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2269" seq="2008-2269" published="2008-05-16" modified="2017-10-18" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">AustinSmoke GasTracker (AS-GasTracker) 1.0.0 allows remote attackers to bypass authentication and gain privileges by setting the gastracker_admin cookie to TRUE.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29224">29224</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42435">asgastracker-admin-security-bypass(42435)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5615">5615</ref>
    </refs>
    <vuln_soft>
      <prod name="austinsmoke_gastracker" vendor="kevin_ludlow">
        <vers num="1.0.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2270" seq="2008-2270" published="2008-05-16" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple PHP remote file inclusion vulnerabilities in PHPWAY Kostenloses Linkmanagementscript allow remote attackers to execute arbitrary PHP code via a URL in the (1) main_page_directory and (2) page_to_include parameters in template\index.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29234">29234</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42446">kostenloses-index-file-include(42446)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5621">5621</ref>
    </refs>
    <vuln_soft>
      <prod name="kostenloses_linkmanagementscript" vendor="phpway">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2271" seq="2008-2271" published="2008-05-16" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The Site Documentation Drupal module 5.x before 5.x-1.8 and 6.x before 6.x-1.1 allows remote authenticated users to gain privileges of other users by leveraging the "access content" permission to list tables and obtain session IDs from the database.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://drupal.org/node/258547">http://drupal.org/node/258547</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29242">29242</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1541/references">ADV-2008-1541</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42453">site-access-content-info-disclosure(42453)</ref>
    </refs>
    <vuln_soft>
      <prod name="drupal" vendor="drupal">
        <vers num="5.7" prev="1"/>
        <vers num="6.2" prev="1"/>
      </prod>
      <prod name="site_documentation_module" vendor="drupal">
        <vers num="1.0" prev="1"/>
        <vers num="1.7" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2272" seq="2008-2272" published="2008-05-16" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in the web interface in Aruba Mobility Controller 2.4.8.x-FIPS, 2.5.5.x, 2.5.6.x, 3.1.1.x, 3.2.0.x, and 3.3.1.x allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.arubanetworks.com/support/alerts/aid-051408.asc">http://www.arubanetworks.com/support/alerts/aid-051408.asc</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492113/100/0/threaded">20080515 Aruba Mobility Controller TACACS User Authentication and Cross Site Scripting Vulnerabilities (Aruba Advisory ID: AID-051408)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29240">29240</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020033">1020033</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42433">aruba-webui-xss(42433)</ref>
    </refs>
    <vuln_soft>
      <prod name="aruba_mobility_controller" vendor="aruba_networks">
        <vers num="2.4.8" edition=":fips"/>
        <vers num="2.5.5"/>
        <vers num="2.5.6"/>
        <vers num="3.1.1"/>
        <vers num="3.2.0"/>
        <vers num="3.3.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2273" seq="2008-2273" published="2008-05-16" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.0" CVSS_base_score="9.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the TACACS authentication component in Aruba Mobility Controller 3.1.x, 3.2.x, and 3.3.x allows remote authenticated users to gain privileges via unknown vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.arubanetworks.com/support/alerts/aid-051408.asc">http://www.arubanetworks.com/support/alerts/aid-051408.asc</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492113/100/0/threaded">20080515 Aruba Mobility Controller TACACS User Authentication and Cross Site Scripting Vulnerabilities (Aruba Advisory ID: AID-051408)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29240">29240</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020032">1020032</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42434">aruba-tacacs-security-bypass(42434)</ref>
    </refs>
    <vuln_soft>
      <prod name="arubaos" vendor="arubanetworks">
        <vers num="3.1"/>
        <vers num="3.2"/>
        <vers num="3.3" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2274" seq="2008-2274" published="2008-05-16" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the sr_feuser_register 1.4.0, 1.6.0, 2.2.1 to 2.2.7, 2.3.0 to 2.3.6, 2.4.0, and 2.5.0 to 2.5.9 extension for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://typo3.org/teams/security/security-bulletins/typo3-20080515-1/" patch="1">http://typo3.org/teams/security/security-bulletins/typo3-20080515-1/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29239">29239</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42443">srfeuserregister-unspecified-xss(42443)</ref>
    </refs>
    <vuln_soft>
      <prod name="sr_feuser_register_extension" vendor="typo3">
        <vers num="1.4.0"/>
        <vers num="1.6.0"/>
        <vers num="2.2.1"/>
        <vers num="2.2.2"/>
        <vers num="2.2.3"/>
        <vers num="2.2.4"/>
        <vers num="2.2.5"/>
        <vers num="2.2.6"/>
        <vers num="2.2.7"/>
        <vers num="2.3.0"/>
        <vers num="2.3.3"/>
        <vers num="2.3.4"/>
        <vers num="2.3.5"/>
        <vers num="2.3.6"/>
        <vers num="2.4.0"/>
        <vers num="2.5.0"/>
        <vers num="2.5.1"/>
        <vers num="2.5.2"/>
        <vers num="2.5.3"/>
        <vers num="2.5.4"/>
        <vers num="2.5.5"/>
        <vers num="2.5.6"/>
        <vers num="2.5.7"/>
        <vers num="2.5.8"/>
        <vers num="2.5.9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2275" seq="2008-2275" published="2008-05-16" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in sr_feuser_register 1.4.0, 1.6.0, 2.2.1 to 2.2.7, 2.3.0 to 2.3.6, 2.4.0, and 2.5.0 to 2.5.9 extension for TYPO3 allows remote attackers to execute arbitrary code and delete arbitrary files via unspecified attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://typo3.org/teams/security/security-bulletins/typo3-20080515-1/" patch="1">http://typo3.org/teams/security/security-bulletins/typo3-20080515-1/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29239">29239</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42445">srfeuserregister-unspecified-code-execution(42445)</ref>
    </refs>
    <vuln_soft>
      <prod name="sr_feuser_register_extension" vendor="typo3">
        <vers num="1.4.0"/>
        <vers num="1.6.0"/>
        <vers num="2.2.1"/>
        <vers num="2.2.2"/>
        <vers num="2.2.3"/>
        <vers num="2.2.4"/>
        <vers num="2.2.5"/>
        <vers num="2.2.6"/>
        <vers num="2.2.7"/>
        <vers num="2.4.0"/>
        <vers num="2.5.0"/>
        <vers num="2.5.1"/>
        <vers num="2.5.2"/>
        <vers num="2.5.3"/>
        <vers num="2.5.4"/>
        <vers num="2.5.5"/>
        <vers num="2.5.6"/>
        <vers num="2.5.7"/>
        <vers num="2.5.8"/>
        <vers num="2.5.9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2276" seq="2008-2276" published="2008-05-16" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site request forgery (CSRF) vulnerability in manage_user_create.php in Mantis 1.1.1 allows remote attackers to create new administrative users via a crafted link.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=121130774617956&amp;w=4">20080520 Mantis Bug Tracker 1.1.1 Multiple Vulnerabilities</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?group_id=14963&amp;release_id=595025">http://sourceforge.net/project/shownotes.php?group_id=14963&amp;release_id=595025</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200809-10.xml">GLSA-200809-10</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29297">29297</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1598/references">ADV-2008-1598</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42447">mantis-usercreate-csrf(42447)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5657">5657</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00801.html">FEDORA-2008-6647</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00813.html">FEDORA-2008-6657</ref>
    </refs>
    <vuln_soft>
      <prod name="mantis" vendor="matisbt">
        <vers num="1.1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2277" seq="2008-2277" published="2008-05-16" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in detail.php in Feedback and Rating Script 1.0 allows remote attackers to execute arbitrary SQL commands via the listingid parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29228">29228</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42428">feedbackratingscript-detail-sql-injection(42428)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5614">5614</ref>
    </refs>
    <vuln_soft>
      <prod name="feedback_and_rating_script" vendor="cmsnx">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2278" seq="2008-2278" published="2008-05-16" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in browseproject.php in Freelance Auction Script 1.0 allows remote attackers to execute arbitrary SQL commands via the pid parameter in a pdetails action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29225">29225</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42424">freelance-browseproject-sql-injection(42424)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5613">5613</ref>
    </refs>
    <vuln_soft>
      <prod name="freelance_auction_script" vendor="freelanceauction">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2279" seq="2008-2279" published="2008-05-16" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Freelance Auction Script 1.0 stores user passwords in plaintext in the tbl_users table, which allows attackers to gain privileges by reading the table.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42426">freelance-password-info-disclosure(42426)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5613">5613</ref>
    </refs>
    <vuln_soft>
      <prod name="freelance_auction_script" vendor="freelance_auction">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2280" seq="2008-2280" published="2008-05-16" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in admin/index.php in Script PHP PicEngine 1.0 allows remote attackers to inject arbitrary web script or HTML via the l parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29214">29214</ref>
      <ref source="MISC" url="http://www.securityfocus.com/bid/29214/exploit">http://www.securityfocus.com/bid/29214/exploit</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42421">picsengine-index-xss(42421)</ref>
    </refs>
    <vuln_soft>
      <prod name="picengine" vendor="scriptphp">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2281" seq="2008-2281" published="2008-05-18" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Cross-zone scripting vulnerability in the Print Table of Links feature in Internet Explorer 6.0, 7.0, and 8.0b allows user-assisted remote attackers to inject arbitrary web script or HTML in the Local Machine Zone via an HTML document with a link containing JavaScript sequences, which are evaluated by a resource script when a user prints this document.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aviv.raffon.net/2008/05/14/InternetExplorerQuotPrintTableOfLinksquotCrossZoneScriptingVulnerability.aspx">http://aviv.raffon.net/2008/05/14/InternetExplorerQuotPrintTableOfLinksquotCrossZoneScriptingVulnerability.aspx</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29217">29217</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1529/references">ADV-2008-1529</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42416">ie-printtableoflinks-code-execution(42416)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5619">5619</ref>
    </refs>
    <vuln_soft>
      <prod name="ie" vendor="microsoft">
        <vers num="6.0"/>
        <vers num="7.0"/>
        <vers num="8.0b"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2282" seq="2008-2282" published="2008-05-18" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">admin.php in Internet Photoshow and Internet Photoshow Special Edition (SE) allows remote attackers to bypass authentication by setting the login_admin cookie to true.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29227">29227</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42422">internetphotoshow-cookie-auth-bypass(42422)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5617">5617</ref>
    </refs>
    <vuln_soft>
      <prod name="internet_photoshow" vendor="thomas_voecking">
        <vers num="null" edition=":special_edition"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2283" seq="2008-2283" published="2008-05-18" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">IDAutomation allows remote attackers to overwrite arbitrary files via the argument to the (1) SaveBarCode and (2) SaveEnhWMF methods in (a) the IDAuto.BarCode.1 ActiveX control in IDAutomationLinear6.dll (aka IDAutomation Linear BarCode) 1.6.0.6, (b) the IDAuto.Datamatrix.1 ActiveX control in IDAutomationDMATRIX6.DLL (aka IDautomation Datamatrix Barcode) 1.6.0.6, (c) the IDAuto.PDF417.1 ActiveX control in IDAutomationPDF417_6.dll (aka IDautomation PDF417 Barcode) 1.6.0.6, and (d) the IDAuto.Aztec.1 ActiveX control in IDAutomationAZTEC.dll (aka IDautomation Aztec Barcode) 1.7.1.0.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29204">29204</ref>
      <ref source="MISC" url="http://www.shinnai.altervista.org/index.php?mod=02_Forum&amp;group=Security&amp;argument=Remote_performed_exploits&amp;topic=1210750552.ff.php&amp;page=last">http://www.shinnai.altervista.org/index.php?mod=02_Forum&amp;group=Security&amp;argument=Remote_performed_exploits&amp;topic=1210750552.ff.php&amp;page=last</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42406">idautomation-activex-file-overwrite(42406)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5612">5612</ref>
    </refs>
    <vuln_soft>
      <prod name="aztec_barcode" vendor="idautomation">
        <vers num="1.7.1.0"/>
      </prod>
      <prod name="datamatrix_barcode" vendor="idautomation">
        <vers num="1.6.0.6"/>
      </prod>
      <prod name="linear_barcode" vendor="idautomation">
        <vers num="1.6.0.6"/>
      </prod>
      <prod name="pdf417_barcode" vendor="idautomation">
        <vers num="1.6.0.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2284" seq="2008-2284" published="2008-05-18" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in fusebox5.php in Fusebox 5.5.1 allows remote attackers to execute arbitrary PHP code via a URL in the FUSEBOX_APPLICATION_PATH parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29163">29163</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42389">fusebox-fusebox5-file-include(42389)</ref>
    </refs>
    <vuln_soft>
      <prod name="fusebox" vendor="fusebox">
        <vers num="5.5.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2285" seq="2008-2285" published="2008-05-18" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The ssh-vulnkey tool on Ubuntu Linux 7.04, 7.10, and 8.04 LTS does not recognize authorized_keys lines that contain options, which makes it easier for remote attackers to exploit CVE-2008-0166 by guessing a key that was not identified by this tool.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-612-5">USN-612-5</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42568">sshvulnkey-authorizedkeys-weak-security(42568)</ref>
    </refs>
    <vuln_soft>
      <prod name="linux" vendor="ubuntu">
        <vers num="7.04"/>
        <vers num="7.10"/>
        <vers num="8.04"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2286" seq="2008-2286" published="2008-05-18" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in axengine.exe in Symantec Altiris Deployment Solution 6.8.x and 6.9.x before 6.9.176 allows remote attackers to execute arbitrary SQL commands via unspecified string fields in a notification packet.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=122167472229965&amp;w=2">SSRT080115</ref>
      <ref source="OSVDB" url="http://osvdb.org/show/osvdb/45313">45313</ref>
      <ref source="EXPLOIT-DB" url="http://www.exploit-db.com/exploits/29552">29552</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492127/100/0/threaded">20080515 ZDI-08-024: Symantec Altiris Deployment Solution SQL Injection Vulnerability</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492229/100/0/threaded">20080518 Insomnia : ISVA-080516.1 - Altiris Deployment Solution - SQL Injection</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29198">29198</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020024">1020024</ref>
      <ref source="CONFIRM" url="http://www.symantec.com/avcenter/security/Content/2008.05.14a.html" adv="1" patch="1">http://www.symantec.com/avcenter/security/Content/2008.05.14a.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1542/references" adv="1">ADV-2008-1542</ref>
      <ref source="MISC" url="http://www.zerodayinitiative.com/advisories/ZDI-08-024/">http://www.zerodayinitiative.com/advisories/ZDI-08-024/</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42436">symantec-altiris-axengine-sql-injection(42436)</ref>
    </refs>
    <vuln_soft>
      <prod name="altiris_deployment_solution" vendor="symantec">
        <vers num="6.8"/>
        <vers num="6.9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2287" seq="2008-2287" published="2008-05-18" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Symantec Altiris Deployment Solution 6.8.x and 6.9.x before 6.9.176 does not properly protect the install directory, which might allow local users to gain privileges by replacing an application component with a Trojan horse.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=122167472229965&amp;w=2">SSRT080115</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29197">29197</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020024">1020024</ref>
      <ref source="CONFIRM" url="http://www.symantec.com/avcenter/security/Content/2008.05.14a.html" patch="1">http://www.symantec.com/avcenter/security/Content/2008.05.14a.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1542/references">ADV-2008-1542</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42442">symantec-altiris-install-code-execution(42442)</ref>
    </refs>
    <vuln_soft>
      <prod name="altiris_deployment_solution" vendor="symantec">
        <vers num="6.8"/>
        <vers num="6.9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2288" seq="2008-2288" published="2008-05-18" modified="2017-08-07" severity="Low" CVSS_version="2.0" CVSS_score="3.6" CVSS_base_score="3.6" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:P)">
    <desc>
      <descript source="cve">Symantec Altiris Deployment Solution 6.8.x and 6.9.x before 6.9.176 has insufficient access control for deletion and modification of registry keys, which allows local users to cause a denial of service or obtain sensitive information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=122167472229965&amp;w=2">SSRT080115</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29196">29196</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020024">1020024</ref>
      <ref source="CONFIRM" url="http://www.symantec.com/avcenter/security/Content/2008.05.14a.html" patch="1">http://www.symantec.com/avcenter/security/Content/2008.05.14a.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1542/references">ADV-2008-1542</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42441">symantec-altiris-keys-data-manipulation(42441)</ref>
    </refs>
    <vuln_soft>
      <prod name="altiris_deployment_solution" vendor="symantec">
        <vers num="6.8"/>
        <vers num="6.9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2289" seq="2008-2289" published="2008-05-18" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in a tooltip element in Symantec Altiris Deployment Solution 6.8.x and 6.9.x before 6.9.176 allows local users to gain privileges via unknown attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=122167472229965&amp;w=2">SSRT080115</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29218">29218</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020024">1020024</ref>
      <ref source="CONFIRM" url="http://www.symantec.com/avcenter/security/Content/2008.05.14a.html">http://www.symantec.com/avcenter/security/Content/2008.05.14a.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1542/references">ADV-2008-1542</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42440">symantec-altiris-tooltip-priv-escalation(42440)</ref>
    </refs>
    <vuln_soft>
      <prod name="altiris_deployment_solution" vendor="symantec">
        <vers num="6.0"/>
        <vers num="6.5.248"/>
        <vers num="6.5.299"/>
        <vers num="6.8"/>
        <vers num="6.8.378"/>
        <vers num="6.8.380.0"/>
        <vers num="6.8_sp1"/>
        <vers num="6.8_sp2"/>
        <vers num="6.9"/>
        <vers num="6.9.164"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2290" seq="2008-2290" published="2008-05-18" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Agent user interface in Symantec Altiris Deployment Solution 6.8.x and 6.9.x before 6.9.176 allows local users to gain privileges via unknown attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=122167472229965&amp;w=2">SSRT080115</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29194">29194</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020024">1020024</ref>
      <ref source="CONFIRM" url="http://www.symantec.com/avcenter/security/Content/2008.05.14a.html">http://www.symantec.com/avcenter/security/Content/2008.05.14a.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1542/references">ADV-2008-1542</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42438">symantec-altiris-interface-priv-escalation(42438)</ref>
    </refs>
    <vuln_soft>
      <prod name="altiris_deployment_solution" vendor="symantec">
        <vers num="6.8"/>
        <vers num="6.9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2291" seq="2008-2291" published="2008-05-18" modified="2019-10-09" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">axengine.exe in Symantec Altiris Deployment Solution 6.8.x and 6.9.x before 6.9.176 generates credentials with a fixed salt or without any salt, which makes it easier for remote attackers to guess encrypted domain credentials.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=122167472229965&amp;w=2" adv="1">SSRT080115</ref>
      <ref source="MISC" url="http://www.insomniasec.com/advisories/ISVA-080516.2.htm" adv="1">http://www.insomniasec.com/advisories/ISVA-080516.2.htm</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492128/100/0/threaded" adv="1">20080515 ZDI-08-025: Symantec Altiris Deployment Solution Domain Credential Disclosure Vulnerability</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492228/100/0/threaded" adv="1">20080518 Insomnia : ISVA-080516.2 - Altiris Deployment Solution - Domain Account Disclosure</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29199" adv="1">29199</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020024" adv="1">1020024</ref>
      <ref source="CONFIRM" url="http://www.symantec.com/avcenter/security/Content/2008.05.14a.html" adv="1" patch="1">http://www.symantec.com/avcenter/security/Content/2008.05.14a.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1542/references" adv="1">ADV-2008-1542</ref>
      <ref source="MISC" url="http://www.zerodayinitiative.com/advisories/ZDI-08-025/" adv="1">http://www.zerodayinitiative.com/advisories/ZDI-08-025/</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42437" adv="1">symantec-altiris-axengine-info-disclosure(42437)</ref>
    </refs>
    <vuln_soft>
      <prod name="altiris_deployment_solution" vendor="symantec">
        <vers num="6.8" edition="-"/>
        <vers num="6.8" edition="sp1"/>
        <vers num="6.8" edition="sp2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2292" seq="2008-2292" published="2008-05-18" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in the __snprint_value function in snmp_get in Net-SNMP 5.1.4, 5.2.4, and 5.4.1, as used in SNMP.xs for Perl, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large OCTETSTRING in an attribute value pair (AVP).</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html">SUSE-SA:2008:039</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200808-02.xml">GLSA-200808-02</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/tracker/index.php?func=detail&amp;aid=1826174&amp;group_id=12694&amp;atid=112694">http://sourceforge.net/tracker/index.php?func=detail&amp;aid=1826174&amp;group_id=12694&amp;atid=112694</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-239785-1">239785</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm">http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1663">DSA-1663</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:118">MDVSA-2008:118</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0529.html">RHSA-2008:0529</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29212">29212</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020527">1020527</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-685-1">USN-685-1</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2008-0013.html">http://www.vmware.com/security/advisories/VMSA-2008-0013.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1528/references">ADV-2008-1528</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2141/references">ADV-2008-2141</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2361">ADV-2008-2361</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42430">netsnmp-snprintvalue-bo(42430)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11261">oval:org.mitre.oval:def:11261</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html">FEDORA-2008-5215</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html">FEDORA-2008-5224</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html">FEDORA-2008-5218</ref>
    </refs>
    <vuln_soft>
      <prod name="net-snmp" vendor="net-snmp">
        <vers num="5.1.4"/>
        <vers num="5.2.4"/>
        <vers num="5.4.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2293" seq="2008-2293" published="2008-05-18" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">admin.php in Multi-Page Comment System (MPCS) 1.0 and 1.1 allows remote attackers to bypass authentication and gain privileges by setting the CommentSystemAdmin cookie to 1.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29244">29244</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42463">mpcs-cookie-auth-bypass(42463)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5630">5630</ref>
    </refs>
    <vuln_soft>
      <prod name="mpcs" vendor="tpvgames">
        <vers num="1.0"/>
        <vers num="1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2294" seq="2008-2294" published="2008-05-18" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Pet Grooming Management System 2.0 allows remote attackers to gain privileges via a direct request to useradded.php with a modified user name for "admin."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29252">29252</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42466">pgms-useradded-security-bypass(42466)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5627">5627</ref>
    </refs>
    <vuln_soft>
      <prod name="pet_grooming_management_system" vendor="mreaves">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2295" seq="2008-2295" published="2008-05-18" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in rg_search.php in Rgboard 3.0.12, and possibly earlier versions, allows remote attackers to inject arbitrary web script or HTML via the s_text parameter and other unspecified vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29230">29230</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42432">rgboard-rgsearch-xss(42432)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5620">5620</ref>
    </refs>
    <vuln_soft>
      <prod name="rgboard" vendor="rgboard">
        <vers num="3.0.12" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2296" seq="2008-2296" published="2008-05-18" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in include/bbs.lib.inc.php in Rgboard 3.0.12 allows remote attackers to execute arbitrary PHP code via a URL in the site_path parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29230">29230</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42431">rgboard-sitepath-file-include(42431)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5620">5620</ref>
    </refs>
    <vuln_soft>
      <prod name="rgboard" vendor="rgboard">
        <vers num="3.0.12"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2297" seq="2008-2297" published="2008-05-18" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The admin.php file in Rantx allows remote attackers to bypass authentication and gain privileges by setting the logininfo cookie to "&lt;?php" or "?>", which is present in the password file and probably passes an insufficient comparison.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29243">29243</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42464">rantx-admin-auth-bypass(42464)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5628">5628</ref>
    </refs>
    <vuln_soft>
      <prod name="rantx" vendor="roticv">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2298" seq="2008-2298" published="2008-05-18" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Admin.php in Web Slider 0.6 allows remote attackers to bypass authentication and gain privileges by setting the admin cookie to 1.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29246">29246</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42468">webslider-admin-security-bypass(42468)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5629">5629</ref>
    </refs>
    <vuln_soft>
      <prod name="web_slider" vendor="sourceforge">
        <vers num="0.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2299" seq="2008-2299" published="2008-05-18" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in SecureICA and ICA Basic encryption of Citrix Presentation Server 4.5 and earlier, Access Essentials 2.0 and earlier, and Desktop Server 1.0 can cause clients to use weaker encryption settings than configured by the administrator, which might allow attackers to bypass intended restrictions.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://support.citrix.com/article/CTX114893" patch="1">http://support.citrix.com/article/CTX114893</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29233">29233</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020026" patch="1">1020026</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1531/references">ADV-2008-1531</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42444">citrix-presentationserver-ica-weak-security(42444)</ref>
    </refs>
    <vuln_soft>
      <prod name="access_essentials" vendor="citrix">
        <vers num="2.0" prev="1"/>
      </prod>
      <prod name="desktop_server" vendor="citrix">
        <vers num="1.0"/>
      </prod>
      <prod name="presentation_server" vendor="citrix">
        <vers num="4.5" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2300" seq="2008-2300" published="2008-05-18" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Citrix Presentation Server 4.5 and earlier, Citrix Access Essentials 2.0 and earlier, and Citrix Desktop Server 1.0 allows remote authenticated users to access unauthorized desktops via unknown attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://support.citrix.com/article/CTX116941">http://support.citrix.com/article/CTX116941</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29232">29232</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020027">1020027</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1530/references">ADV-2008-1530</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42439">citrix-presentationserver-unauth-access(42439)</ref>
    </refs>
    <vuln_soft>
      <prod name="access_essentials" vendor="citrix">
        <vers num="1.0"/>
        <vers num="1.5"/>
        <vers num="2.0" prev="1"/>
      </prod>
      <prod name="citrix_presentation_server" vendor="citrix">
        <vers num="4.5" prev="1"/>
      </prod>
      <prod name="desktop_server" vendor="citrix">
        <vers num="1.0"/>
      </prod>
      <prod name="metaframe_presentation_server" vendor="citrix">
        <vers num="4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2301" seq="2008-2301" published="2008-05-18" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in Kostenloses Linkmanagementscript allows remote attackers to execute arbitrary SQL commands via the id parameter to (1) view.php and (2) top_view.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3893">3893</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492111/100/0/threaded">20080515 Kostenloses Linkmanagementscript SQL Injection Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29236">29236</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42455">kostenloses-view-sql-injection(42455)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5623">5623</ref>
    </refs>
    <vuln_soft>
      <prod name="kostenloses_linkmanagementscript" vendor="phpway">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2302" seq="2008-2302" published="2008-05-23" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the login form in the administration application in Django 0.91 before 0.91.2, 0.95 before 0.95.3, and 0.96 before 0.96.2 allows remote attackers to inject arbitrary web script or HTML via the URI of a certain previous request.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020028">1020028</ref>
      <ref source="CONFIRM" url="http://www.djangoproject.com/weblog/2008/may/14/security/" patch="1">http://www.djangoproject.com/weblog/2008/may/14/security/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29209" patch="1">29209</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1618">ADV-2008-1618</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42396">django-loginform-xss(42396)</ref>
    </refs>
    <vuln_soft>
      <prod name="django" vendor="django_project">
        <vers num="0.91"/>
        <vers num="0.95"/>
        <vers num="0.96"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2303" seq="2008-2303" published="2008-07-14" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Integer signedness error in Safari on Apple iPhone before 2.0 and iPod touch before 2.0 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving JavaScript array indices that trigger an out-of-bounds access, a different vulnerability than CVE-2008-2307.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Nov/msg00001.html">APPLE-SA-2008-11-13</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//Jul/msg00001.html">APPLE-SA-2008-07-11</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3298">http://support.apple.com/kb/HT3298</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30186">30186</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2094/references">ADV-2008-2094</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43736">ipod-iphone-javascript-code-execution(43736)</ref>
    </refs>
    <vuln_soft>
      <prod name="safari" vendor="apple">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2304" seq="2008-2304" published="2008-07-14" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in Apple Core Image Fun House 2.0 and earlier in CoreImage Examples in Xcode tools before 3.1 allows user-assisted attackers to execute arbitrary code or cause a denial of service (application crash) via a .funhouse file with a string XML element that contains many characters.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Jul/msg00002.html">APPLE-SA-2008-07-11</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3988">3988</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT2352">http://support.apple.com/kb/HT2352</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/494230/100/0/threaded">20080711 [NETRAGARD SECURITY ADVISORY][Apple Core Image Fun House &lt;= 2.0 OS X -- Arbitrary Code Execution][NETRAGARD-20080711]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30189">30189</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020472">1020472</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2093/references">ADV-2008-2093</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43733">apple-xcode-funhouse-bo(43733)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/6043">6043</ref>
    </refs>
    <vuln_soft>
      <prod name="core_image_fun_house" vendor="apple">
        <vers num="2.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2305" seq="2008-2305" published="2008-09-16" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in Apple Type Services (ATS) in Apple Mac OS X 10.4.11 and 10.5 through 10.5.4 allows remote attackers to execute arbitrary code via a document containing a crafted font, related to "PostScript font names."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html" patch="1">APPLE-SA-2008-09-15</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020873">1020873</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/31189" patch="1">31189</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-260A.html">TA08-260A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2584">ADV-2008-2584</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/45162">macos-ats-bo(45162)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.4.11"/>
        <vers num="10.5"/>
        <vers num="10.5.1"/>
        <vers num="10.5.2"/>
        <vers num="10.5.3"/>
        <vers num="10.5.4"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.4.11"/>
        <vers num="10.5"/>
        <vers num="10.5.1"/>
        <vers num="10.5.2"/>
        <vers num="10.5.3"/>
        <vers num="10.5.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2306" seq="2008-2306" published="2008-06-23" modified="2011-03-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Apple Safari before 3.1.2 on Windows does not properly interpret the URLACTION_SHELL_EXECUTE_HIGHRISK Internet Explorer zone setting, which allows remote attackers to bypass intended access restrictions, and force a client system to download and execute arbitrary files.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//Jun/msg00001.html" patch="1">APPLE-SA-2008-06-19</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/127185">VU#127185</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29835">29835</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020329">1020329</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1882/references">ADV-2008-1882</ref>
    </refs>
    <vuln_soft>
      <prod name="safari" vendor="apple">
        <vers num="3.0"/>
        <vers num="3.0.1"/>
        <vers num="3.0.2"/>
        <vers num="3.0.3"/>
        <vers num="3.0.4"/>
        <vers num="3.1"/>
        <vers num="3.1.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2307" seq="2008-2307" published="2008-06-23" modified="2011-03-15" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in WebKit in Apple Safari before 3.1.2, as distributed in Mac OS X before 10.5.4, and standalone for Windows and Mac OS X 10.4, allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via vectors involving JavaScript arrays that trigger memory corruption.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//Jul/msg00001.html" adv="1">APPLE-SA-2008-07-11</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//Jun/msg00001.html" adv="1" patch="1">APPLE-SA-2008-06-19</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//Jun/msg00003.html">APPLE-SA-2008-06-30</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT2092">http://support.apple.com/kb/HT2092</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT2163" adv="1">http://support.apple.com/kb/HT2163</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT2165" adv="1">http://support.apple.com/kb/HT2165</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/361043">VU#361043</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29836" patch="1">29836</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020330">1020330</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1882/references" adv="1">ADV-2008-1882</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1980" adv="1">ADV-2008-1980</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1981/references" adv="1">ADV-2008-1981</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2094/references" adv="1">ADV-2008-2094</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00279.html">FEDORA-2008-6186</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00319.html">FEDORA-2008-6220</ref>
    </refs>
    <vuln_soft>
      <prod name="safari" vendor="apple">
        <vers num="3.0"/>
        <vers num="3.0.1"/>
        <vers num="3.0.2"/>
        <vers num="3.0.3"/>
        <vers num="3.0.4"/>
        <vers num="3.1"/>
        <vers num="3.1.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2308" seq="2008-2308" published="2008-07-01" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Alias Manager in Apple Mac OS X 10.5.1 and earlier on Intel platforms allows local users to gain privileges or cause a denial of service (memory corruption and application crash) by resolving an alias that contains crafted AFP volume mount information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html">APPLE-SA-2008-06-30</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020390">1020390</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT2163" patch="1">http://support.apple.com/kb/HT2163</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30018">30018</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1981/references">ADV-2008-1981</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43474">macos-aliasmanager-code-execution(43474)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.4.1"/>
        <vers num="10.4.2"/>
        <vers num="10.4.3"/>
        <vers num="10.4.4"/>
        <vers num="10.4.5"/>
        <vers num="10.4.6"/>
        <vers num="10.4.7"/>
        <vers num="10.4.8"/>
        <vers num="10.4.9"/>
        <vers num="10.4.10"/>
        <vers num="10.4.11"/>
        <vers num="10.5"/>
        <vers num="10.5.1"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.4.1"/>
        <vers num="10.4.2"/>
        <vers num="10.4.3"/>
        <vers num="10.4.4"/>
        <vers num="10.4.5"/>
        <vers num="10.4.6"/>
        <vers num="10.4.7"/>
        <vers num="10.4.8"/>
        <vers num="10.4.9"/>
        <vers num="10.5"/>
        <vers num="10.5.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2309" seq="2008-2309" published="2008-07-01" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Incomplete blacklist vulnerability in CoreTypes in Apple Mac OS X before 10.5.4 allows user-assisted remote attackers to execute arbitrary code via a (1) .xht or (2) .xhtm file, which does not trigger a "potentially unsafe" warning message in (a) the Download Validation feature in Mac OS X 10.4 or (b) the Quarantine feature in Mac OS X 10.5.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html">APPLE-SA-2008-06-30</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020391">1020391</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT2163" patch="1">http://support.apple.com/kb/HT2163</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30018">30018</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1981/references">ADV-2008-1981</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43493">macos-coretypes-code-execution(43493)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.4.1"/>
        <vers num="10.4.2"/>
        <vers num="10.4.3"/>
        <vers num="10.4.4"/>
        <vers num="10.4.5"/>
        <vers num="10.4.6"/>
        <vers num="10.4.7"/>
        <vers num="10.4.8"/>
        <vers num="10.4.9"/>
        <vers num="10.4.10"/>
        <vers num="10.4.11"/>
        <vers num="10.5"/>
        <vers num="10.5.1"/>
        <vers num="10.5.2"/>
        <vers num="10.5.3"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.4.1"/>
        <vers num="10.4.2"/>
        <vers num="10.4.3"/>
        <vers num="10.4.4"/>
        <vers num="10.4.5"/>
        <vers num="10.4.6"/>
        <vers num="10.4.7"/>
        <vers num="10.4.8"/>
        <vers num="10.4.9"/>
        <vers num="10.4.10"/>
        <vers num="10.4.11"/>
        <vers num="10.5"/>
        <vers num="10.5.1"/>
        <vers num="10.5.2"/>
        <vers num="10.5.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2310" seq="2008-2310" published="2008-07-01" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Format string vulnerability in c++filt in Apple Mac OS X 10.5 before 10.5.4 allows user-assisted attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted string in (1) C++ or (2) Java source code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html">APPLE-SA-2008-06-30</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020392">1020392</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT2163" patch="1">http://support.apple.com/kb/HT2163</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30018">30018</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1981/references">ADV-2008-1981</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43494">macos-c++filt-format-string(43494)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.4.1"/>
        <vers num="10.4.2"/>
        <vers num="10.4.3"/>
        <vers num="10.4.4"/>
        <vers num="10.4.5"/>
        <vers num="10.4.6"/>
        <vers num="10.4.7"/>
        <vers num="10.4.8"/>
        <vers num="10.4.9"/>
        <vers num="10.4.10"/>
        <vers num="10.4.11"/>
        <vers num="10.5"/>
        <vers num="10.5.1"/>
        <vers num="10.5.2"/>
        <vers num="10.5.3" prev="1"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.4.1"/>
        <vers num="10.4.2"/>
        <vers num="10.4.3"/>
        <vers num="10.4.4"/>
        <vers num="10.4.5"/>
        <vers num="10.4.6"/>
        <vers num="10.4.7"/>
        <vers num="10.4.8"/>
        <vers num="10.4.9"/>
        <vers num="10.4.10"/>
        <vers num="10.4.11"/>
        <vers num="10.5"/>
        <vers num="10.5.1"/>
        <vers num="10.5.2"/>
        <vers num="10.5.3" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2311" seq="2008-2311" published="2008-07-01" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.6" CVSS_base_score="7.6" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Launch Services in Apple Mac OS X before 10.5, when Open Safe Files is enabled, allows remote attackers to execute arbitrary code via a symlink attack, probably related to a race condition and automatic execution of a downloaded file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html">APPLE-SA-2008-06-30</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020393">1020393</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT2163" patch="1">http://support.apple.com/kb/HT2163</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30018">30018</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1981/references">ADV-2008-1981</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43495">macos-launchservices-code-execution(43495)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.4.1"/>
        <vers num="10.4.2"/>
        <vers num="10.4.3"/>
        <vers num="10.4.4"/>
        <vers num="10.4.5"/>
        <vers num="10.4.6"/>
        <vers num="10.4.7"/>
        <vers num="10.4.8"/>
        <vers num="10.4.9"/>
        <vers num="10.4.10"/>
        <vers num="10.4.11"/>
        <vers num="10.5"/>
        <vers num="10.5.1"/>
        <vers num="10.5.2"/>
        <vers num="10.5.3"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.4.1"/>
        <vers num="10.4.2"/>
        <vers num="10.4.3"/>
        <vers num="10.4.4"/>
        <vers num="10.4.5"/>
        <vers num="10.4.6"/>
        <vers num="10.4.7"/>
        <vers num="10.4.8"/>
        <vers num="10.4.9"/>
        <vers num="10.4.10"/>
        <vers num="10.4.11"/>
        <vers num="10.5"/>
        <vers num="10.5.1"/>
        <vers num="10.5.2"/>
        <vers num="10.5.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2312" seq="2008-2312" published="2008-09-16" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.9" CVSS_base_score="4.9" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:N/A:N)">
    <desc>
      <descript source="cve">Network Preferences in Apple Mac OS X 10.4.11 stores PPP passwords in cleartext in a world-readable file, which allows local users to obtain sensitive information by reading this file.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html" patch="1">APPLE-SA-2008-09-15</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020881">1020881</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/31189" patch="1">31189</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-260A.html">TA08-260A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2584">ADV-2008-2584</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/45173">macos-ppppassword-information-disclosure(45173)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.4.11"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.4.11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2313" seq="2008-2313" published="2008-07-01" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Apple Mac OS X before 10.5 uses weak permissions for the User Template directory, which allows local users to gain privileges by inserting a Trojan horse file into this directory.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html">APPLE-SA-2008-06-30</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020394">1020394</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT2163">http://support.apple.com/kb/HT2163</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30018">30018</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1981/references">ADV-2008-1981</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43496">macos-usertemplate-code-execution(43496)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.4.1"/>
        <vers num="10.4.2"/>
        <vers num="10.4.3"/>
        <vers num="10.4.4"/>
        <vers num="10.4.5"/>
        <vers num="10.4.6"/>
        <vers num="10.4.7"/>
        <vers num="10.4.8"/>
        <vers num="10.4.9"/>
        <vers num="10.4.10"/>
        <vers num="10.4.11"/>
        <vers num="10.5"/>
        <vers num="10.5.1"/>
        <vers num="10.5.2"/>
        <vers num="10.5.3"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.4.1"/>
        <vers num="10.4.2"/>
        <vers num="10.4.3"/>
        <vers num="10.4.4"/>
        <vers num="10.4.5"/>
        <vers num="10.4.6"/>
        <vers num="10.4.7"/>
        <vers num="10.4.8"/>
        <vers num="10.4.9"/>
        <vers num="10.4.10"/>
        <vers num="10.4.11"/>
        <vers num="10.5"/>
        <vers num="10.5.1"/>
        <vers num="10.5.2"/>
        <vers num="10.5.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2314" seq="2008-2314" published="2008-07-01" modified="2019-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.4" CVSS_base_score="4.4" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Dock in Apple Mac OS X 10.5 before 10.5.4, when Expos? hot corners is enabled, allows physically proximate attackers to gain access to a locked session in (1) sleep mode or (2) screen saver mode via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html">APPLE-SA-2008-06-30</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020395">1020395</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT2163">http://support.apple.com/kb/HT2163</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30018">30018</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1981/references">ADV-2008-1981</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43497">macos-dock-security-bypass(43497)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.4.1"/>
        <vers num="10.4.2"/>
        <vers num="10.4.3"/>
        <vers num="10.4.4"/>
        <vers num="10.4.5"/>
        <vers num="10.4.6"/>
        <vers num="10.4.7"/>
        <vers num="10.4.8"/>
        <vers num="10.4.9"/>
        <vers num="10.4.10"/>
        <vers num="10.4.11"/>
        <vers num="10.5"/>
        <vers num="10.5.1"/>
        <vers num="10.5.2"/>
        <vers num="10.5.3"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.4.1"/>
        <vers num="10.4.2"/>
        <vers num="10.4.3"/>
        <vers num="10.4.4"/>
        <vers num="10.4.5"/>
        <vers num="10.4.6"/>
        <vers num="10.4.7"/>
        <vers num="10.4.8"/>
        <vers num="10.4.9"/>
        <vers num="10.4.10"/>
        <vers num="10.4.11"/>
        <vers num="10.5"/>
        <vers num="10.5.1"/>
        <vers num="10.5.2"/>
        <vers num="10.5.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2315" seq="2008-2315" published="2008-08-01" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple integer overflows in Python 2.5.2 and earlier allow context-dependent attackers to have an unknown impact via vectors related to the (1) stringobject, (2) unicodeobject, (3) bufferobject, (4) longobject, (5) tupleobject, (6) stropmodule, (7) gcmodule, and (8) mmapmodule modules.  NOTE: The expandtabs integer overflows in stringobject and unicodeobject in 2.5.2 are covered by CVE-2008-5031.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.gentoo.org/attachment.cgi?id=159418&amp;action=view">http://bugs.gentoo.org/attachment.cgi?id=159418&amp;action=view</ref>
      <ref source="CONFIRM" url="http://bugs.gentoo.org/show_bug.cgi?id=230640">http://bugs.gentoo.org/show_bug.cgi?id=230640</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html">APPLE-SA-2009-02-12</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html">SUSE-SR:2008:017</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200807-16.xml">GLSA-200807-16</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.525289">SSA:2008-217-01</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3438">http://support.apple.com/kb/HT3438</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/css/P8/documents/100074697">http://support.avaya.com/css/P8/documents/100074697</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1667">DSA-1667</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:163">MDVSA-2008:163</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:164">MDVSA-2008:164</ref>
      <ref source="CONFIRM" url="http://www.novell.com/support/search.do?cmd=displayKC&amp;docType=kc&amp;externalId=InfoDocument-patchbuilder-readme5032900">http://www.novell.com/support/search.do?cmd=displayKC&amp;docType=kc&amp;externalId=InfoDocument-patchbuilder-readme5032900</ref>
      <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/11/05/2">[oss-security] 20081105 CVE Request - Python string expandtabs</ref>
      <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/11/05/3">[oss-security] 20081105 Re: CVE Request - Python string expandtabs</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/507985/100/0/threaded">20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30491">30491</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-632-1">USN-632-1</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2009-0016.html">http://www.vmware.com/security/advisories/VMSA-2009-0016.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2288">ADV-2008-2288</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/3316">ADV-2009-3316</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/44172">python-modules-bo(44172)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/44173">python-multiple-bo(44173)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8445">oval:org.mitre.oval:def:8445</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8683">oval:org.mitre.oval:def:8683</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9761">oval:org.mitre.oval:def:9761</ref>
    </refs>
    <vuln_soft>
      <prod name="python" vendor="python_software_foundation">
        <vers num="1.5.2"/>
        <vers num="1.6"/>
        <vers num="1.6.1"/>
        <vers num="2.0"/>
        <vers num="2.0.1"/>
        <vers num="2.1"/>
        <vers num="2.1.1"/>
        <vers num="2.1.2"/>
        <vers num="2.1.3"/>
        <vers num="2.2"/>
        <vers num="2.2.1"/>
        <vers num="2.2.2"/>
        <vers num="2.2.3"/>
        <vers num="2.3"/>
        <vers num="2.3.1"/>
        <vers num="2.3.2"/>
        <vers num="2.3.3"/>
        <vers num="2.3.4"/>
        <vers num="2.3.5"/>
        <vers num="2.3.6"/>
        <vers num="2.3.7"/>
        <vers num="2.4"/>
        <vers num="2.4.1"/>
        <vers num="2.4.2"/>
        <vers num="2.4.3"/>
        <vers num="2.4.4"/>
        <vers num="2.4.5"/>
        <vers num="2.5"/>
        <vers num="2.5.1"/>
        <vers num="2.5.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2316" seq="2008-2316" published="2008-08-01" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Integer overflow in _hashopenssl.c in the hashlib module in Python 2.5.2 and earlier might allow context-dependent attackers to defeat cryptographic digests, related to "partial hashlib hashing of data exceeding 4GB."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.gentoo.org/attachment.cgi?id=159422&amp;action=view">http://bugs.gentoo.org/attachment.cgi?id=159422&amp;action=view</ref>
      <ref source="CONFIRM" url="http://bugs.gentoo.org/show_bug.cgi?id=230640">http://bugs.gentoo.org/show_bug.cgi?id=230640</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html">APPLE-SA-2009-02-12</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html">SUSE-SR:2008:017</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200807-16.xml">GLSA-200807-16</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.525289">SSA:2008-217-01</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3438">http://support.apple.com/kb/HT3438</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0243">http://wiki.rpath.com/Advisories:rPSA-2008-0243</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:163">MDVSA-2008:163</ref>
      <ref source="CONFIRM" url="http://www.novell.com/support/search.do?cmd=displayKC&amp;docType=kc&amp;externalId=InfoDocument-patchbuilder-readme5032900">http://www.novell.com/support/search.do?cmd=displayKC&amp;docType=kc&amp;externalId=InfoDocument-patchbuilder-readme5032900</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/495445/100/0/threaded">20080813 rPSA-2008-0243-1 idle python</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30491">30491</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-632-1">USN-632-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2288">ADV-2008-2288</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/44173">python-multiple-bo(44173)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/44174">python-hashlib-overflow(44174)</ref>
    </refs>
    <vuln_soft>
      <prod name="python" vendor="python_software_foundation">
        <vers num="1.5.2"/>
        <vers num="1.6.1"/>
        <vers num="2.0.1"/>
        <vers num="2.1.3"/>
        <vers num="2.2.3"/>
        <vers num="2.3.7"/>
        <vers num="2.4.5"/>
        <vers num="2.5.1"/>
        <vers num="2.5.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2317" seq="2008-2317" published="2008-07-14" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">WebCore in Apple Safari does not properly perform garbage collection of JavaScript document elements, which allows remote attackers to execute arbitrary code or cause a denial of service (heap corruption and application crash) via a reference to the ownerNode property of a copied CSSStyleSheet object of a STYLE element, as originally demonstrated on Apple iPhone before 2.0 and iPod touch before 2.0, a different vulnerability than CVE-2008-1590.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Nov/msg00001.html" adv="1">APPLE-SA-2008-11-13</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//Jul/msg00001.html" adv="1">APPLE-SA-2008-07-11</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3298" adv="1">http://support.apple.com/kb/HT3298</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/494777/100/0/threaded">20080725 ZDI-08-045: Apple Safari StyleSheet ownerNode Heap Corruption Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30186">30186</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2094/references" adv="1">ADV-2008-2094</ref>
      <ref source="MISC" url="http://www.zerodayinitiative.com/advisories/ZDI-08-045/">http://www.zerodayinitiative.com/advisories/ZDI-08-045/</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43737">ipod-iphone-stylesheets-code-execution(43737)</ref>
    </refs>
    <vuln_soft>
      <prod name="safari" vendor="apple">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2318" seq="2008-2318" published="2008-07-14" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The WOHyperlink implementation in WebObjects in Apple Xcode tools before 3.1 appends local session IDs to generated non-local URLs, which allows remote attackers to obtain potentially sensitive information by reading the requests for these URLs.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Jul/msg00002.html">APPLE-SA-2008-07-11</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT2352">http://support.apple.com/kb/HT2352</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30191">30191</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020473">1020473</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2093/references">ADV-2008-2093</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43735">apple-xcode-webobjects-info-disclosure(43735)</ref>
    </refs>
    <vuln_soft>
      <prod name="xcode" vendor="apple">
        <vers num="1.5"/>
        <vers num="2.2"/>
      </prod>
      <prod name="xcode_tools" vendor="apple">
        <vers num="1.0"/>
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="2.2.1"/>
        <vers num="2.3"/>
        <vers num="2.4"/>
        <vers num="2.4.1"/>
        <vers num="2.5"/>
        <vers num="3.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2320" seq="2008-2320" published="2008-08-03" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in CarbonCore in Apple Mac OS X 10.4.11 and 10.5.4, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via a long filename to the file management API.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html" patch="1">APPLE-SA-2008-07-31</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html" patch="1">APPLE-SA-2009-06-08-1</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html" patch="1">APPLE-SA-2009-06-17-1</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3613" adv="1" patch="1">http://support.apple.com/kb/HT3613</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3639" adv="1" patch="1">http://support.apple.com/kb/HT3639</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/495040/100/0/threaded">20080801 n.runs-SA-2008.005 - Apple Inc. - CoreServices Framework&amp;acirc;??s CarbonCore Framework - Arbitrary Code Execution (remote)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30483" patch="1">30483</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30487" patch="1">30487</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020602">1020602</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2268" adv="1">ADV-2008-2268</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/1522" adv="1" patch="1">ADV-2009-1522</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/1621" adv="1" patch="1">ADV-2009-1621</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/44126">macosx-carboncore-bo(44126)</ref>
    </refs>
    <vuln_soft>
      <prod name="carboncore" vendor="apple">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2321" seq="2008-2321" published="2008-08-03" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in CoreGraphics in Apple Mac OS X 10.4.11 and 10.5.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via unknown vectors involving "processing of arguments."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html" patch="1">APPLE-SA-2008-07-31</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Nov/msg00002.html">APPLE-SA-2008-11-20</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html">APPLE-SA-2009-06-08-1</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3318">http://support.apple.com/kb/HT3318</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3613">http://support.apple.com/kb/HT3613</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30483" patch="1">30483</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30488" patch="1">30488</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020603">1020603</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2268">ADV-2008-2268</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/3232">ADV-2008-3232</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/1522">ADV-2009-1522</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/44127">macosx-coregraphics-code-execution(44127)</ref>
    </refs>
    <vuln_soft>
      <prod name="coregraphics" vendor="apple">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2322" seq="2008-2322" published="2008-08-03" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Integer overflow in CoreGraphics in Apple Mac OS X 10.4.11, 10.5.2, and 10.5.4 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a PDF file with a long Type 1 font, which triggers a heap-based buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=730">20080731 Apple Mac OS X CoreGraphics PDF Type1 Font Integer Overflow Vulnerability</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html">APPLE-SA-2008-07-31</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30483" patch="1">30483</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30489" patch="1">30489</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020604">1020604</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2268">ADV-2008-2268</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/44128">macosx-coregraphics-pdf-bo(44128)</ref>
    </refs>
    <vuln_soft>
      <prod name="coregraphics" vendor="apple">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2323" seq="2008-2323" published="2008-08-03" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.1" CVSS_base_score="7.1" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Data Detectors Engine in Apple Mac OS X 10.5.4 allows attackers to cause a denial of service (resource consumption) via crafted textual content in messages.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html">APPLE-SA-2008-07-31</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30483" patch="1">30483</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30490">30490</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020606">1020606</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2268">ADV-2008-2268</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/44130">macosx-datadetectorengine-dos(44130)</ref>
    </refs>
    <vuln_soft>
      <prod name="data_detectors_engine" vendor="apple">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2324" seq="2008-2324" published="2008-08-03" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The Repair Permissions tool in Disk Utility in Apple Mac OS X 10.4.11 adds the setuid bit to the emacs executable file, which allows local users to gain privileges by executing commands within emacs.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html">APPLE-SA-2008-07-31</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30483">30483</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30492">30492</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020605">1020605</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2268">ADV-2008-2268</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/44132">macosx-diskutility-privilege-escalation(44132)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.4.11"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.4.11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2325" seq="2008-2325" published="2008-08-03" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">QuickLook in Apple Mac OS X 10.4.11 and 10.5.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Microsoft Office file, related to insufficient "bounds checking."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html">APPLE-SA-2008-07-31</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30483">30483</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30493" patch="1">30493</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020607">1020607</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2268">ADV-2008-2268</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/44135">macosx-quicklook-code-execution(44135)</ref>
    </refs>
    <vuln_soft>
      <prod name="quicklook" vendor="apple">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2326" seq="2008-2326" published="2008-09-10" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">mDNSResponder in the Bonjour Namespace Provider in Apple Bonjour for Windows before 1.0.5 allows attackers to cause a denial of service (NULL pointer dereference and application crash) by resolving a crafted .local domain name that contains a long label.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Sep/msg00002.html">APPLE-SA-2009-09-09</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT2990">http://support.apple.com/kb/HT2990</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/31091" patch="1">31091</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020845">1020845</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2524">ADV-2008-2524</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/45005">apple-bonjour-mdnsresponder-dos(45005)</ref>
    </refs>
    <vuln_soft>
      <prod name="bonjour" vendor="apple">
        <vers num="1.0.4" edition="unknown:windows"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2327" seq="2008-2327" published="2008-08-27" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple buffer underflows in the (1) LZWDecode, (2) LZWDecodeCompat, and (3) LZWDecodeVector functions in tif_lzw.c in the LZW decoder in LibTIFF 3.8.2 and earlier allow context-dependent attackers to execute arbitrary code via a crafted TIFF file, related to improper handling of the CODE_CLEAR code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.gentoo.org/show_bug.cgi?id=234080">http://bugs.gentoo.org/show_bug.cgi?id=234080</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Nov/msg00001.html">APPLE-SA-2008-11-13</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html">APPLE-SA-2008-09-15</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Nov/msg00002.html">APPLE-SA-2008-11-20</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html">SUSE-SR:2008:018</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200809-07.xml">GLSA-200809-07</ref>
      <ref source="CONFIRM" url="http://security-tracker.debian.net/tracker/CVE-2008-2327">http://security-tracker.debian.net/tracker/CVE-2008-2327</ref>
      <ref source="CONFIRM" url="http://security-tracker.debian.net/tracker/DSA-1632-1">http://security-tracker.debian.net/tracker/DSA-1632-1</ref>
      <ref source="CONFIRM" url="http://security-tracker.debian.net/tracker/DTSA-160-1">http://security-tracker.debian.net/tracker/DTSA-160-1</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-265030-1">265030</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3276">http://support.apple.com/kb/HT3276</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3298">http://support.apple.com/kb/HT3298</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3318">http://support.apple.com/kb/HT3318</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1632" patch="1">DSA-1632</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:184">MDVSA-2008:184</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0847.html">RHSA-2008:0847</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0848.html" adv="1">RHSA-2008:0848</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0863.html" adv="1">RHSA-2008:0863</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/496033/100/0/threaded">20080905 rPSA-2008-0268-1 libtiff</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/497962/100/0/threaded">20081031 VMSA-2008-0017 Updated ESX packages for libxml2, ucd-snmp, libtiff</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30832">30832</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020750">1020750</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-639-1">USN-639-1</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-260A.html">TA08-260A</ref>
      <ref source="MISC" url="http://www.vmware.com/security/advisories/VMSA-2008-0017.html">http://www.vmware.com/security/advisories/VMSA-2008-0017.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2438" adv="1">ADV-2008-2438</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2584" adv="1">ADV-2008-2584</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2776" adv="1">ADV-2008-2776</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2971" adv="1">ADV-2008-2971</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/3107" adv="1">ADV-2008-3107</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/3232">ADV-2008-3232</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/2143" adv="1">ADV-2009-2143</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=458674">https://bugzilla.redhat.com/show_bug.cgi?id=458674</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11489">oval:org.mitre.oval:def:11489</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5514">oval:org.mitre.oval:def:5514</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00102.html">FEDORA-2008-7370</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00121.html">FEDORA-2008-7388</ref>
    </refs>
    <vuln_soft>
      <prod name="libtiff" vendor="libtiff">
        <vers num="3.4"/>
        <vers num="3.5.1"/>
        <vers num="3.5.2"/>
        <vers num="3.5.3"/>
        <vers num="3.5.4"/>
        <vers num="3.5.5"/>
        <vers num="3.5.6"/>
        <vers num="3.5.7"/>
        <vers num="3.6.0"/>
        <vers num="3.6.1"/>
        <vers num="3.7.0"/>
        <vers num="3.7.1"/>
        <vers num="3.8.0"/>
        <vers num="3.8.1"/>
        <vers num="3.8.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2329" seq="2008-2329" published="2008-09-16" modified="2017-08-07" severity="Low" CVSS_version="2.0" CVSS_score="1.9" CVSS_base_score="1.9" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory Services in Apple Mac OS X 10.5 through 10.5.4, when Active Directory is used, allows attackers to enumerate user names via wildcard characters in the Login Window.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html" patch="1">APPLE-SA-2008-09-15</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020874">1020874</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/31189" patch="1">31189</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-260A.html">TA08-260A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2584">ADV-2008-2584</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/45163">macos-directoryservices-info-disclosure(45163)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.5"/>
        <vers num="10.5.1"/>
        <vers num="10.5.2"/>
        <vers num="10.5.3"/>
        <vers num="10.5.4"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.5"/>
        <vers num="10.5.1"/>
        <vers num="10.5.2"/>
        <vers num="10.5.3"/>
        <vers num="10.5.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2330" seq="2008-2330" published="2008-09-16" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.9" CVSS_base_score="4.9" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:N/A:N)">
    <desc>
      <descript source="cve">slapconfig in Directory Services in Apple Mac OS X 10.5 through 10.5.4 allows local users to select a readable output file into which the server password will be written by an OpenLDAP system administrator, related to the mkfifo function, aka an "insecure file operation issue."</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html" patch="1">APPLE-SA-2008-09-15</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020874">1020874</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/31189" patch="1">31189</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-260A.html">TA08-260A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2584">ADV-2008-2584</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/45164">macos-slapconfig-information-disclosure(45164)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.4.11"/>
        <vers num="10.5"/>
        <vers num="10.5.1"/>
        <vers num="10.5.2"/>
        <vers num="10.5.3"/>
        <vers num="10.5.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2331" seq="2008-2331" published="2008-09-16" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Finder in Apple Mac OS X 10.5 through 10.5.4 does not properly update permission data in the Get Info window after a lock operation that modifies Sharing &amp; Permissions in a filesystem, which might allow local users to leverage weak permissions that were not intended by an administrator.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html">APPLE-SA-2008-09-15</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020875">1020875</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/31189" patch="1">31189</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-260A.html">TA08-260A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2584">ADV-2008-2584</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/45165">macos-finder-weak-security(45165)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.5"/>
        <vers num="10.5.1"/>
        <vers num="10.5.2"/>
        <vers num="10.5.3"/>
        <vers num="10.5.4"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.5"/>
        <vers num="10.5.1"/>
        <vers num="10.5.2"/>
        <vers num="10.5.3"/>
        <vers num="10.5.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2332" seq="2008-2332" published="2008-09-16" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">ImageIO in Apple Mac OS X 10.4.11 and 10.5 through 10.5.4 allows context-dependent attackers to cause a denial of service (memory corruption and application crash) or execute arbitrary code via a crafted TIFF image.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Nov/msg00001.html">APPLE-SA-2008-11-13</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html">APPLE-SA-2008-09-15</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3276">http://support.apple.com/kb/HT3276</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3298">http://support.apple.com/kb/HT3298</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/31189" patch="1">31189</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020876">1020876</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-260A.html">TA08-260A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2584">ADV-2008-2584</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/3107">ADV-2008-3107</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/45167">macos-tiff-code-execution(45167)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.4.11"/>
        <vers num="10.5"/>
        <vers num="10.5.1"/>
        <vers num="10.5.2"/>
        <vers num="10.5.3"/>
        <vers num="10.5.4"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.4.11"/>
        <vers num="10.5"/>
        <vers num="10.5.1"/>
        <vers num="10.5.2"/>
        <vers num="10.5.3"/>
        <vers num="10.5.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2333" seq="2008-2333" published="2008-05-23" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in ldap_test.cgi in Barracuda Spam Firewall (BSF) before 3.5.11.025 allows remote attackers to inject arbitrary web script or HTML via the email parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.barracudanetworks.com/ns/support/tech_alert.php">http://www.barracudanetworks.com/ns/support/tech_alert.php</ref>
      <ref source="MISC" url="http://www.irmplc.com/index.php/168-Advisory-027">http://www.irmplc.com/index.php/168-Advisory-027</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492475/100/0/threaded">20080522 IRM Security Advisory : Barracuda Networks Spam Firewall Cross-Site Scripting Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29340" patch="1">29340</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020108">1020108</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1627/references">ADV-2008-1627</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42594">barracuda-email-xss(42594)</ref>
    </refs>
    <vuln_soft>
      <prod name="barracuda_spam_firewall" vendor="barracuda_networks">
        <vers num="3.1.10"/>
        <vers num="3.1.16"/>
        <vers num="3.1.17"/>
        <vers num="3.1.18"/>
        <vers num="3.3.0.54"/>
        <vers num="3.3.01.001"/>
        <vers num="3.3.3"/>
        <vers num="3.3.03.053"/>
        <vers num="3.3.03.055"/>
        <vers num="3.3.15.026"/>
        <vers num="3.4"/>
        <vers num="3.4.10.102"/>
        <vers num="3.5.11.020" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2334" seq="2008-2334" published="2008-05-19" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in W1L3D4 Philboard 0.5 allow remote attackers to execute arbitrary SQL commands via the (1) forumid parameter to (a) admin/philboard_admin-forumedit.asp, (b) admin/philboard_admin-forum.asp, and (c) W1L3D4_foruma_yeni_konu_ac.asp; the (2) id parameter to (d) W1L3D4_konuoku.asp and (e) W1L3D4_konuya_mesaj_yaz.asp; and the (3) topic parameter to W1L3D4_konuya_mesaj_yaz.asp, different vectors than CVE-2008-1939, CVE-2007-2641, and CVE-2007-0920.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29229">29229</ref>
      <ref source="MISC" url="http://www.securityfocus.com/bid/29229/exploit">http://www.securityfocus.com/bid/29229/exploit</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42452">philboard-multiple-sql-injection(42452)</ref>
    </refs>
    <vuln_soft>
      <prod name="philboard" vendor="aspindir">
        <vers num="0.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2335" seq="2008-2335" published="2008-05-19" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in search_results.php in Vastal I-Tech phpVID 1.1 and 1.2 allows remote attackers to inject arbitrary web script or HTML via the query parameter.  NOTE: some of these details are obtained from third party information.  NOTE: it was later reported that 1.2.3 is also affected.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://holisticinfosec.org/content/view/65/45/">http://holisticinfosec.org/content/view/65/45/</ref>
      <ref source="MISC" url="http://packetstormsecurity.com/files/122746/PHP-VID-XSS-SQL-Injection-CRLF-Injection.html">http://packetstormsecurity.com/files/122746/PHP-VID-XSS-SQL-Injection-CRLF-Injection.html</ref>
      <ref source="MISC" url="http://packetstormsecurity.com/files/130755/Vastal-I-tech-phpVID-1.2.3-Cross-Site-Scripting.html">http://packetstormsecurity.com/files/130755/Vastal-I-tech-phpVID-1.2.3-Cross-Site-Scripting.html</ref>
      <ref source="FULLDISC" url="http://seclists.org/fulldisclosure/2015/Mar/59">20150310 Vastal I-tech phpVID 1.2.3 Multiple XSS (Cross-site Scripting) Security Vulnerabilities</ref>
      <ref source="MISC" url="http://tetraph.com/security/xss-vulnerability/vastal-i-tech-phpvid-1-2-3-multiple-xss-cross-site-scripting-security-vulnerabilities/">http://tetraph.com/security/xss-vulnerability/vastal-i-tech-phpvid-1-2-3-multiple-xss-cross-site-scripting-security-vulnerabilities/</ref>
      <ref source="EXPLOIT-DB" url="http://www.exploit-db.com/exploits/27519">27519</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29238">29238</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2552">ADV-2008-2552</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42450">phpvid-query-xss(42450)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/6422">6422</ref>
    </refs>
    <vuln_soft>
      <prod name="phpvid" vendor="vastal">
        <vers num="1.1"/>
        <vers num="1.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2336" seq="2008-2336" published="2008-05-19" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in category.php in 68 Classifieds 4.0.1 allows remote attackers to execute arbitrary SQL commands via the cat parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29249">29249</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42465">68classifieds-category-sql-injection(42465)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5626">5626</ref>
    </refs>
    <vuln_soft>
      <prod name="68_classifieds" vendor="68_classifieds">
        <vers num="4.0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2337" seq="2008-2337" published="2008-05-19" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in IMGallery 2.5, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary SQL commands via the (1) kategoria parameter to (a) galeria.php and the (2) id_phot parameter to (b) popup/koment.php and (c) popup/opis.php in, different vectors than CVE-2006-3163.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29250">29250</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42474">imgallery-multiple-sql-injection(42474)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5631">5631</ref>
    </refs>
    <vuln_soft>
      <prod name="imgallery" vendor="imgallery">
        <vers num="2.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2338" seq="2008-2338" published="2008-05-19" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Interspire ActiveKB 1.5 and earlier allows remote attackers to gain privileges by setting the auth cookie to true when accessing unspecified scripts in /admin.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29226">29226</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020035">1020035</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42427">activekb-admin-security-bypass(42427)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5616">5616</ref>
    </refs>
    <vuln_soft>
      <prod name="activekb" vendor="interspire">
        <vers num="1.5" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2339" seq="2008-2339" published="2008-05-19" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in Turnkey Web Tools SunShop Shopping Cart 3.5.1 allows remote attackers to execute arbitrary SQL commands via the id parameter in an item action, a different vector than CVE-2008-2038, CVE-2007-4597, and CVE-2007-2549.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3894">3894</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492120/100/0/threaded">20080515 SunShop Version 3.5.1 Remote Blind Sql Injection</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29241">29241</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42467">sunshop-id-sql-injection(42467)</ref>
    </refs>
    <vuln_soft>
      <prod name="sunshop_shopping_cart" vendor="turnkeywebtools">
        <vers num="3.5.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2340" seq="2008-2340" published="2008-05-19" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in News Manager 2.0 allow remote attackers to execute arbitrary SQL commands via the (1) lang parameter to (a) advsearch.php, (b) archive.php, and (c) index.php, and the (2) pid parameter to (d) list_tagitems.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29251">29251</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42461">newsmanager-multiple-sql-injection(42461)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5624">5624</ref>
    </refs>
    <vuln_soft>
      <prod name="news_manager" vendor="news_manager">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2341" seq="2008-2341" published="2008-05-19" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in ch_readalso.php in News Manager 2.0 allows remote attackers to execute arbitrary PHP code via a URL in the read_xml_include parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29251">29251</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42459">newsmanager-chreadalso-file-include(42459)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5624">5624</ref>
    </refs>
    <vuln_soft>
      <prod name="news_manager" vendor="avalonnet">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2342" seq="2008-2342" published="2008-05-19" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in attachments.php in News Manager 2.0 allows remote attackers to read arbitrary files via a .. (dot dot) in the id parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29251">29251</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42460">newsmanager-attachments-directory-traversal(42460)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5624">5624</ref>
    </refs>
    <vuln_soft>
      <prod name="news_manager" vendor="news_manager">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2343" seq="2008-2343" published="2008-05-19" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">News Manager 2.0 allows remote attackers to bypass restrictions and obtain sensitive information via a direct request to (1) db/connect_str.php and (2) login/info.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29251">29251</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42462">newsmanager-multiple-info-disclosure(42462)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5624">5624</ref>
    </refs>
    <vuln_soft>
      <prod name="news_manager" vendor="news_manager">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2344" seq="2008-2344" published="2008-05-19" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the air_filemanager 0.6.0 and earlier extension for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://typo3.org/teams/security/security-bulletins/typo3-20080515-2/">http://typo3.org/teams/security/security-bulletins/typo3-20080515-2/</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42448">airfilemanager-unspecified-xss(42448)</ref>
    </refs>
    <vuln_soft>
      <prod name="air_filemanager" vendor="typo3">
        <vers num="0.6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2345" seq="2008-2345" published="2008-05-19" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the air_filemanager 0.6.0 and earlier extension for TYPO3 allows remote attackers to execute arbitrary PHP code via unspecified vectors related to "insufficient file filtering."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://typo3.org/teams/security/security-bulletins/typo3-20080515-2/" patch="1">http://typo3.org/teams/security/security-bulletins/typo3-20080515-2/</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42449">airfilemanager-unspecified-code-execution(42449)</ref>
    </refs>
    <vuln_soft>
      <prod name="air_filemanager" vendor="typo3">
        <vers num="0.6.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2346" seq="2008-2346" published="2008-05-20" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">AlkalinePHP 0.77.35 and earlier allows remote attackers to bypass authentication and gain administrative access by creating an admin account via a direct request to adduser.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29267">29267</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42502">alkalinephp-adduser-security-bypass(42502)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5645">5645</ref>
    </refs>
    <vuln_soft>
      <prod name="alkalinephp" vendor="alkalinephp">
        <vers num="0.77.35" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2347" seq="2008-2347" published="2008-05-20" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">MyPicGallery 1.0 allows remote attackers to bypass application authentication and gain administrative access by setting the userID parameter to "admin" in a direct request to admin/addUser.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29272">29272</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42507">mypicgallery-adduser-security-bypass(42507)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5650">5650</ref>
    </refs>
    <vuln_soft>
      <prod name="mypicgallery" vendor="mypicgallery">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2348" seq="2008-2348" published="2008-05-20" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">MeltingIce File System 1.0 allows remote attackers to bypass application authentication, create new user accounts, and exceed application quotas via a direct request to admin/adduser.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29271">29271</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42503">meltingice-adduser-security-bypass(42503)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5648">5648</ref>
    </refs>
    <vuln_soft>
      <prod name="meltingice_file_system" vendor="meltingicefs">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2349" seq="2008-2349" published="2008-05-20" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Zomplog 3.8.2 and earlier allows remote attackers to gain administrative access by creating an admin account via a direct request to install/newuser.php with the admin parameter set to 1.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29258">29258</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42476">zomplog-newuser-security-bypass(42476)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5634">5634</ref>
    </refs>
    <vuln_soft>
      <prod name="zomplog" vendor="zomp">
        <vers num="3.8.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2350" seq="2008-2350" published="2008-05-20" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in highlight.php in bcoos 1.0.9 through 1.0.13 allows remote attackers to read arbitrary files via (1) .. (dot dot) or (2) C: folder sequences in the file parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://lostmon.blogspot.com/2008/05/bcoos-highlightphp-traversal-file.html">http://lostmon.blogspot.com/2008/05/bcoos-highlightphp-traversal-file.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29275">29275</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42506">bcoos-highlight-directory-traversal(42506)</ref>
    </refs>
    <vuln_soft>
      <prod name="bcoos" vendor="bcoos">
        <vers num="1.0.9"/>
        <vers num="1.0.10"/>
        <vers num="1.0.11"/>
        <vers num="1.0.12"/>
        <vers num="1.0.13"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2351" seq="2008-2351" published="2008-05-20" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in index.php in CMS WebManager-Pro allow remote attackers to execute arbitrary SQL commands via the (1) lang_id and (2) menu_id parameters.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29266">29266</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1562/references">ADV-2008-1562</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42508">cmswebmanagerpro-index-sql-injection(42508)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5641">5641</ref>
    </refs>
    <vuln_soft>
      <prod name="cms_webmanager-pro" vendor="webmanager-pro">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2352" seq="2008-2352" published="2008-05-20" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in index.php in Smeego 1.0, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the lang cookie.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492227/100/0/threaded">20080517 Smeego CMS vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29264">29264</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1563/references">ADV-2008-1563</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42498">smeego-index-file-include(42498)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5640">5640</ref>
    </refs>
    <vuln_soft>
      <prod name="smeego" vendor="smeego">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2353" seq="2008-2353" published="2008-05-20" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in admin.php in GNU/Gallery 1.1.1.0 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the show parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29270">29270</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1560/references">ADV-2008-1560</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42501">gnugallery-admin-file-include(42501)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5647">5647</ref>
    </refs>
    <vuln_soft>
      <prod name="gnugallery" vendor="gnugallery">
        <vers num="1.1.1.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2354" seq="2008-2354" published="2008-05-20" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the data export function in testMaker before 3.0p10 allows test authors to obtain access to export data via unknown vectors.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?group_id=194778&amp;release_id=599729" patch="1">http://sourceforge.net/project/shownotes.php?group_id=194778&amp;release_id=599729</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29273">29273</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42499">testmaker-dataexport-information-disclosure(42499)</ref>
    </refs>
    <vuln_soft>
      <prod name="testmaker" vendor="testmaker">
        <vers num="3.0p10" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2355" seq="2008-2355" published="2008-05-20" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in index.php in WR-Meeting 1.0, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the msnum parameter in a coment event.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29262">29262</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1566/references">ADV-2008-1566</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42497">wrmeeting-index-file-include(42497)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5637">5637</ref>
    </refs>
    <vuln_soft>
      <prod name="wr-meeting" vendor="wr-script">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2356" seq="2008-2356" published="2008-05-20" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in Archangel Weblog 0.90.02 and earlier allows remote attackers to execute arbitrary SQL commands via the post_id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29257">29257</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42475">archangel-index-sql-injection(42475)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5635">5635</ref>
    </refs>
    <vuln_soft>
      <prod name="archangel_weblog" vendor="archangelmgt">
        <vers num="0.90.02" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2357" seq="2008-2357" published="2008-05-21" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the split_redraw function in split.c in mtr before 0.73, when invoked with the -p (aka --split) option, allows remote attackers to execute arbitrary code via a crafted DNS PTR record.  NOTE: it could be argued that this is a vulnerability in the ns_name_ntop function in resolv/ns_name.c in glibc and the proper fix should be in glibc; if so, then this should not be treated as a vulnerability in mtr.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="ftp://ftp.bitwizard.nl/mtr/mtr-0.73.diff">ftp://ftp.bitwizard.nl/mtr/mtr-0.73.diff</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html">SUSE-SR:2008:014</ref>
      <ref source="FULLDISC" url="http://seclists.org/fulldisclosure/2008/May/0488.html">20080519 Mtr - remote and local stack overflow - uncomment situation in libresolv.</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200806-01.xml">GLSA-200806-01</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3903">3903</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0175">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0175</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1587">DSA-1587</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:176">MDVSA-2008:176</ref>
      <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/05/21/1">[oss-security] 20080521 Re: CVE request: mtr</ref>
      <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/05/21/3">[oss-security] 20080521 Re: CVE request: mtr</ref>
      <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/05/21/4">[oss-security] 20080521 Re: CVE request: mtr</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492260/100/0/threaded">20080519 Mtr - remote and local stack overflow - uncomment situation in libresolv.</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29290">29290</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020046">1020046</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42535">mtr-splitredraw-bo(42535)</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2558">https://issues.rpath.com/browse/RPL-2558</ref>
    </refs>
    <vuln_soft>
      <prod name="mtr" vendor="matt_kimball_and_roger_wolff">
        <vers num="0.21"/>
        <vers num="0.22"/>
        <vers num="0.23"/>
        <vers num="0.24"/>
        <vers num="0.25"/>
        <vers num="0.26"/>
        <vers num="0.27"/>
        <vers num="0.28"/>
        <vers num="0.29"/>
        <vers num="0.30"/>
        <vers num="0.31"/>
        <vers num="0.32"/>
        <vers num="0.33"/>
        <vers num="0.34"/>
        <vers num="0.35"/>
        <vers num="0.36"/>
        <vers num="0.37"/>
        <vers num="0.38"/>
        <vers num="0.39"/>
        <vers num="0.40"/>
        <vers num="0.41"/>
        <vers num="0.42"/>
        <vers num="0.43"/>
        <vers num="0.44"/>
        <vers num="0.45"/>
        <vers num="0.46"/>
        <vers num="0.47"/>
        <vers num="0.48"/>
        <vers num="0.49"/>
        <vers num="0.50"/>
        <vers num="0.51"/>
        <vers num="0.52"/>
        <vers num="0.53"/>
        <vers num="0.54"/>
        <vers num="0.55"/>
        <vers num="0.56"/>
        <vers num="0.57"/>
        <vers num="0.58"/>
        <vers num="0.59"/>
        <vers num="0.60"/>
        <vers num="0.61"/>
        <vers num="0.62"/>
        <vers num="0.63"/>
        <vers num="0.64"/>
        <vers num="0.65"/>
        <vers num="0.66"/>
        <vers num="0.67"/>
        <vers num="0.68"/>
        <vers num="0.69"/>
        <vers num="0.70"/>
        <vers num="0.71"/>
        <vers num="0.72" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2358" seq="2008-2358" published="2008-06-09" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Integer overflow in the dccp_feat_change function in net/dccp/feat.c in the Datagram Congestion Control Protocol (DCCP) subsystem in the Linux kernel 2.6.18, and 2.6.17 through 2.6.20, allows local users to gain privileges via an invalid feature length, which leads to a heap-based buffer overflow.</descript>
    </desc>
    <sols>
      <sol source="nvd">Patch information can be found at the following location:

http://lists.debian.org/debian-security-announce/2008/msg00172.html</sol>
    </sols>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html">SUSE-SA:2008:030</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1592">DSA-1592</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:112">MDVSA-2008:112</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:167">MDVSA-2008:167</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0519.html">RHSA-2008:0519</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29603">29603</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020211">1020211</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-625-1">USN-625-1</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=447389">https://bugzilla.redhat.com/show_bug.cgi?id=447389</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43034">linux-kernel-dccpfeatchange-bo(43034)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9644">oval:org.mitre.oval:def:9644</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00082.html">FEDORA-2008-5893</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.6.17"/>
        <vers num="2.6.18"/>
        <vers num="2.6.19"/>
        <vers num="2.6.20"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2359" seq="2008-2359" published="2008-06-02" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The default configuration of consolehelper in system-config-network before 1.5.10-1 on Fedora 8 lacks the USER=root directive, which allows local users of the workstation console to gain privileges and change the network configuration.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=448557">https://bugzilla.redhat.com/show_bug.cgi?id=448557</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42867">fedora-consolehelper-privilege-escalation(42867)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00974.html">FEDORA-2008-4633</ref>
    </refs>
    <vuln_soft>
      <prod name="consolehelper" vendor="fedora_8">
        <vers num="1.4.4"/>
        <vers num="1.4.5"/>
        <vers num="1.4.6"/>
        <vers num="1.4.7"/>
        <vers num="1.5.0"/>
        <vers num="1.5.1"/>
        <vers num="1.5.2"/>
        <vers num="1.5.3"/>
        <vers num="1.5.4"/>
        <vers num="1.5.5"/>
        <vers num="1.5.6"/>
        <vers num="1.5.7"/>
        <vers num="1.5.8"/>
        <vers num="1.5.9"/>
        <vers num="1.5.10"/>
      </prod>
      <prod name="fedora_8" vendor="redhat">
        <vers num="1.4.4"/>
        <vers num="1.4.5"/>
        <vers num="1.4.6"/>
        <vers num="1.4.7"/>
        <vers num="1.5."/>
        <vers num="1.5.0"/>
        <vers num="1.5.1"/>
        <vers num="1.5.2"/>
        <vers num="1.5.3"/>
        <vers num="1.5.4"/>
        <vers num="1.5.5"/>
        <vers num="1.5.6"/>
        <vers num="1.5.7"/>
        <vers num="1.5.8"/>
        <vers num="1.5.9"/>
        <vers num="1.5.10"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2360" seq="2008-2360" published="2008-06-16" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.0" CVSS_base_score="9.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Integer overflow in the AllocateGlyph function in the Render extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent attackers to execute arbitrary code via unspecified request fields that are used to calculate a heap buffer size, which triggers a heap-based buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-2360.diff" patch="1">ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-2360.diff</ref>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=718">20080611 Multiple Vendor X Server Render Extension AllocateGlyph() Integer Overflow Vulnerability</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html">APPLE-SA-2009-02-12</ref>
      <ref source="MLIST" url="http://lists.freedesktop.org/archives/xorg/2008-June/036026.html" patch="1">[xorg] 20080611 X.Org security advisory june 2008 - Multiple vulnerabilities in X server extensions</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html" patch="1">SUSE-SA:2008:027</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html">SUSE-SR:2008:019</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2008-0502.html" patch="1">RHSA-2008:0502</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2008-0504.html" patch="1">RHSA-2008:0504</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2008-0512.html" patch="1">RHSA-2008:0512</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200806-07.xml">GLSA-200806-07</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020243">1020243</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1">238686</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3438">http://support.apple.com/kb/HT3438</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm">http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1595" patch="1">DSA-1595</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml">GLSA-200807-07</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:115">MDVSA-2008:115</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:116">MDVSA-2008:116</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:179">MDVSA-2008:179</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0503.html">RHSA-2008:0503</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493548/100/0/threaded">20080620 rPSA-2008-0200-1 xorg-server</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493550/100/0/threaded">20080621 rPSA-2008-0201-1 xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-616-1">USN-616-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1803">ADV-2008-1803</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1833">ADV-2008-1833</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1983/references">ADV-2008-1983</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2607">https://issues.rpath.com/browse/RPL-2607</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2619">https://issues.rpath.com/browse/RPL-2619</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9329">oval:org.mitre.oval:def:9329</ref>
    </refs>
    <vuln_soft>
      <prod name="x11" vendor="x">
        <vers num="r7.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2361" seq="2008-2361" published="2008-06-16" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Integer overflow in the ProcRenderCreateCursor function in the Render extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent attackers to cause a denial of service (daemon crash) via unspecified request fields that are used to calculate a glyph buffer size, which triggers a dereference of unmapped memory.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-2361.diff" patch="1">ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-2361.diff</ref>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=719">20080611 Multiple Vendor X Server Render Extension ProcRenderCreateCursor() Integer Overflow Vulnerability</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html">APPLE-SA-2009-02-12</ref>
      <ref source="MLIST" url="http://lists.freedesktop.org/archives/xorg/2008-June/036026.html">[xorg] 20080611 X.Org security advisory june 2008 - Multiple vulnerabilities in X server extensions</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html">SUSE-SA:2008:027</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html">SUSE-SR:2008:019</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2008-0502.html">RHSA-2008:0502</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2008-0504.html">RHSA-2008:0504</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200806-07.xml">GLSA-200806-07</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020244">1020244</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1">238686</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3438">http://support.apple.com/kb/HT3438</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm">http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1595">DSA-1595</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml">GLSA-200807-07</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:115">MDVSA-2008:115</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:116">MDVSA-2008:116</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:179">MDVSA-2008:179</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0503.html">RHSA-2008:0503</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493548/100/0/threaded">20080620 rPSA-2008-0200-1 xorg-server</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493550/100/0/threaded">20080621 rPSA-2008-0201-1 xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29665" patch="1">29665</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-616-1">USN-616-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1803">ADV-2008-1803</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1833">ADV-2008-1833</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1983/references">ADV-2008-1983</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2607">https://issues.rpath.com/browse/RPL-2607</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2619">https://issues.rpath.com/browse/RPL-2619</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8978">oval:org.mitre.oval:def:8978</ref>
    </refs>
    <vuln_soft>
      <prod name="x11" vendor="xorg">
        <vers num="r7.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2362" seq="2008-2362" published="2008-06-16" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple integer overflows in the Render extension in the X server 1.4 in X.Org X11R7.3 allow context-dependent attackers to execute arbitrary code via a (1) SProcRenderCreateLinearGradient, (2) SProcRenderCreateRadialGradient, or (3) SProcRenderCreateConicalGradient request with an invalid field specifying the number of bytes to swap in the request data, which triggers heap memory corruption.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-2362.diff" patch="1">ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-2362.diff</ref>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=720">20080611 Multiple Vendor X Server Render Extension Gradient Creation Integer Overflow Vulnerability</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html">APPLE-SA-2009-02-12</ref>
      <ref source="MLIST" url="http://lists.freedesktop.org/archives/xorg/2008-June/036026.html">[xorg] 20080611 X.Org security advisory june 2008 - Multiple vulnerabilities in X server extensions</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html">SUSE-SA:2008:027</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html">SUSE-SR:2008:019</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2008-0504.html">RHSA-2008:0504</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200806-07.xml">GLSA-200806-07</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020245">1020245</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1">238686</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3438">http://support.apple.com/kb/HT3438</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm">http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1595">DSA-1595</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml">GLSA-200807-07</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:116">MDVSA-2008:116</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:179">MDVSA-2008:179</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493548/100/0/threaded">20080620 rPSA-2008-0200-1 xorg-server</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493550/100/0/threaded">20080621 rPSA-2008-0201-1 xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29670" patch="1">29670</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-616-1">USN-616-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1803">ADV-2008-1803</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1833">ADV-2008-1833</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1983/references">ADV-2008-1983</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2607">https://issues.rpath.com/browse/RPL-2607</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2619">https://issues.rpath.com/browse/RPL-2619</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11246">oval:org.mitre.oval:def:11246</ref>
    </refs>
    <vuln_soft>
      <prod name="x11" vendor="x">
        <vers num="r7.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2363" seq="2008-2363" published="2008-06-02" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The PartsBatch class in Pan 0.132 and earlier does not properly manage the data structures for Parts batches, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted .nzb file that triggers a heap-based buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.gentoo.org/show_bug.cgi?id=224051" patch="1">http://bugs.gentoo.org/show_bug.cgi?id=224051</ref>
      <ref source="CONFIRM" url="http://bugzilla.gnome.org/show_bug.cgi?id=535413" patch="1">http://bugzilla.gnome.org/show_bug.cgi?id=535413</ref>
      <ref source="MLIST" url="http://marc.info/?l=oss-security&amp;m=121207185600564&amp;w=2" patch="1">[oss-security] 20080529 CVE-2008-2363: pan - heap overflow</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200807-15.xml">GLSA-200807-15</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:201">MDVSA-2008:201</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2008_13_sr.html">SUSE-SR:2008:013</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29421" patch="1">29421</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=446902">https://bugzilla.redhat.com/show_bug.cgi?id=446902</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42750">pan-nzb-bo(42750)</ref>
    </refs>
    <vuln_soft>
      <prod name="pan" vendor="pan">
        <vers num="0.105"/>
        <vers num="0.106"/>
        <vers num="0.107"/>
        <vers num="0.108"/>
        <vers num="0.109"/>
        <vers num="0.110"/>
        <vers num="0.111"/>
        <vers num="0.112"/>
        <vers num="0.113"/>
        <vers num="0.114"/>
        <vers num="0.115"/>
        <vers num="0.116"/>
        <vers num="0.117"/>
        <vers num="0.118"/>
        <vers num="0.119"/>
        <vers num="0.120"/>
        <vers num="0.121"/>
        <vers num="0.122"/>
        <vers num="0.123"/>
        <vers num="0.124"/>
        <vers num="0.125"/>
        <vers num="0.126"/>
        <vers num="0.127"/>
        <vers num="0.128"/>
        <vers num="0.129"/>
        <vers num="0.130"/>
        <vers num="0.131"/>
        <vers num="0.132" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2364" seq="2008-2364" published="2008-06-13" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The ap_proxy_http_process_response function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server 2.0.63 and 2.2.8 does not limit the number of forwarded interim responses, which allows remote HTTP servers to cause a denial of service (memory consumption) via a large number of interim responses.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01539432">HPSBUX02365</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html">APPLE-SA-2008-10-09</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html">SUSE-SR:2009:006</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html">SUSE-SR:2009:007</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=123376588623823&amp;w=2">HPSBUX02401</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=125631037611762&amp;w=2">HPSBUX02465</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2008-0967.html">RHSA-2008:0967</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200807-06.xml">GLSA-200807-06</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-247666-1">247666</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3216">http://support.apple.com/kb/HT3216</ref>
      <ref source="CONFIRM" url="http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c?r1=666154&amp;r2=666153&amp;pathrev=666154">http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c?r1=666154&amp;r2=666153&amp;pathrev=666154</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0328">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0328</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:195">MDVSA-2008:195</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:237">MDVSA-2008:237</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html">http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0966.html">RHSA-2008:0966</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/494858/100/0/threaded">20080729 rPSA-2008-0236-1 httpd mod_ssl</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/498567/100/0/threaded">20081122 rPSA-2008-0328-1 httpd mod_ssl</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29653" patch="1">29653</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/31681">31681</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020267">1020267</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/USN-731-1">USN-731-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1798">ADV-2008-1798</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2780">ADV-2008-2780</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/0320">ADV-2009-0320</ref>
      <ref source="CONFIRM" url="http://www-01.ibm.com/support/docview.wss?uid=swg27008517">http://www-01.ibm.com/support/docview.wss?uid=swg27008517</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/docview.wss?uid=swg1PK67579">PK67579</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42987">apache-modproxy-module-dos(42987)</ref>
      <ref source="MLIST" url="https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.httpd.apache.org%3E">[httpd-cvs] 20190815 svn commit: r1048742 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html</ref>
      <ref source="MLIST" url="https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.httpd.apache.org%3E">[httpd-cvs] 20190815 svn commit: r1048743 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11713">oval:org.mitre.oval:def:11713</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6084">oval:org.mitre.oval:def:6084</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9577">oval:org.mitre.oval:def:9577</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00055.html">FEDORA-2008-6393</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00153.html">FEDORA-2008-6314</ref>
    </refs>
    <vuln_soft>
      <prod name="http_server" vendor="apache">
        <vers num="2.0.63"/>
        <vers num="2.2.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2365" seq="2008-2365" published="2008-06-30" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="4.7" CVSS_base_score="4.7" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Race condition in the ptrace and utrace support in the Linux kernel 2.6.9 through 2.6.25, as used in Red Hat Enterprise Linux (RHEL) 4, allows local users to cause a denial of service (oops) via a long series of PTRACE_ATTACH ptrace calls to another user's process that trigger a conflict between utrace_detach and report_quiescent, related to "late ptrace_may_attach() check" and "race around &amp;dead_engine_ops setting," a different vulnerability than CVE-2007-0771 and CVE-2008-1514.  NOTE: this issue might only affect kernel versions before 2.6.16.x.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git;a=commit;h=5ecfbae093f0c37311e89b29bfc0c9d586eace87" patch="1">http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git;a=commit;h=5ecfbae093f0c37311e89b29bfc0c9d586eace87</ref>
      <ref source="CONFIRM" url="http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git;a=commit;h=f358166a9405e4f1d8e50d8f415c26d95505b6de" patch="1">http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git;a=commit;h=f358166a9405e4f1d8e50d8f415c26d95505b6de</ref>
      <ref source="CONFIRM" url="http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git;a=commit;h=f5b40e363ad6041a96e3da32281d8faa191597b9" patch="1">http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git;a=commit;h=f5b40e363ad6041a96e3da32281d8faa191597b9</ref>
      <ref source="MLIST" url="http://marc.info/?l=linux-kernel&amp;m=117863520707703&amp;w=2">[linux-kernel] 20070508 Re: [PATCH -utrace] Move utrace into task_struct</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2008-0508.html" patch="1">RHSA-2008:0508</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3965">3965</ref>
      <ref source="MISC" url="http://sources.redhat.com/cgi-bin/cvsweb.cgi/~checkout~/tests/ptrace-tests/tests/late-ptrace-may-attach-check.c?cvsroot=systemtap">http://sources.redhat.com/cgi-bin/cvsweb.cgi/~checkout~/tests/ptrace-tests/tests/late-ptrace-may-attach-check.c?cvsroot=systemtap</ref>
      <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/06/26/1" patch="1">[oss-security] 20080626 CVE-2008-2365 kernel: ptrace: Crash on PTRACE_{ATTACH,DETACH} race -- affecting kernel versions &lt;= 2.6.25</ref>
      <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/07/14/1">[oss-security] 20080714 Re: CVE-2008-2365 kernel: ptrace: Crash on PTRACE_{ATTACH,DETACH} race -- affecting kernel versions &lt;= 2.6.25</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29945">29945</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020362">1020362</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-625-1">USN-625-1</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=449359">https://bugzilla.redhat.com/show_bug.cgi?id=449359</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43567">linux-kernel-ptraceattach-dos(43567)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10749">oval:org.mitre.oval:def:10749</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.6.9"/>
        <vers num="2.6.10" edition="rc2"/>
        <vers num="2.6.11" edition="rc2"/>
        <vers num="2.6.11" edition="rc3"/>
        <vers num="2.6.11" edition="rc4"/>
        <vers num="2.6.11.4"/>
        <vers num="2.6.11.5"/>
        <vers num="2.6.11.6"/>
        <vers num="2.6.11.7"/>
        <vers num="2.6.11.8"/>
        <vers num="2.6.11.11"/>
        <vers num="2.6.11.12"/>
        <vers num="2.6.12" edition="rc1"/>
        <vers num="2.6.12" edition="rc4"/>
        <vers num="2.6.12" edition="rc5"/>
        <vers num="2.6.12.1"/>
        <vers num="2.6.12.2"/>
        <vers num="2.6.12.3"/>
        <vers num="2.6.12.4"/>
        <vers num="2.6.12.5"/>
        <vers num="2.6.12.6"/>
        <vers num="2.6.12.12"/>
        <vers num="2.6.12.22"/>
        <vers num="2.6.13" edition="rc1"/>
        <vers num="2.6.13" edition="rc4"/>
        <vers num="2.6.13" edition="rc6"/>
        <vers num="2.6.13" edition="rc7"/>
        <vers num="2.6.13.1"/>
        <vers num="2.6.13.2"/>
        <vers num="2.6.13.3"/>
        <vers num="2.6.13.4"/>
        <vers num="2.6.14" edition="rc1"/>
        <vers num="2.6.14" edition="rc2"/>
        <vers num="2.6.14" edition="rc3"/>
        <vers num="2.6.14" edition="rc4"/>
        <vers num="2.6.14.1"/>
        <vers num="2.6.14.2"/>
        <vers num="2.6.14.3"/>
        <vers num="2.6.14.4"/>
        <vers num="2.6.14.5"/>
        <vers num="2.6.15" edition="rc1"/>
        <vers num="2.6.15" edition="rc2"/>
        <vers num="2.6.15" edition="rc3"/>
        <vers num="2.6.15.1"/>
        <vers num="2.6.15.2"/>
        <vers num="2.6.15.3"/>
        <vers num="2.6.15.4"/>
        <vers num="2.6.15.11"/>
        <vers num="2.6.16" edition="rc1"/>
        <vers num="2.6.16.1"/>
        <vers num="2.6.16.7"/>
        <vers num="2.6.16.9"/>
        <vers num="2.6.16.11"/>
        <vers num="2.6.16.12"/>
        <vers num="2.6.16.13"/>
        <vers num="2.6.16.19"/>
        <vers num="2.6.16.23"/>
        <vers num="2.6.16.27"/>
        <vers num="2.6.17" edition="rc5"/>
        <vers num="2.6.17.1"/>
        <vers num="2.6.17.2"/>
        <vers num="2.6.17.3"/>
        <vers num="2.6.17.5"/>
        <vers num="2.6.17.6"/>
        <vers num="2.6.17.7"/>
        <vers num="2.6.17.8"/>
        <vers num="2.6.17.10"/>
        <vers num="2.6.17.11"/>
        <vers num="2.6.17.12"/>
        <vers num="2.6.17.13"/>
        <vers num="2.6.17.14"/>
        <vers num="2.6.18"/>
        <vers num="2.6.18.1"/>
        <vers num="2.6.18.3"/>
        <vers num="2.6.18.4"/>
        <vers num="2.6.19" edition="rc1"/>
        <vers num="2.6.19" edition="rc2"/>
        <vers num="2.6.19" edition="rc3"/>
        <vers num="2.6.19" edition="rc4"/>
        <vers num="2.6.19.1"/>
        <vers num="2.6.19.2"/>
        <vers num="2.6.20"/>
        <vers num="2.6.20.1"/>
        <vers num="2.6.20.2"/>
        <vers num="2.6.20.3"/>
        <vers num="2.6.20.4"/>
        <vers num="2.6.20.5"/>
        <vers num="2.6.20.8"/>
        <vers num="2.6.20.9"/>
        <vers num="2.6.20.11"/>
        <vers num="2.6.20.13"/>
        <vers num="2.6.20.15"/>
        <vers num="2.6.21" edition="rc3"/>
        <vers num="2.6.21" edition="rc4"/>
        <vers num="2.6.21" edition="rc5"/>
        <vers num="2.6.21" edition="rc6"/>
        <vers num="2.6.21.1"/>
        <vers num="2.6.21.2"/>
        <vers num="2.6.21.4"/>
        <vers num="2.6.21.6"/>
        <vers num="2.6.21.7"/>
        <vers num="2.6.22"/>
        <vers num="2.6.22.1"/>
        <vers num="2.6.22.3"/>
        <vers num="2.6.22.4"/>
        <vers num="2.6.22.5"/>
        <vers num="2.6.22.6"/>
        <vers num="2.6.22.7"/>
        <vers num="2.6.22.8"/>
        <vers num="2.6.22.11"/>
        <vers num="2.6.22.12"/>
        <vers num="2.6.22.13"/>
        <vers num="2.6.22.14"/>
        <vers num="2.6.22.15"/>
        <vers num="2.6.22.16"/>
        <vers num="2.6.22.17"/>
        <vers num="2.6.23" edition="rc1"/>
        <vers num="2.6.23.1"/>
        <vers num="2.6.23.2"/>
        <vers num="2.6.23.3"/>
        <vers num="2.6.23.4"/>
        <vers num="2.6.23.5"/>
        <vers num="2.6.23.6"/>
        <vers num="2.6.23.7"/>
        <vers num="2.6.23.9"/>
        <vers num="2.6.23.10"/>
        <vers num="2.6.23.14"/>
        <vers num="2.6.23_rc1"/>
        <vers num="2.6.24" edition="rc2"/>
        <vers num="2.6.24" edition="rc3"/>
        <vers num="2.6.24.1"/>
        <vers num="2.6.24.2"/>
        <vers num="2.6.24.6"/>
        <vers num="2.6.24_rc4"/>
        <vers num="2.6.24_rc5"/>
        <vers num="2.6.25"/>
        <vers num="2.6.25.1"/>
        <vers num="2.6.25.2"/>
        <vers num="2.6.25.3"/>
        <vers num="2.6.25.4"/>
        <vers num="2.6.25.5"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="4.0" edition=":as"/>
        <vers num="4.0" edition=":es"/>
        <vers num="4.0" edition=":ws"/>
      </prod>
      <prod name="enterprise_linux_desktop" vendor="redhat">
        <vers num="4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2366" seq="2008-2366" published="2008-06-16" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.4" CVSS_base_score="4.4" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Untrusted search path vulnerability in a certain Red Hat build script for OpenOffice.org (OOo) 1.1.x on Red Hat Enterprise Linux (RHEL) 3 and 4 allows local users to gain privileges via a malicious library in the current working directory, related to incorrect quoting of the ORIGIN symbol for use in the RPATH library path.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020278">1020278</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0538.html">RHSA-2008:0538</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29695">29695</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=450532">https://bugzilla.redhat.com/show_bug.cgi?id=450532</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43322">redhat-ooo-buildscript-code-execution(43322)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11361">oval:org.mitre.oval:def:11361</ref>
    </refs>
    <vuln_soft>
      <prod name="openoffice" vendor="openoffice">
        <vers num="1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2367" seq="2008-2367" published="2009-01-20" modified="2017-08-07" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Red Hat Certificate System 7.2 uses world-readable permissions for password.conf and unspecified other configuration files, which allows local users to discover passwords by reading these files.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1021608">1021608</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/33288">33288</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/0145">ADV-2009-0145</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=451998">https://bugzilla.redhat.com/show_bug.cgi?id=451998</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/48021">redhat-cs-configfile-info-disclosure(48021)</ref>
      <ref source="REDHAT" url="https://rhn.redhat.com/errata/RHSA-2009-0006.html" adv="1">RHSA-2009:0006</ref>
      <ref source="REDHAT" url="https://rhn.redhat.com/errata/RHSA-2009-0007.html">RHSA-2009:0007</ref>
    </refs>
    <vuln_soft>
      <prod name="certificate_system" vendor="redhat">
        <vers num="7.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2368" seq="2008-2368" published="2009-01-20" modified="2017-08-07" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Red Hat Certificate System 7.2 stores passwords in cleartext in the UserDirEnrollment log, the RA wizard installer log, and unspecified other debug log files, and uses weak permissions for these files, which allows local users to discover passwords by reading the files.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1021608">1021608</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/33288">33288</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/0145">ADV-2009-0145</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=452000">https://bugzilla.redhat.com/show_bug.cgi?id=452000</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/48022">redhat-cs-debuglog-info-disclosure(48022)</ref>
      <ref source="REDHAT" url="https://rhn.redhat.com/errata/RHSA-2009-0006.html" adv="1">RHSA-2009:0006</ref>
      <ref source="REDHAT" url="https://rhn.redhat.com/errata/RHSA-2009-0007.html">RHSA-2009:0007</ref>
    </refs>
    <vuln_soft>
      <prod name="certificate_system" vendor="redhat">
        <vers num="7.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2369" seq="2008-2369" published="2008-08-14" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">manzier.pxt in Red Hat Network Satellite Server before 5.1.1 has a hard-coded authentication key, which allows remote attackers to connect to the server and obtain sensitive information about user accounts and entitlements.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2008-0630.html">RHSA-2008:0630</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020694">1020694</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30679">30679</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/44452">rhnss-manzier-information-disclosure(44452)</ref>
    </refs>
    <vuln_soft>
      <prod name="network_satellite_server" vendor="red_hat">
        <vers num="2"/>
        <vers num="2.0.1"/>
        <vers num="2.6"/>
        <vers num="2.7"/>
        <vers num="3"/>
        <vers num="3.2"/>
        <vers num="3.4"/>
        <vers num="3.6"/>
        <vers num="3.7"/>
        <vers num="3.7.2"/>
        <vers num="4"/>
        <vers num="4.0.1"/>
        <vers num="4.0.2"/>
        <vers num="4.0.5"/>
        <vers num="4.0.6"/>
        <vers num="4.0.7"/>
        <vers num="4.1"/>
        <vers num="4.1.2"/>
        <vers num="4.1.5"/>
        <vers num="4.2"/>
        <vers num="4.2.1"/>
        <vers num="4.2.2"/>
        <vers num="5"/>
        <vers num="5.0.1"/>
        <vers num="5.1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2370" seq="2008-2370" published="2008-08-03" modified="2019-03-25" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when a RequestDispatcher is used, performs path normalization before removing the query string from the URI, which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a .. (dot dot) in a request parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html">APPLE-SA-2008-10-09</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html">SUSE-SR:2008:018</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html">SUSE-SR:2009:004</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=123376588623823&amp;w=2">HPSBUX02401</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=139344343412337&amp;w=2">HPSBST02955</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/4099">4099</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3216">http://support.apple.com/kb/HT3216</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm">http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm</ref>
      <ref source="CONFIRM" url="http://tomcat.apache.org/security-4.html">http://tomcat.apache.org/security-4.html</ref>
      <ref source="CONFIRM" url="http://tomcat.apache.org/security-5.html">http://tomcat.apache.org/security-5.html</ref>
      <ref source="CONFIRM" url="http://tomcat.apache.org/security-6.html">http://tomcat.apache.org/security-6.html</ref>
      <ref source="CONFIRM" url="http://www.fujitsu.com/global/support/software/security/products-f/interstage-200902e.html">http://www.fujitsu.com/global/support/software/security/products-f/interstage-200902e.html</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:188">MDVSA-2008:188</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0648.html">RHSA-2008:0648</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0862.html">RHSA-2008:0862</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0864.html">RHSA-2008:0864</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/495022/100/0/threaded">20080801 [CVE-2008-2370] Apache Tomcat information disclosure vulnerability</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/507985/100/0/threaded">20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30494" patch="1">30494</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/31681">31681</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020623">1020623</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2009-0002.html">http://www.vmware.com/security/advisories/VMSA-2009-0002.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2009-0016.html">http://www.vmware.com/security/advisories/VMSA-2009-0016.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2305">ADV-2008-2305</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2780">ADV-2008-2780</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2823">ADV-2008-2823</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/0320">ADV-2009-0320</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/0503">ADV-2009-0503</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/1535">ADV-2009-1535</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/2215">ADV-2009-2215</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/3316">ADV-2009-3316</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/44156">tomcat-requestdispatcher-info-disclosure(44156)</ref>
      <ref source="MLIST" url="https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E">[tomcat-dev] 20190319 svn commit: r1855831 [22/30] - in /tomcat/site/trunk: ./ docs/ xdocs/</ref>
      <ref source="MLIST" url="https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@%3Cdev.tomcat.apache.org%3E">[tomcat-dev] 20190319 svn commit: r1855831 [21/30] - in /tomcat/site/trunk: ./ docs/ xdocs/</ref>
      <ref source="MLIST" url="https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa@%3Cdev.tomcat.apache.org%3E">[tomcat-dev] 20190325 svn commit: r1856174 [20/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/</ref>
      <ref source="MLIST" url="https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74@%3Cdev.tomcat.apache.org%3E">[tomcat-dev] 20190325 svn commit: r1856174 [19/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10577">oval:org.mitre.oval:def:10577</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5876">oval:org.mitre.oval:def:5876</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00712.html">FEDORA-2008-7977</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00859.html">FEDORA-2008-8113</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00889.html">FEDORA-2008-8130</ref>
    </refs>
    <vuln_soft>
      <prod name="tomcat" vendor="apache">
        <vers num="4.1.0"/>
        <vers num="4.1.1"/>
        <vers num="4.1.2"/>
        <vers num="4.1.3"/>
        <vers num="4.1.4"/>
        <vers num="4.1.5"/>
        <vers num="4.1.6"/>
        <vers num="4.1.7"/>
        <vers num="4.1.8"/>
        <vers num="4.1.9"/>
        <vers num="4.1.10"/>
        <vers num="4.1.11"/>
        <vers num="4.1.12"/>
        <vers num="4.1.13"/>
        <vers num="4.1.14"/>
        <vers num="4.1.15"/>
        <vers num="4.1.16"/>
        <vers num="4.1.17"/>
        <vers num="4.1.18"/>
        <vers num="4.1.19"/>
        <vers num="4.1.20"/>
        <vers num="4.1.21"/>
        <vers num="4.1.22"/>
        <vers num="4.1.23"/>
        <vers num="4.1.24"/>
        <vers num="4.1.25"/>
        <vers num="4.1.26"/>
        <vers num="4.1.27"/>
        <vers num="4.1.28"/>
        <vers num="4.1.29"/>
        <vers num="4.1.30"/>
        <vers num="4.1.31"/>
        <vers num="4.1.32"/>
        <vers num="4.1.33"/>
        <vers num="4.1.34"/>
        <vers num="4.1.35"/>
        <vers num="4.1.36"/>
        <vers num="4.1.37"/>
        <vers num="5.5.0"/>
        <vers num="5.5.1"/>
        <vers num="5.5.2"/>
        <vers num="5.5.3"/>
        <vers num="5.5.4"/>
        <vers num="5.5.5"/>
        <vers num="5.5.6"/>
        <vers num="5.5.7"/>
        <vers num="5.5.8"/>
        <vers num="5.5.9"/>
        <vers num="5.5.10"/>
        <vers num="5.5.11"/>
        <vers num="5.5.12"/>
        <vers num="5.5.13"/>
        <vers num="5.5.14"/>
        <vers num="5.5.15"/>
        <vers num="5.5.16"/>
        <vers num="5.5.17"/>
        <vers num="5.5.18"/>
        <vers num="5.5.19"/>
        <vers num="5.5.20"/>
        <vers num="5.5.21"/>
        <vers num="5.5.22"/>
        <vers num="5.5.23"/>
        <vers num="5.5.24"/>
        <vers num="5.5.25"/>
        <vers num="5.5.26"/>
        <vers num="6.0.0"/>
        <vers num="6.0.1"/>
        <vers num="6.0.2"/>
        <vers num="6.0.3"/>
        <vers num="6.0.4"/>
        <vers num="6.0.5"/>
        <vers num="6.0.6"/>
        <vers num="6.0.7"/>
        <vers num="6.0.8"/>
        <vers num="6.0.9"/>
        <vers num="6.0.10"/>
        <vers num="6.0.11"/>
        <vers num="6.0.12"/>
        <vers num="6.0.13"/>
        <vers num="6.0.14"/>
        <vers num="6.0.15"/>
        <vers num="6.0.16"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2371" seq="2008-2371" published="2008-07-07" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in pcre_compile.c in the Perl-Compatible Regular Expression (PCRE) library 7.7 allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a regular expression that begins with an option and contains multiple branches.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.gentoo.org/show_bug.cgi?id=228091">http://bugs.gentoo.org/show_bug.cgi?id=228091</ref>
      <ref source="CONFIRM" url="http://ftp.gnome.org/pub/GNOME/sources/glib/2.16/glib-2.16.4.changes">http://ftp.gnome.org/pub/GNOME/sources/glib/2.16/glib-2.16.4.changes</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html">APPLE-SA-2008-10-09</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2009/May/msg00002.html">APPLE-SA-2009-05-12</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html">SUSE-SR:2008:014</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=124654546101607&amp;w=2">SSRT090085</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=125631037611762&amp;w=2">HPSBUX02465</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200811-05.xml">GLSA-200811-05</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3216">http://support.apple.com/kb/HT3216</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3549">http://support.apple.com/kb/HT3549</ref>
      <ref source="UBUNTU" url="http://ubuntu.com/usn/usn-624-2">USN-624-2</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0305">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0305</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1602">DSA-1602</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200807-03.xml">GLSA-200807-03</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:147">MDVSA-2008:147</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2009:023">MDVSA-2009:023</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/497828/100/0/threaded">20081027 rPSA-2008-0305-1 pcre</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30087">30087</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/31681">31681</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-624-1">USN-624-1</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-628-1">USN-628-1</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA09-133A.html">TA09-133A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2005">ADV-2008-2005</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2006">ADV-2008-2006</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2336">ADV-2008-2336</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2780">ADV-2008-2780</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/1297">ADV-2009-1297</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2010/0833">ADV-2010-0833</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00105.html">FEDORA-2008-6025</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00123.html">FEDORA-2008-6048</ref>
    </refs>
    <vuln_soft>
      <prod name="pcre" vendor="pcre">
        <vers num="7.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2372" seq="2008-2372" published="2008-07-02" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.9" CVSS_base_score="4.9" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">The Linux kernel 2.6.24 and 2.6.25 before 2.6.25.9 allows local users to cause a denial of service (memory consumption) via a large number of calls to the get_user_pages function, which lacks a ZERO_PAGE optimization and results in allocation of "useless newly zeroed pages."</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=89f5b7da2a6bad2e84670422ab8192382a5aeb9f">http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=89f5b7da2a6bad2e84670422ab8192382a5aeb9f</ref>
      <ref source="CONFIRM" url="http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.9">http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.9</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00007.html">SUSE-SA:2008:035</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00009.html">SUSE-SA:2008:037</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00012.html">SUSE-SA:2008:038</ref>
      <ref source="MISC" url="http://new-ubuntu-news.blogspot.com/2008/06/re-pending-stable-kernel-security_25.html">http://new-ubuntu-news.blogspot.com/2008/06/re-pending-stable-kernel-security_25.html</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0207">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0207</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0585.html">RHSA-2008:0585</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0957.html">RHSA-2008:0957</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-659-1">USN-659-1</ref>
      <ref source="MLIST" url="http://www.ussg.iu.edu/hypermail/linux/kernel/0804.3/3203.html">[linux-kernel] 20080430 Re: Page Faults slower in 2.6.25-rc9 than 2.6.23</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43550">linux-kernel-getuserpages-dos(43550)</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2629">https://issues.rpath.com/browse/RPL-2629</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9383">oval:org.mitre.oval:def:9383</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.6.24"/>
        <vers num="2.6.25"/>
        <vers num="2.6.25.1"/>
        <vers num="2.6.25.2"/>
        <vers num="2.6.25.3"/>
        <vers num="2.6.25.4"/>
        <vers num="2.6.25.5"/>
        <vers num="2.6.25.6"/>
        <vers num="2.6.25.7"/>
        <vers num="2.6.25.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2373" seq="2008-2373" published="2009-03-26" modified="2009-03-26" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2008-2863.  Reason: This candidate is a reservation duplicate of CVE-2008-2863.  Notes: All CVE users should reference CVE-2008-2863 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2008-2374" seq="2008-2374" published="2008-07-07" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">src/sdp.c in bluez-libs 3.30 in BlueZ, and other bluez-libs before 3.34 and bluez-utils before 3.34 versions, does not validate string length fields in SDP packets, which allows remote SDP servers to cause a denial of service or possibly have unspecified other impact via a crafted length field that triggers excessive memory allocation or a buffer over-read.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html">SUSE-SR:2008:019</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200903-29.xml">GLSA-200903-29</ref>
      <ref source="MLIST" url="http://sourceforge.net/mailarchive/message.php?msg_name=b32d44000806161327u680c290au54fd21f2fef1d58e%40mail.gmail.com">[bluez-devel] 20080616 SDP payload processing vulnerability</ref>
      <ref source="CONFIRM" url="http://www.bluez.org/bluez-334/">http://www.bluez.org/bluez-334/</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:145">MDVSA-2008:145</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0581.html">RHSA-2008:0581</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30105">30105</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020479">1020479</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2096/references">ADV-2008-2096</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9973">oval:org.mitre.oval:def:9973</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00396.html">FEDORA-2008-6140</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00233.html">FEDORA-2008-6133</ref>
    </refs>
    <vuln_soft>
      <prod name="bluez_libs" vendor="bluez">
        <vers num="3.30" prev="1"/>
      </prod>
      <prod name="bluez_utils" vendor="bluez">
        <vers num="3.33" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2375" seq="2008-2375" published="2008-07-08" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.1" CVSS_base_score="7.1" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Memory leak in a certain Red Hat deployment of vsftpd before 2.0.5 on Red Hat Enterprise Linux (RHEL) 3 and 4, when PAM is used, allows remote attackers to cause a denial of service (memory consumption) via a large number of invalid authentication attempts within the same session, a different vulnerability than CVE-2007-5962.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2008-398.htm">http://support.avaya.com/elmodocs2/security/ASA-2008-398.htm</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0217">http://wiki.rpath.com/Advisories:rPSA-2008-0217</ref>
      <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/06/30/2">[oss-security] 20080630 CVE-2008-2375 older vsftpd authentication memory leak</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0579.html">RHSA-2008:0579</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0680.html">RHSA-2008:0680</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/494081/100/0/threaded">20080708 rPSA-2008-0217-1 vsftpd</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30364">30364</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020546">1020546</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2820">ADV-2008-2820</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/attachment.cgi?id=201051">https://bugzilla.redhat.com/attachment.cgi?id=201051</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2640">https://issues.rpath.com/browse/RPL-2640</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10138">oval:org.mitre.oval:def:10138</ref>
    </refs>
    <vuln_soft>
      <prod name="vsftpd" vendor="redhat">
        <vers num="0.0.1"/>
        <vers num="0.0.2"/>
        <vers num="0.0.3"/>
        <vers num="0.0.4"/>
        <vers num="0.0.5"/>
        <vers num="0.0.6"/>
        <vers num="0.0.7"/>
        <vers num="0.0.8"/>
        <vers num="0.0.9"/>
        <vers num="0.0.10"/>
        <vers num="0.0.11"/>
        <vers num="0.0.12"/>
        <vers num="0.0.13"/>
        <vers num="0.0.14"/>
        <vers num="0.0.15"/>
        <vers num="0.9.0"/>
        <vers num="0.9.1"/>
        <vers num="0.9.2"/>
        <vers num="0.9.3"/>
        <vers num="1.1.0"/>
        <vers num="1.1.1"/>
        <vers num="1.1.2"/>
        <vers num="1.1.3"/>
        <vers num="1.2.0"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2"/>
        <vers num="2.0.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
        <vers num="2.0.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2376" seq="2008-2376" published="2008-07-08" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Integer overflow in the rb_ary_fill function in array.c in Ruby before revision 17756 allows context-dependent attackers to cause a denial of service (crash) or possibly have unspecified other impact via a call to the Array#fill method with a start (aka beg) argument greater than ARY_MAX_SIZE.  NOTE: this issue exists because of an incomplete fix for other closely related integer overflows.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html">APPLE-SA-2008-09-15</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200812-17.xml">GLSA-200812-17</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0218">http://wiki.rpath.com/Advisories:rPSA-2008-0218</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0218">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0218</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1612">DSA-1612</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1618">DSA-1618</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:140">MDVSA-2008:140</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:141">MDVSA-2008:141</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:142">MDVSA-2008:142</ref>
      <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/07/02/3">[oss-security] 20080702 More ruby integer overflows (rb_ary_fill / Array#fill)</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0561.html">RHSA-2008:0561</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/494104/100/0/threaded">20080708 rPSA-2008-0218-1 ruby</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-260A.html">TA08-260A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2584">ADV-2008-2584</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2639">https://issues.rpath.com/browse/RPL-2639</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9863">oval:org.mitre.oval:def:9863</ref>
      <ref source="UBUNTU" url="https://usn.ubuntu.com/651-1/">USN-651-1</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00161.html">FEDORA-2008-6094</ref>
    </refs>
    <vuln_soft>
      <prod name="ruby" vendor="ruby-lang">
        <vers num="1.8.6.230"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2377" seq="2008-2377" published="2008-08-08" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.6" CVSS_base_score="7.6" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Use-after-free vulnerability in the _gnutls_handshake_hash_buffers_clear function in lib/gnutls_handshake.c in libgnutls in GnuTLS 2.3.5 through 2.4.0 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via TLS transmission of data that is improperly used when the peer calls gnutls_handshake within a normal session, leading to attempted access to a deallocated libgcrypt handle.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MLIST" url="http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/2947" patch="1">[gnutls-devel] 20080630 GnuTLS 2.4.1</ref>
      <ref source="CONFIRM" url="http://www.gnu.org/software/gnutls/security.html">http://www.gnu.org/software/gnutls/security.html</ref>
      <ref source="MLIST" url="http://www.nabble.com/Details-on-the-gnutls_handshake-local-crash-problem--GNUTLS-SA-2008-2--td18205022.html">[gnutls-devel] 20080630 Details on the gnutls_handshake local crash problem [GNUTLS-SA-2008-2]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30713">30713</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2398">ADV-2008-2398</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/44486">gnutls-gnutlshandshake-code-execution(44486)</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2650">https://issues.rpath.com/browse/RPL-2650</ref>
    </refs>
    <vuln_soft>
      <prod name="gnutls" vendor="gnu">
        <vers num="2.3.5"/>
        <vers num="2.3.6"/>
        <vers num="2.3.7"/>
        <vers num="2.3.8"/>
        <vers num="2.3.9"/>
        <vers num="2.4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2378" seq="2008-2378" published="2008-11-26" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Untrusted search path vulnerability in hfkernel in hf 0.7.3 and 0.8 allows local users to gain privileges via a Trojan horse killall program in a directory in the PATH, related to improper handling of the -k option.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504182">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504182</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1668" patch="1">DSA-1668</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/32421" patch="1">32421</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/46806">hf-hfkernel-privilege-escalation(46806)</ref>
    </refs>
    <vuln_soft>
      <prod name="hf" vendor="hf">
        <vers num="0.7.3"/>
        <vers num="0.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2379" seq="2008-2379" published="2008-12-04" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in SquirrelMail before 1.4.17 allows remote attackers to inject arbitrary web script or HTML via a crafted hyperlink in an HTML part of an e-mail message.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html">APPLE-SA-2009-02-12</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html">SUSE-SR:2008:027</ref>
      <ref source="MISC" url="http://security-net.biz/wsw/index.php?p=254&amp;n=190">http://security-net.biz/wsw/index.php?p=254&amp;n=190</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3438">http://support.apple.com/kb/HT3438</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1682">DSA-1682</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/32603">32603</ref>
      <ref source="CONFIRM" url="http://www.squirrelmail.org/index.php">http://www.squirrelmail.org/index.php</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/3332">ADV-2008-3332</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/47024">squirrelmail-html-xss(47024)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9764">oval:org.mitre.oval:def:9764</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00223.html">FEDORA-2008-10740</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00449.html">FEDORA-2008-10918</ref>
    </refs>
    <vuln_soft>
      <prod name="squirrelmail" vendor="squirrelmail">
        <vers num="0.1"/>
        <vers num="0.1.1"/>
        <vers num="0.1.2"/>
        <vers num="0.2"/>
        <vers num="0.2.1"/>
        <vers num="0.3"/>
        <vers num="0.3.1"/>
        <vers num="0.3pre1"/>
        <vers num="0.3pre2"/>
        <vers num="0.4"/>
        <vers num="0.4pre1"/>
        <vers num="0.4pre2"/>
        <vers num="0.5"/>
        <vers num="0.5pre1"/>
        <vers num="0.5pre2"/>
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.4"/>
        <vers num="1.0.5"/>
        <vers num="1.0.6"/>
        <vers num="1.0pre1"/>
        <vers num="1.0pre2"/>
        <vers num="1.0pre3"/>
        <vers num="1.1.0"/>
        <vers num="1.1.1"/>
        <vers num="1.1.2"/>
        <vers num="1.1.3"/>
        <vers num="1.2.0"/>
        <vers num="1.2.0_rc3"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2"/>
        <vers num="1.2.3"/>
        <vers num="1.2.4"/>
        <vers num="1.2.5"/>
        <vers num="1.2.6"/>
        <vers num="1.2.7"/>
        <vers num="1.3.0"/>
        <vers num="1.3.1"/>
        <vers num="1.3.2"/>
        <vers num="1.4.0"/>
        <vers num="1.4.0_rc1"/>
        <vers num="1.4.0_rc2a"/>
        <vers num="1.4.1"/>
        <vers num="1.4.2"/>
        <vers num="1.4.3"/>
        <vers num="1.4.3_rc1"/>
        <vers num="1.4.3a"/>
        <vers num="1.4.4"/>
        <vers num="1.4.4_rc1"/>
        <vers num="1.4.5"/>
        <vers num="1.4.5_rc1"/>
        <vers num="1.4.6"/>
        <vers num="1.4.6_rc1"/>
        <vers num="1.4.7"/>
        <vers num="1.4.8"/>
        <vers num="1.4.9"/>
        <vers num="1.4.9a"/>
        <vers num="1.4.10"/>
        <vers num="1.4.10a"/>
        <vers num="1.4.11"/>
        <vers num="1.4.12"/>
        <vers num="1.4.15"/>
        <vers num="1.4.15_rc1"/>
        <vers num="1.4.16" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2380" seq="2008-2380" published="2008-12-22" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.1" CVSS_base_score="5.1" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in authpgsqllib.c in Courier-Authlib before 0.62.0, when a non-Latin locale Postgres database is used, allows remote attackers to execute arbitrary SQL commands via query parameters containing apostrophes.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200903-25.xml">GLSA-200903-25</ref>
      <ref source="CONFIRM" url="http://www.courier-mta.org/authlib/changelog.html" adv="1">http://www.courier-mta.org/authlib/changelog.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/32926" patch="1">32926</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/47494">courier-library-postgres-sql-injection(47494)</ref>
    </refs>
    <vuln_soft>
      <prod name="courtier-authlib" vendor="courier-mta">
        <vers num="0.52"/>
        <vers num="0.53"/>
        <vers num="0.54"/>
        <vers num="0.55"/>
        <vers num="0.56"/>
        <vers num="0.57"/>
        <vers num="0.58"/>
        <vers num="0.59"/>
        <vers num="0.59.1"/>
        <vers num="0.59.2"/>
        <vers num="0.59.3"/>
        <vers num="0.60"/>
        <vers num="0.60.1"/>
        <vers num="0.60.2"/>
        <vers num="0.60.3"/>
        <vers num="0.60.4"/>
        <vers num="0.60.5"/>
        <vers num="0.60.6"/>
        <vers num="0.61.0"/>
        <vers num="0.61.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2381" seq="2008-2381" published="2009-01-02" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the create function in common/include/GroupJoinRequest.class in GForge 4.5 and 4.6 allows remote attackers to execute arbitrary SQL commands via the comments variable.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://gforge.org/scm/viewvc.php/branches/Branch_4_5/gforge/common/include/GroupJoinRequest.class?root=gforge&amp;r1=4590&amp;r2=6709">http://gforge.org/scm/viewvc.php/branches/Branch_4_5/gforge/common/include/GroupJoinRequest.class?root=gforge&amp;r1=4590&amp;r2=6709</ref>
      <ref source="CONFIRM" url="http://gforge.org/scm/viewvc.php/branches/Branch_4_5/gforge/common/include/GroupJoinRequest.class?root=gforge&amp;view=log">http://gforge.org/scm/viewvc.php/branches/Branch_4_5/gforge/common/include/GroupJoinRequest.class?root=gforge&amp;view=log</ref>
      <ref source="CONFIRM" url="http://security-tracker.debian.net/tracker/CVE-2008-2381">http://security-tracker.debian.net/tracker/CVE-2008-2381</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/33086">33086</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1021510">1021510</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/0004">ADV-2009-0004</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/47703">gforge-create-sql-injection(47703)</ref>
    </refs>
    <vuln_soft>
      <prod name="gforge" vendor="gforge">
        <vers num="4.5"/>
        <vers num="4.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2382" seq="2008-2382" published="2008-12-24" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The protocol_client_msg function in vnc.c in the VNC server in (1) Qemu 0.9.1 and earlier and (2) KVM kvm-79 and earlier allows remote attackers to cause a denial of service (infinite loop) via a certain message.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html">SUSE-SR:2009:002</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html">SUSE-SR:2009:008</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/4803">4803</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1021488">1021488</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1021489">1021489</ref>
      <ref source="MISC" url="http://www.coresecurity.com/content/vnc-remote-dos">http://www.coresecurity.com/content/vnc-remote-dos</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/499502/100/0/threaded">20081222 CORE-2008-1210: Qemu and KVM VNC server remote DoS</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/32910">32910</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-776-1">USN-776-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/3488">ADV-2008-3488</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/3489">ADV-2008-3489</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/47561">qemu-kvm-protocolclientmsg-dos(47561)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01223.html">FEDORA-2008-11705</ref>
    </refs>
    <vuln_soft>
      <prod name="kvm" vendor="kvm_qumranet">
        <vers num="1"/>
        <vers num="2"/>
        <vers num="3"/>
        <vers num="4"/>
        <vers num="5"/>
        <vers num="6"/>
        <vers num="7"/>
        <vers num="8"/>
        <vers num="9"/>
        <vers num="10"/>
        <vers num="11"/>
        <vers num="12"/>
        <vers num="13"/>
        <vers num="14"/>
        <vers num="15"/>
        <vers num="16"/>
        <vers num="17"/>
        <vers num="18"/>
        <vers num="19"/>
        <vers num="20"/>
        <vers num="21"/>
        <vers num="22"/>
        <vers num="23"/>
        <vers num="24"/>
        <vers num="25"/>
        <vers num="26"/>
        <vers num="27"/>
        <vers num="28"/>
        <vers num="29"/>
        <vers num="30"/>
        <vers num="31"/>
        <vers num="32"/>
        <vers num="33"/>
        <vers num="34"/>
        <vers num="35"/>
        <vers num="36"/>
        <vers num="37"/>
        <vers num="38"/>
        <vers num="39"/>
        <vers num="40"/>
        <vers num="41"/>
        <vers num="42"/>
        <vers num="43"/>
        <vers num="44"/>
        <vers num="45"/>
        <vers num="46"/>
        <vers num="47"/>
        <vers num="48"/>
        <vers num="49"/>
        <vers num="50"/>
        <vers num="51"/>
        <vers num="52"/>
        <vers num="53"/>
        <vers num="54"/>
        <vers num="55"/>
        <vers num="56"/>
        <vers num="57"/>
        <vers num="58"/>
        <vers num="59"/>
        <vers num="60"/>
        <vers num="61"/>
        <vers num="62"/>
        <vers num="63"/>
        <vers num="64"/>
        <vers num="65"/>
        <vers num="66"/>
        <vers num="67"/>
        <vers num="68"/>
        <vers num="69"/>
        <vers num="70"/>
        <vers num="71"/>
        <vers num="72"/>
        <vers num="73"/>
        <vers num="74"/>
        <vers num="75"/>
        <vers num="76"/>
        <vers num="77"/>
        <vers num="78"/>
        <vers num="79" prev="1"/>
      </prod>
      <prod name="qemu" vendor="qemu">
        <vers num="0.1"/>
        <vers num="0.1.1"/>
        <vers num="0.1.2"/>
        <vers num="0.1.3"/>
        <vers num="0.1.4"/>
        <vers num="0.1.5"/>
        <vers num="0.1.6"/>
        <vers num="0.2"/>
        <vers num="0.3"/>
        <vers num="0.4"/>
        <vers num="0.4.1"/>
        <vers num="0.4.2"/>
        <vers num="0.4.3"/>
        <vers num="0.5.0"/>
        <vers num="0.5.1"/>
        <vers num="0.5.2"/>
        <vers num="0.5.3"/>
        <vers num="0.5.4"/>
        <vers num="0.5.5"/>
        <vers num="0.6.0"/>
        <vers num="0.6.1"/>
        <vers num="0.7.0"/>
        <vers num="0.7.1"/>
        <vers num="0.7.2"/>
        <vers num="0.8.0"/>
        <vers num="0.8.1"/>
        <vers num="0.8.2"/>
        <vers num="0.9.0"/>
        <vers num="0.9.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2383" seq="2008-2383" published="2009-01-02" modified="2018-10-03" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">CRLF injection vulnerability in xterm allows user-assisted attackers to execute arbitrary commands via LF (aka \n) characters surrounding a command name within a Device Control Request Status String (DECRQSS) escape sequence in a text file, a related issue to CVE-2003-0063 and CVE-2003-0071.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=510030">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=510030</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2009/May/msg00002.html">APPLE-SA-2009-05-12</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html">SUSE-SR:2009:002</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html">SUSE-SR:2009:003</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-66-254208-1">254208</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3549">http://support.apple.com/kb/HT3549</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2009/dsa-1694">DSA-1694</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2009-0018.html">RHSA-2009:0018</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2009-0019.html">RHSA-2009:0019</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/33060">33060</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1021522">1021522</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA09-133A.html">TA09-133A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/1297">ADV-2009-1297</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/47655">xterm-decrqss-code-execution(47655)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9317">oval:org.mitre.oval:def:9317</ref>
      <ref source="UBUNTU" url="https://usn.ubuntu.com/703-1/">USN-703-1</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00072.html">FEDORA-2009-0059</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00184.html">FEDORA-2009-0154</ref>
    </refs>
    <vuln_soft>
      <prod name="xterm" vendor="invisible-island">
        <vers num="_nil_"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2384" seq="2008-2384" published="2009-01-22" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in mod_auth_mysql.c in the mod-auth-mysql (aka libapache2-mod-auth-mysql) module for the Apache HTTP Server 2.x, when configured to use a multibyte character set that allows a \ (backslash) as part of the character encoding, allows remote attackers to execute arbitrary SQL commands via unspecified inputs in a login request.</descript>
      <descript source="nvd">Please note that this describes the software used in debian as mod-auth-mysql (binary name is libapache2-mod-auth-mysql). It is different from the Sourceforge project.
</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://klecker.debian.org/~white/mod-auth-mysql/CVE-2008-2384_mod-auth-mysql.patch" patch="1">http://klecker.debian.org/~white/mod-auth-mysql/CVE-2008-2384_mod-auth-mysql.patch</ref>
      <ref source="FEDORA" url="http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053899.html">FEDORA-2011-0100</ref>
      <ref source="FEDORA" url="http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053903.html">FEDORA-2011-0114</ref>
      <ref source="MLIST" url="http://openwall.com/lists/oss-security/2009/01/21/10">[oss-security] 20090121 mod-auth-mysql: SQL injection</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2009-0259.html">RHSA-2009:0259</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2010-1002.html">RHSA-2010:1002</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/33392">33392</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/0226">ADV-2009-0226</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2011/0367">ADV-2011-0367</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=480238">https://bugzilla.redhat.com/show_bug.cgi?id=480238</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/48163">modauthmysql-multibyte-sql-injection(48163)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10172">oval:org.mitre.oval:def:10172</ref>
    </refs>
    <vuln_soft>
      <prod name="mod_auth_mysql" vendor="joey_schulze">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2388" seq="2008-2388" published="2008-06-06" modified="2008-09-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple off-by-one errors in opensuse-updater in openSUSE 10.2 have unspecified impact and attack vectors.  NOTE: the vendor states that these "can be considered no security problem."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00001.html">SUSE-SR:2008:012</ref>
    </refs>
    <vuln_soft>
      <prod name="opensuse" vendor="opensuse">
        <vers num="10.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2389" seq="2008-2389" published="2008-06-06" modified="2008-09-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.9" CVSS_base_score="4.9" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:N/A:N)">
    <desc>
      <descript source="cve">opensuse-updater in openSUSE 10.2 allows local users to access arbitrary files via a symlink attack.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00001.html">SUSE-SR:2008:012</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29608">29608</ref>
    </refs>
    <vuln_soft>
      <prod name="opensuse" vendor="opensuse">
        <vers num="10.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2390" seq="2008-2390" published="2008-05-21" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Hpufunction.dll 4.0.0.1 in HP Software Update exposes the unsafe (1) ExecuteAsync and (2) Execute methods, which allows remote attackers to execute arbitrary code via an absolute pathname in the first argument.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42249">hp-softwareupdate-hpufunction-code-execution(42249)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5511">5511</ref>
    </refs>
    <vuln_soft>
      <prod name="software_update" vendor="hp">
        <vers num="4.0.0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2391" seq="2008-2391" published="2008-05-21" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">SubSonic allows remote attackers to bypass pagesize limits and cause a denial of service (CPU consumption) via a pageindex (aka data page number) of -1.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3898">3898</ref>
      <ref source="MISC" url="http://www.codeplex.com/subsonic/WorkItem/View.aspx?WorkItemId=16112">http://www.codeplex.com/subsonic/WorkItem/View.aspx?WorkItemId=16112</ref>
      <ref source="MISC" url="http://www.portcullis-security.com/uplds/wildcard_attacks.pdf">http://www.portcullis-security.com/uplds/wildcard_attacks.pdf</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492233/100/0/threaded">20080519 DoS attacks using SQL Wildcards - White Paper</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42562">subsonic-pagesize-dos(42562)</ref>
    </refs>
    <vuln_soft>
      <prod name="subsonic" vendor="codeplex">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2392" seq="2008-2392" published="2008-05-21" modified="2018-10-31" severity="High" CVSS_version="2.0" CVSS_score="9.0" CVSS_base_score="9.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unrestricted file upload vulnerability in WordPress 2.5.1 and earlier might allow remote authenticated administrators to upload and execute arbitrary PHP files via the Upload section in the Write Tabs area of the dashboard.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3897" adv="1">3897</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492230/100/0/threaded" adv="1">20080519 Wordpress Malicious File Execution Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29276" adv="1">29276</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42561" adv="1">wordpress-writetabs-file-upload(42561)</ref>
    </refs>
    <vuln_soft>
      <prod name="wordpress" vendor="wordpress">
        <vers num="2.5.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2393" seq="2008-2393" published="2008-05-21" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in play.php in EntertainmentScript 1.4.0 allows remote attackers to execute arbitrary SQL commands via the id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29284">29284</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42538">entertainmentscript-play-sql-injection(42538)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5654">5654</ref>
    </refs>
    <vuln_soft>
      <prod name="entertainmentscript" vendor="entertainmentscript">
        <vers num="1.4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2394" seq="2008-2394" published="2008-05-21" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in TAGWORX.CMS 3.00.02 allow remote attackers to execute arbitrary SQL commands via the (1) cid parameter to contact.php and the (2) nid parameter to news.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.tagworx.net/webdesign_seo_muenchen.php?cid=79&amp;pid=5">http://www.tagworx.net/webdesign_seo_muenchen.php?cid=79&amp;pid=5</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1561/references">ADV-2008-1561</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42512">tagworx-contact-news-sql-injection(42512)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5642">5642</ref>
    </refs>
    <vuln_soft>
      <prod name="tagworx_cms" vendor="tagworx">
        <vers num="3.00.02"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2395" seq="2008-2395" published="2008-05-21" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in thread.php in AlkalinePHP 0.80.00 beta and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29281">29281</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42520">alkalinephp-thread-sql-injection(42520)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5652">5652</ref>
    </refs>
    <vuln_soft>
      <prod name="alkalinephp" vendor="alkalinephp">
        <vers num="0.80.00" prev="1" edition="beta"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2396" seq="2008-2396" published="2008-05-21" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in index.php in Wajox Software microSSys CMS 1.5 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in an arbitrary element of the PAGES array parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29278">29278</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42518">microssys-index-file-include(42518)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5651">5651</ref>
    </refs>
    <vuln_soft>
      <prod name="mircrossys_cms" vendor="wajox_software">
        <vers num="1.5" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2397" seq="2008-2397" published="2008-05-21" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in search-results.dot in dotCMS 1.x allows remote attackers to inject arbitrary web script or HTML via the search_query parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29287">29287</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42525">dotcms-searchresultsdot-xss(42525)</ref>
    </refs>
    <vuln_soft>
      <prod name="dotcms" vendor="dotcms">
        <vers num="1.0"/>
        <vers num="1.2.0"/>
        <vers num="1.5.0"/>
        <vers num="1.5.1"/>
        <vers num="1.5.1.1"/>
        <vers num="1.6" edition="rc1"/>
        <vers num="1.6" edition="rc2"/>
        <vers num="1.6" edition="rc3"/>
        <vers num="1.6.0.1"/>
        <vers num="1.6.0.2"/>
        <vers num="1.6.0.3"/>
        <vers num="1.6.0.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2398" seq="2008-2398" published="2008-05-21" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php in AppServ Open Project 2.5.10 and earlier allows remote attackers to inject arbitrary web script or HTML via the appservlang parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3896">3896</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492271/100/0/threaded">20080520 AppServ Open Project &lt; = 2.5.10 Remote XSS Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29291">29291</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42546">appserv-index-xss(42546)</ref>
    </refs>
    <vuln_soft>
      <prod name="appserv" vendor="appserv_open_project">
        <vers num="1.0.0"/>
        <vers num="1.2.0"/>
        <vers num="1.3.0"/>
        <vers num="1.4.0"/>
        <vers num="1.5.0"/>
        <vers num="1.6.0"/>
        <vers num="1.7.0"/>
        <vers num="1.8.0"/>
        <vers num="1.9.0"/>
        <vers num="2.0.0"/>
        <vers num="2.1.0"/>
        <vers num="2.2.0"/>
        <vers num="2.3.0"/>
        <vers num="2.4"/>
        <vers num="2.4.1"/>
        <vers num="2.4.2"/>
        <vers num="2.4.3"/>
        <vers num="2.4.4"/>
        <vers num="2.4.4a"/>
        <vers num="2.4.5"/>
        <vers num="2.4.6"/>
        <vers num="2.4.7"/>
        <vers num="2.4.8"/>
        <vers num="2.4.9"/>
        <vers num="2.5"/>
        <vers num="2.5.1"/>
        <vers num="2.5.2"/>
        <vers num="2.5.3"/>
        <vers num="2.5.4"/>
        <vers num="2.5.4a"/>
        <vers num="2.5.5"/>
        <vers num="2.5.6"/>
        <vers num="2.5.7"/>
        <vers num="2.5.8"/>
        <vers num="2.5.9"/>
        <vers num="2.5.10" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2399" seq="2008-2399" published="2008-05-22" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in the FireFTP add-on before 0.98.20080518 for Firefox allows remote FTP servers to create or overwrite arbitrary files via ..\ (dot dot backslash) sequences in responses to (1) MLSD and (2) LIST commands, a related issue to CVE-2002-1345.  NOTE: this can be leveraged for code execution by writing to a Startup folder.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://vuln.sg/fireftp0971-en.html">http://vuln.sg/fireftp0971-en.html</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/906907">VU#906907</ref>
      <ref source="CONFIRM" url="http://www.mozdev.org/source/browse/fireftp/src/content/js/connection/controlSocket.js.in.diff?r1=1.58;r2=1.59;f=h">http://www.mozdev.org/source/browse/fireftp/src/content/js/connection/controlSocket.js.in.diff?r1=1.58;r2=1.59;f=h</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29289">29289</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1596/references">ADV-2008-1596</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42516">fireftp-mlsd-list-directory-traversal(42516)</ref>
    </refs>
    <vuln_soft>
      <prod name="fireftp" vendor="fireftp">
        <vers num="0.98" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2400" seq="2008-2400" published="2008-05-22" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in stunnel before 4.23, when running as a service on Windows, allows local users to gain privileges via unknown attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MLIST" url="http://stunnel.mirt.net/pipermail/stunnel-announce/2008-May/000034.html">[stunnel-announce] 20080503 stunnel 4.23 released</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29285">29285</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020049">1020049</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1568/references">ADV-2008-1568</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42526">stunnel-windows-privilege-escalation(42526)</ref>
    </refs>
    <vuln_soft>
      <prod name="stunnel" vendor="stunnel">
        <vers num="0.1"/>
        <vers num="1.0"/>
        <vers num="1.1"/>
        <vers num="1.2"/>
        <vers num="1.3"/>
        <vers num="1.4"/>
        <vers num="1.5"/>
        <vers num="1.6"/>
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="3.0" edition="b1"/>
        <vers num="3.0" edition="b2"/>
        <vers num="3.0" edition="b3"/>
        <vers num="3.0" edition="b4"/>
        <vers num="3.0" edition="b5"/>
        <vers num="3.0" edition="b6"/>
        <vers num="3.0" edition="b7"/>
        <vers num="3.1"/>
        <vers num="3.2"/>
        <vers num="3.3"/>
        <vers num="3.4a"/>
        <vers num="3.5"/>
        <vers num="3.6"/>
        <vers num="3.7"/>
        <vers num="3.8" edition="p1"/>
        <vers num="3.8" edition="p2"/>
        <vers num="3.8" edition="p3"/>
        <vers num="3.8" edition="p4"/>
        <vers num="3.9"/>
        <vers num="3.10"/>
        <vers num="3.11"/>
        <vers num="3.12"/>
        <vers num="3.13"/>
        <vers num="3.14"/>
        <vers num="3.15"/>
        <vers num="3.16"/>
        <vers num="3.17"/>
        <vers num="3.18"/>
        <vers num="3.19"/>
        <vers num="3.20"/>
        <vers num="3.21"/>
        <vers num="3.21a"/>
        <vers num="3.21b"/>
        <vers num="3.21c"/>
        <vers num="3.22"/>
        <vers num="3.24"/>
        <vers num="4.0"/>
        <vers num="4.01"/>
        <vers num="4.02"/>
        <vers num="4.03"/>
        <vers num="4.04"/>
        <vers num="4.05"/>
        <vers num="4.06"/>
        <vers num="4.07"/>
        <vers num="4.08"/>
        <vers num="4.09"/>
        <vers num="4.10"/>
        <vers num="4.11"/>
        <vers num="4.12"/>
        <vers num="4.13"/>
        <vers num="4.14"/>
        <vers num="4.15"/>
        <vers num="4.16"/>
        <vers num="4.17"/>
        <vers num="4.18"/>
        <vers num="4.19"/>
        <vers num="4.20"/>
        <vers num="4.21"/>
        <vers num="4.22"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2401" seq="2008-2401" published="2008-06-04" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The Admin Server in Sun Java Active Server Pages (ASP) Server before 4.0.3 allows remote attackers to append to arbitrary new or existing files via the first argument to a certain file that is included by multiple unspecified ASP applications.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=705">20080603 Sun Java System Active Server Pages File Creation Vulnerability</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-66-238184-1">238184</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020186">1020186</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1742/references">ADV-2008-1742</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42832">sunjava-file-creation-code-execution(42832)</ref>
    </refs>
    <vuln_soft>
      <prod name="java_active_server" vendor="sun">
        <vers num="4.0.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2402" seq="2008-2402" published="2008-06-04" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The Admin Server in Sun Java Active Server Pages (ASP) Server before 4.0.3 stores sensitive information under the web root with insufficient access control, which allows remote attackers to read password hashes and configuration data via direct requests for unspecified documents.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=706">20080603 Sun Java System Active Server Pages Information Disclosure Vulnerability</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-66-238184-1" patch="1">238184</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29540">29540</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020187">1020187</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1742/references">ADV-2008-1742</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42828">sunjava-active-password-info-disclosure(42828)</ref>
    </refs>
    <vuln_soft>
      <prod name="java_asp_server" vendor="sun">
        <vers num="4.0"/>
        <vers num="4.0.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2403" seq="2008-2403" published="2008-06-04" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple directory traversal vulnerabilities in unspecified ASP applications in Sun Java Active Server Pages (ASP) Server before 4.0.3 allow remote attackers to read or delete arbitrary files via a .. (dot dot) in the Path parameter to the MapPath method.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=707">20080603 Sun Java System Active Server Pages Multiple Directory Traversal Vulnerabilities</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-66-238184-1" patch="1">238184</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29538">29538</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020188">1020188</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1742/references">ADV-2008-1742</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42831">sun-jsasp-directory-traversal(42831)</ref>
    </refs>
    <vuln_soft>
      <prod name="java_asp_server" vendor="sun">
        <vers num="4.0"/>
        <vers num="4.0.1"/>
        <vers num="4.0.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2404" seq="2008-2404" published="2008-06-04" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the request handling implementation in Sun Java Active Server Pages (ASP) Server before 4.0.3 allows remote attackers to execute arbitrary code via an unspecified string field.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=708">20080603 Sun Java System Active Server Pages Buffer Overflow Vulnerability</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-66-238184-1" patch="1">238184</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020189">1020189</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1742/references">ADV-2008-1742</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42830">sunjavasystem-asp-server-bo(42830)</ref>
    </refs>
    <vuln_soft>
      <prod name="java_asp_server" vendor="sun">
        <vers num="4.0"/>
        <vers num="4.0.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2405" seq="2008-2405" published="2008-06-04" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Sun Java Active Server Pages (ASP) Server before 4.0.3 allows remote attackers to execute arbitrary commands via shell metacharacters in HTTP requests to unspecified ASP applications.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=709">20080603 Sun Java System Active Server Pages Multiple Command Injection Vulnerabilities</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-66-238184-1">238184</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020190">1020190</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1742/references">ADV-2008-1742</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42829">sun-jsasp-command-execution(42829)</ref>
    </refs>
    <vuln_soft>
      <prod name="java_active_server_pages" vendor="sun">
        <vers num="4.0.0"/>
        <vers num="4.0.1"/>
        <vers num="4.0.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2406" seq="2008-2406" published="2008-06-04" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The administration application server in Sun Java Active Server Pages (ASP) Server before 4.0.3 allows remote attackers to bypass authentication via direct requests on TCP port 5102.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=710">20080603 Sun Java System Active Server Pages Authorization Bypass Vulnerability</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-66-238184-1">238184</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29539">29539</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020191">1020191</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1742/references">ADV-2008-1742</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42833">sun-jsasp-admin-auth-bypass(42833)</ref>
    </refs>
    <vuln_soft>
      <prod name="java_asp_server" vendor="sun">
        <vers num="4.0"/>
        <vers num="4.0.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2407" seq="2008-2407" published="2008-05-23" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in AIM.DLL in Cerulean Studios Trillian before 3.1.10.0 allows user-assisted remote attackers to execute arbitrary code via a long attribute value in a FONT tag in a message.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020104">1020104</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492433/100/0/threaded">20080521 ZDI-08-029: Trillian AIM.DLL Long HTML Font Parameter Stack Overflow Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29330" patch="1">29330</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1622">ADV-2008-1622</ref>
      <ref source="MISC" url="http://www.zerodayinitiative.com/advisories/ZDI-08-029/">http://www.zerodayinitiative.com/advisories/ZDI-08-029/</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42582">trillian-aimdll-bo(42582)</ref>
    </refs>
    <vuln_soft>
      <prod name="trillian" vendor="ceruleanstudios">
        <vers num="3.1.9.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2408" seq="2008-2408" published="2008-05-23" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in the XML parsing functionality in talk.dll in Cerulean Studios Trillian Pro before 3.1.10.0 allows remote attackers to execute arbitrary code via a malformed attribute in an IMG tag.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2008-05/0284.html">20080521 ZDI-08-030: Trillian Multiple Protocol XML Parsing Memory Corruption Vulnerability</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020105">1020105</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29330" patch="1">29330</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1622">ADV-2008-1622</ref>
      <ref source="MISC" url="http://www.zerodayinitiative.com/advisories/ZDI-08-030/">http://www.zerodayinitiative.com/advisories/ZDI-08-030/</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42581">trillian-talk-bo(42581)</ref>
    </refs>
    <vuln_soft>
      <prod name="trillian_pro" vendor="ceruleanstudios">
        <vers num="3.1.9.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2409" seq="2008-2409" published="2008-05-23" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in Cerulean Studios Trillian before 3.1.10.0 allows remote attackers to execute arbitrary code via unspecified attributes in the X-MMS-IM-FORMAT header in an MSN message.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2008-05/0285.html" patch="1">20080521 ZDI-08-031: Trillian MSN MIME Header Stack-Based Overflow Vulnerability</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020106">1020106</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29330">29330</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1622">ADV-2008-1622</ref>
      <ref source="MISC" url="http://www.zerodayinitiative.com/advisories/ZDI-08-031/" patch="1">http://www.zerodayinitiative.com/advisories/ZDI-08-031/</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42576">trillian-msn-protocol-bo(42576)</ref>
    </refs>
    <vuln_soft>
      <prod name="trillian" vendor="cerulean_studios">
        <vers num="0.71"/>
        <vers num="0.73"/>
        <vers num="0.74"/>
        <vers num="0.74i"/>
        <vers num="0.725"/>
        <vers num="0.6351"/>
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="3.0"/>
        <vers num="3.1"/>
        <vers num="3.1.5.0"/>
        <vers num="3.1.5.1"/>
        <vers num="3.1.6.0"/>
        <vers num="3.1.7.0"/>
        <vers num="3.1.9.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2410" seq="2008-2410" published="2008-05-22" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the servlet engine and Web container in the Web Server service in IBM Lotus Domino before 7.0.3 FP1, and 8.x before 8.0.1, allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29311">29311</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1597">ADV-2008-1597</ref>
      <ref source="CONFIRM" url="http://www-1.ibm.com/support/docview.wss?uid=swg21303296">http://www-1.ibm.com/support/docview.wss?uid=swg21303296</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42553">ibm-lotusdomino-servlet-web-xss(42553)</ref>
    </refs>
    <vuln_soft>
      <prod name="lotus_domino_web_server" vendor="ibm">
        <vers num="7.0"/>
        <vers num="7.0.1"/>
        <vers num="7.0.2"/>
        <vers num="7.0.3"/>
        <vers num="8.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2411" seq="2008-2411" published="2008-05-22" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in SazCart 1.5.1 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the prodid parameter in a details action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3900">3900</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491892/100/0/threaded">20080509 SazCart &lt;= 1.5.1 (prodid) Remote SQL Injection Exploit</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29129">29129</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42542">sazcart-prodid-sql-injection(42542)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5576">5576</ref>
    </refs>
    <vuln_soft>
      <prod name="sazcart" vendor="sazcart">
        <vers num="1.3"/>
        <vers num="1.4"/>
        <vers num="1.5" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2412" seq="2008-2412" published="2008-05-22" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in glossaire.php in ACGV News 0.9.1 allows remote attackers to execute arbitrary SQL commands via the id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29253">29253</ref>
      <ref source="MISC" url="http://www.z0rlu.ownspace.org/index.php?/archives/84-ACGV-News-v0.9.1-2003-SQL-inj.-XSS.html">http://www.z0rlu.ownspace.org/index.php?/archives/84-ACGV-News-v0.9.1-2003-SQL-inj.-XSS.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42490">acgvnews-glossaire-sql-injection(42490)</ref>
    </refs>
    <vuln_soft>
      <prod name="acgv_news" vendor="acgv.free">
        <vers num="0.9.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2413" seq="2008-2413" published="2008-05-22" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in glossaire.php in ACGV News 0.9.1 allows remote attackers to inject arbitrary web script or HTML via the id parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29253">29253</ref>
      <ref source="MISC" url="http://www.z0rlu.ownspace.org/index.php?/archives/84-ACGV-News-v0.9.1-2003-SQL-inj.-XSS.html">http://www.z0rlu.ownspace.org/index.php?/archives/84-ACGV-News-v0.9.1-2003-SQL-inj.-XSS.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42491">acgvnews-glossaire-xss(42491)</ref>
    </refs>
    <vuln_soft>
      <prod name="acgv_news" vendor="acgv.free">
        <vers num="0.9.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2414" seq="2008-2414" published="2008-05-22" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in send_email.php in AN Guestbook (ANG) 0.4 allows remote attackers to inject arbitrary web script or HTML via the postid parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29254">29254</ref>
      <ref source="MISC" url="http://www.z0rlu.ownspace.org/index.php?/archives/86-ANG-AN-Guestbook-version-0.4-xss.html">http://www.z0rlu.ownspace.org/index.php?/archives/86-ANG-AN-Guestbook-version-0.4-xss.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42489">anguestbook-sendemail-xss(42489)</ref>
    </refs>
    <vuln_soft>
      <prod name="an_guestbook" vendor="aguestbook">
        <vers num="0.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2415" seq="2008-2415" published="2008-05-22" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in template/purpletech/base_include.php in DigitalHive (aka hive) 2.0 RC2 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the page parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29255">29255</ref>
      <ref source="MISC" url="http://www.z0rlu.ownspace.org/index.php?/archives/85-hive-v2.0-RC2-LFi.html">http://www.z0rlu.ownspace.org/index.php?/archives/85-hive-v2.0-RC2-LFi.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42495">digitalhive-baseinclude-file-include(42495)</ref>
    </refs>
    <vuln_soft>
      <prod name="digitalhive" vendor="digitalhive">
        <vers num="2.0" edition="rc2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2416" seq="2008-2416" published="2008-05-22" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in FicHive 1.0 allows remote attackers to execute arbitrary SQL commands via the category parameter in a Fiction action, possibly related to sources/fiction.class.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29265">29265</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1564/references" adv="1">ADV-2008-1564</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42515">fichive-index-sql-injection(42515)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5639">5639</ref>
    </refs>
    <vuln_soft>
      <prod name="fichive" vendor="fichive">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2417" seq="2008-2417" published="2008-05-22" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in showQAnswer.asp in How2ASP.net Webboard 4.1 allows remote attackers to execute arbitrary SQL commands via the qNo parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29263">29263</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1565/references">ADV-2008-1565</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42496">webboard-showqanswer-sql-injection(42496)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5638">5638</ref>
    </refs>
    <vuln_soft>
      <prod name="webboard" vendor="how2asp">
        <vers num="4.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2418" seq="2008-2418" published="2008-05-23" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.7" CVSS_base_score="4.7" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Race condition in the STREAMS Administrative Driver (sad) in Sun Solaris 10 allows local users to cause a denial of service (panic) via unknown vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-237584-1">237584</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29326">29326</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020096">1020096</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1606/references">ADV-2008-1606</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42587">solaris-sad-dos(42587)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5346">oval:org.mitre.oval:def:5346</ref>
    </refs>
    <vuln_soft>
      <prod name="solaris" vendor="sun">
        <vers num="10" edition=":sparc"/>
        <vers num="10" edition=":x86"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2419" seq="2008-2419" published="2008-05-23" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Mozilla Firefox 2.0.0.14 allows remote attackers to cause a denial of service (heap corruption and application crash) or possibly execute arbitrary code by triggering an error condition during certain Iframe operations between a JSframe write and a JSframe close, as demonstrated by an error in loading an empty Java applet defined by a 'src="javascript:"' sequence.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.0x000000.com/?i=576">http://www.0x000000.com/?i=576</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29318">29318</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42589">mozilla-firefox-jsframe-code-execution(42589)</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="2.0.0.14"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2420" seq="2008-2420" published="2008-05-23" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The OCSP functionality in stunnel before 4.24 does not properly search certificate revocation lists (CRL), which allows remote attackers to bypass intended access restrictions by using revoked certificates.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200808-08.xml">GLSA-200808-08</ref>
      <ref source="MLIST" url="http://stunnel.mirt.net/pipermail/stunnel-announce/2008-May/000035.html">[stunnel-announce] 20080519 stunnel 4.24 released</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:168">MDVSA-2008:168</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29309" patch="1">29309</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1569/references">ADV-2008-1569</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42528">stunnel-ocsp-security-bypass(42528)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00856.html">FEDORA-2008-4531</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00907.html">FEDORA-2008-4579</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00942.html">FEDORA-2008-4606</ref>
    </refs>
    <vuln_soft>
      <prod name="stunnel" vendor="stunnel">
        <vers num="3.4a"/>
        <vers num="3.5"/>
        <vers num="3.6"/>
        <vers num="3.7"/>
        <vers num="3.8"/>
        <vers num="3.8p1"/>
        <vers num="3.8p2"/>
        <vers num="3.8p3"/>
        <vers num="3.8p4"/>
        <vers num="3.9"/>
        <vers num="3.10"/>
        <vers num="3.11"/>
        <vers num="3.12"/>
        <vers num="3.13"/>
        <vers num="3.14"/>
        <vers num="3.15"/>
        <vers num="3.16"/>
        <vers num="3.17"/>
        <vers num="3.18"/>
        <vers num="3.19"/>
        <vers num="3.20"/>
        <vers num="3.21"/>
        <vers num="3.21a"/>
        <vers num="3.21b"/>
        <vers num="3.21c"/>
        <vers num="3.22"/>
        <vers num="3.23"/>
        <vers num="3.24"/>
        <vers num="3.25"/>
        <vers num="3.26"/>
        <vers num="4.00"/>
        <vers num="4.01"/>
        <vers num="4.02"/>
        <vers num="4.03"/>
        <vers num="4.04"/>
        <vers num="4.05"/>
        <vers num="4.06"/>
        <vers num="4.07"/>
        <vers num="4.08"/>
        <vers num="4.09"/>
        <vers num="4.10"/>
        <vers num="4.11"/>
        <vers num="4.12"/>
        <vers num="4.13"/>
        <vers num="4.14"/>
        <vers num="4.15"/>
        <vers num="4.16"/>
        <vers num="4.17"/>
        <vers num="4.18"/>
        <vers num="4.19"/>
        <vers num="4.20"/>
        <vers num="4.21"/>
        <vers num="4.22"/>
        <vers num="4.23"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2421" seq="2008-2421" published="2008-05-23" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the Web GUI in SAP Web Application Server (WAS) 7.0, Web Dynpro for ABAP (aka WD4A or WDA), and Web Dynpro for BSP allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO to the default URI under bc/gui/sap/its/webgui/.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492376/100/0/threaded">20080521 [DSECRG-08-023] SAP Web Application Server XSS Security Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29317">29317</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020097">1020097</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1599/references">ADV-2008-1599</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42724">sap-sapbcguisapitswebgui-xss(42724)</ref>
    </refs>
    <vuln_soft>
      <prod name="sap_web_application_server" vendor="sap">
        <vers num="7.0"/>
      </prod>
      <prod name="web_dynpro" vendor="sap">
        <vers num="abap"/>
        <vers num="bsp"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2422" seq="2008-2422" published="2008-05-23" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in Web Slider 0.6 allows remote attackers to execute arbitrary SQL commands via the slide parameter in a slides action.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29296">29296</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42555">webslider-index-sql-injection(42555)</ref>
    </refs>
    <vuln_soft>
      <prod name="webslider" vendor="webslider">
        <vers num="0.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2423" seq="2008-2423" published="2008-05-23" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Interchange before 5.6.0 and before 5.5.2 allows remote attackers to cause a denial of service via crafted HTTP requests.  NOTE: this might overlap CVE-2007-2635.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://ftp.icdevgroup.org/interchange/5.6/ANNOUNCEMENT-5.6.0.txt">http://ftp.icdevgroup.org/interchange/5.6/ANNOUNCEMENT-5.6.0.txt</ref>
      <ref source="CONFIRM" url="http://ftp.icdevgroup.org/pub/interchange/5.5/ANNOUNCEMENT-5.5.2.txt">http://ftp.icdevgroup.org/pub/interchange/5.5/ANNOUNCEMENT-5.5.2.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28987">28987</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29334">29334</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1621/references">ADV-2008-1621</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42120">interchange-unspecified-dos(42120)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42580">interchange-http-post-dos(42580)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42801">interchange-unspec-dos(42801)</ref>
    </refs>
    <vuln_soft>
      <prod name="interchange" vendor="interchange_development_group">
        <vers num="4.8.0"/>
        <vers num="4.8.1"/>
        <vers num="4.8.2"/>
        <vers num="4.8.3"/>
        <vers num="4.8.4"/>
        <vers num="4.8.5"/>
        <vers num="4.8.6"/>
        <vers num="4.8.7"/>
        <vers num="4.8.8"/>
        <vers num="4.8.9"/>
        <vers num="4.9.3"/>
        <vers num="4.9.4"/>
        <vers num="4.9.5"/>
        <vers num="4.9.6"/>
        <vers num="4.9.8"/>
        <vers num="4.9.9"/>
        <vers num="5.0"/>
        <vers num="5.0.1"/>
        <vers num="5.0.2"/>
        <vers num="5.1"/>
        <vers num="5.1.1"/>
        <vers num="5.2"/>
        <vers num="5.2.0"/>
        <vers num="5.4.1"/>
        <vers num="5.5.1"/>
        <vers num="5.5.2"/>
        <vers num="5.5.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2424" seq="2008-2424" published="2008-05-23" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the 404 error page for the "Standard demo" in Interchange before 5.6.0 and before 5.5.2 has unknown impact and attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://ftp.icdevgroup.org/interchange/5.6/ANNOUNCEMENT-5.6.0.txt">http://ftp.icdevgroup.org/interchange/5.6/ANNOUNCEMENT-5.6.0.txt</ref>
      <ref source="CONFIRM" url="http://ftp.icdevgroup.org/pub/interchange/5.5/ANNOUNCEMENT-5.5.2.txt">http://ftp.icdevgroup.org/pub/interchange/5.5/ANNOUNCEMENT-5.5.2.txt</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1621/references">ADV-2008-1621</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42583">interchange-404-security-bypass(42583)</ref>
    </refs>
    <vuln_soft>
      <prod name="interchange" vendor="icdevgroup">
        <vers num="4.5.6"/>
        <vers num="4.5.7"/>
        <vers num="4.5.8"/>
        <vers num="4.6.0"/>
        <vers num="4.6.1"/>
        <vers num="4.6.2"/>
        <vers num="4.6.4"/>
        <vers num="4.6.5"/>
        <vers num="4.7.6"/>
        <vers num="4.7.7"/>
        <vers num="4.8.2"/>
        <vers num="4.8.3"/>
        <vers num="4.8.4"/>
        <vers num="4.8.5"/>
        <vers num="4.8.6"/>
        <vers num="4.8.7"/>
        <vers num="4.8.9"/>
        <vers num="4.9.1"/>
        <vers num="4.9.2"/>
        <vers num="4.9.4"/>
        <vers num="4.9.5"/>
        <vers num="4.9.8"/>
        <vers num="4.9.9"/>
        <vers num="5.0.0"/>
        <vers num="5.0.1"/>
        <vers num="5.1.0"/>
        <vers num="5.1.1"/>
        <vers num="5.2.0"/>
        <vers num="5.3.2"/>
        <vers num="5.3.3"/>
        <vers num="5.4.0"/>
        <vers num="5.4.1"/>
        <vers num="5.4.2"/>
        <vers num="5.5.1"/>
        <vers num="5.5.2"/>
        <vers num="5.5.3" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2425" seq="2008-2425" published="2008-05-23" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in FicHive 1.0 allows remote attackers to execute arbitrary SQL commands via the letter parameter in a Search action, a different vector than CVE-2008-2416.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42800">fichive-letter-sql-injection(42800)</ref>
    </refs>
    <vuln_soft>
      <prod name="fichive" vendor="fichive">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2426" seq="2008-2426" published="2008-06-02" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple stack-based buffer overflows in Imlib 2 (aka imlib2) 1.4.0 allow user-assisted remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via (1) a PNM image with a crafted header, related to the load function in src/modules/loaders/loader_pnm.c; or (2) a crafted XPM image, related to the load function in src/modules/loader_xpm.c.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html">SUSE-SR:2008:018</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020146">1020146</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1594">DSA-1594</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200806-03.xml">GLSA-200806-03</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:123">MDVSA-2008:123</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492739/100/0/threaded">20080529 Secunia Research: imlib2 PNM and XPM Buffer Overflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29417">29417</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/USN-697-1">USN-697-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1700" adv="1">ADV-2008-1700</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42732">imlib2-pnm-xpm-bo(42732)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00030.html">FEDORA-2008-4842</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00052.html">FEDORA-2008-4871</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00113.html">FEDORA-2008-4950</ref>
    </refs>
    <vuln_soft>
      <prod name="imlib2" vendor="carsten_haitzler">
        <vers num="1.4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2427" seq="2008-2427" published="2008-06-24" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in NConvert 4.92, GFL SDK 2.82, and XnView 1.93.6 on Windows and 1.70 on Linux and FreeBSD allows user-assisted remote attackers to execute arbitrary code via a crafted format keyword in a Sun TAAC file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3956">3956</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020340">1020340</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493505/100/0/threaded">20080620 Secunia Research: XnView, NConvert, and GFL SDK Sun TAAC Buffer Overflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29851">29851</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1896">ADV-2008-1896</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1897">ADV-2008-1897</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5951">5951</ref>
    </refs>
    <vuln_soft>
      <prod name="gfl_sdk" vendor="pagesperso-orange">
        <vers num="2.82"/>
      </prod>
      <prod name="nconvert" vendor="pagesperso-orange">
        <vers num="4.92"/>
      </prod>
      <prod name="xnview" vendor="pagesperso-orange">
        <vers num="1.70"/>
        <vers num="1.93.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2428" seq="2008-2428" published="2008-06-18" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in TorrentTrader 1.08 Classic allow remote attackers to execute arbitrary SQL commands via the (1) email or (2) wantusername parameter to account-signup.php, or the (3) receiver parameter to account-inbox.php in a msg action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?group_id=98584&amp;release_id=545219">http://sourceforge.net/project/shownotes.php?group_id=98584&amp;release_id=545219</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493434/100/0/threaded">20080618 Secunia Research: TorrentTrader Multiple SQL Injection Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29787">29787</ref>
      <ref source="MISC" url="http://www.torrenttrader.org/index.php?showtopic=8879">http://www.torrenttrader.org/index.php?showtopic=8879</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43165">torrenttrader-multiple-sql-injection(43165)</ref>
    </refs>
    <vuln_soft>
      <prod name="torrenttrader_classic" vendor="torrenttrader">
        <vers num="1.08"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2429" seq="2008-2429" published="2008-11-25" modified="2008-11-26" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in Calendarix Basic 0.8.20071118 allow remote attackers to execute arbitrary SQL commands via (1) the catsearch parameter to cal_search.php or (2) the catview parameter to cal_cat.php.  NOTE: vector 1 might overlap CVE-2007-3183.3, and vector 2 might overlap CVE-2005-1865.2.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs/>
    <vuln_soft>
      <prod name="basic" vendor="calendarix">
        <vers num="0.8.20071118"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2430" seq="2008-2430" published="2008-07-07" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Integer overflow in the Open function in modules/demux/wav.c in VLC Media Player 0.8.6h on Windows allows remote attackers to execute arbitrary code via a large fmt chunk in a WAV file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200807-13.xml">GLSA-200807-13</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3976">3976</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493849/100/0/threaded">20080702 Secunia Research: VLC Media Player WAV Processing Integer Overflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30058">30058</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020429">1020429</ref>
      <ref source="CONFIRM" url="http://www.videolan.org/developers/vlc/NEWS">http://www.videolan.org/developers/vlc/NEWS</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1995/references">ADV-2008-1995</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14344">oval:org.mitre.oval:def:14344</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14769">oval:org.mitre.oval:def:14769</ref>
    </refs>
    <vuln_soft>
      <prod name="vlc_media_player" vendor="videolan">
        <vers num="0.8.6h"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2431" seq="2008-2431" published="2008-11-25" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple buffer overflows in Novell iPrint Client before 5.06 allow remote attackers to execute arbitrary code by calling the Novell iPrint ActiveX control (aka ienipp.ocx) with (1) a long third argument to the GetDriverFile method; a long first argument to the (2) GetPrinterURLList or (3) GetPrinterURLList2 method; (4) a long argument to the GetFileList method; a long argument to the (5) GetServerVersion, (6) GetResourceList, or (7) DeleteResource method, related to nipplib.dll; a long uploadPath argument to the (8) UploadPrinterDriver or (9) UploadResource method, related to URIs; (10) a long seventh argument to the UploadResource method; a long string in the (11) second, (12) third, or (13) fourth argument to the GetDriverSettings method, related to the IppGetDriverSettings function in nipplib.dll; or (14) a long eighth argument to the UploadResourceToRMS method.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/30813">30813</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/44616">novell-iprint-getdriverfile-bo(44616)</ref>
    </refs>
    <vuln_soft>
      <prod name="iprint" vendor="novell">
        <vers num="4.26"/>
        <vers num="4.27"/>
        <vers num="4.28"/>
        <vers num="4.30"/>
        <vers num="4.32"/>
        <vers num="4.34"/>
        <vers num="4.36"/>
        <vers num="4.38"/>
        <vers num="5.04" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2432" seq="2008-2432" published="2008-11-25" modified="2008-11-26" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Insecure method vulnerability in the GetFileList method in an unspecified ActiveX control in Novell iPrint Client before 5.06 allows remote attackers to list the image files in an arbitrary directory via a directory name in the argument.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/30813">30813</ref>
    </refs>
    <vuln_soft>
      <prod name="iprint" vendor="novell">
        <vers num="4.26"/>
        <vers num="4.27"/>
        <vers num="4.28"/>
        <vers num="4.30"/>
        <vers num="4.32"/>
        <vers num="4.34"/>
        <vers num="4.36"/>
        <vers num="4.38"/>
        <vers num="5.04" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2433" seq="2008-2433" published="2008-08-27" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The web management console in Trend Micro OfficeScan 7.0 through 8.0, Worry-Free Business Security 5.0, and Client/Server/Messaging Suite 3.5 and 3.6 creates a random session token based only on the login time, which makes it easier for remote attackers to hijack sessions via brute-force attacks.  NOTE: this can be leveraged for code execution through an unspecified "manipulation of the configuration."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/4191">4191</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/495670/100/0/threaded">20080822 Secunia Research: Trend Micro Products Web Management Authentication Bypass</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30792">30792</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020732">1020732</ref>
      <ref source="CONFIRM" url="http://www.trendmicro.com/ftp/documentation/readme/OSCE_8.0_SP1_Win_EN_CriticalPatch_B2402_readme.txt">http://www.trendmicro.com/ftp/documentation/readme/OSCE_8.0_SP1_Win_EN_CriticalPatch_B2402_readme.txt</ref>
      <ref source="CONFIRM" url="http://www.trendmicro.com/ftp/documentation/readme/Readme_WFBS5%200_EN_CriticalPatch1404.txt">http://www.trendmicro.com/ftp/documentation/readme/Readme_WFBS5%200_EN_CriticalPatch1404.txt</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2421">ADV-2008-2421</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/44597">trend-micro-token-security-bypass(44597)</ref>
    </refs>
    <vuln_soft>
      <prod name="client_server_messaging_suite" vendor="trend_micro">
        <vers num="3.5"/>
        <vers num="3.6"/>
      </prod>
      <prod name="officescan" vendor="trend_micro">
        <vers num="7.0"/>
        <vers num="7.3"/>
        <vers num="8.0"/>
      </prod>
      <prod name="worry_free_business_security" vendor="trend_micro">
        <vers num="5.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2434" seq="2008-2434" published="2008-12-23" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The Trend Micro HouseCall ActiveX control 6.51.0.1028 and 6.6.0.1278 in Housecall_ActiveX.dll allows remote attackers to download an arbitrary library file onto a client system via a "custom update server" argument.  NOTE: this can be leveraged for code execution by writing to a Startup folder.</descript>
    </desc>
    <sols>
      <sol source="nvd">Per http://esupport.trendmicro.com/support/viewxml.do?ContentID=EN-1038646&amp;id=EN-1038646

To resolve the issue:		

Request the HouseCall 6.6 Hot Fix Build 1285 file from Trend Micro Technical Support.</sol>
    </sols>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://esupport.trendmicro.com/support/viewxml.do?ContentID=EN-1038646&amp;id=EN-1038646" adv="1">http://esupport.trendmicro.com/support/viewxml.do?ContentID=EN-1038646&amp;id=EN-1038646</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/4802">4802</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/541025">VU#541025</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/499495/100/0/threaded">20081222 Secunia Research: Trend Micro HouseCall ActiveX Control Arbitrary Code Execution</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/32965">32965</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/3464">ADV-2008-3464</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/47524">housecall-library-code-execution(47524)</ref>
    </refs>
    <vuln_soft>
      <prod name="housecall" vendor="trend_micro">
        <vers num="6.6" edition=":server"/>
        <vers num="6.6.0.1278"/>
        <vers num="6.51.0.1028"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2435" seq="2008-2435" published="2008-12-23" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Use-after-free vulnerability in the Trend Micro HouseCall ActiveX control 6.51.0.1028 and 6.6.0.1278 in Housecall_ActiveX.dll allows remote attackers to execute arbitrary code via a crafted notifyOnLoadNative callback function.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://esupport.trendmicro.com/support/viewxml.do?ContentID=EN-1038646&amp;id=EN-1038646" adv="1">http://esupport.trendmicro.com/support/viewxml.do?ContentID=EN-1038646&amp;id=EN-1038646</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1021481">1021481</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/702628">VU#702628</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/499478/100/0/threaded">20081221 Secunia Research: Trend Micro HouseCall "notifyOnLoadNative()" Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/32950">32950</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/3464">ADV-2008-3464</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/47523">housecall-notifyonloadnative-code-execution(47523)</ref>
    </refs>
    <vuln_soft>
      <prod name="housecall" vendor="trend_micro">
        <vers num="6.6.0.1278"/>
        <vers num="6.51.0.1028"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2436" seq="2008-2436" published="2008-09-05" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple heap-based buffer overflows in the IppCreateServerRef function in nipplib.dll in Novell iPrint Client 4.x before 4.38 and 5.x before 5.08 allow remote attackers to execute arbitrary code via a long argument to the (1) GetPrinterURLList, (2) GetPrinterURLList2, or (3) GetFileList2 function in the Novell iPrint ActiveX control in ienipp.ocx.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/4228">4228</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/495940/100/0/threaded">20080903 Secunia Research: Novell iPrint Client nipplib.dll "IppCreateServerRef()" Buffer Overflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30986">30986</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020806">1020806</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2481">ADV-2008-2481</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/44853">novell-iprint-ippcreateserverref-bo(44853)</ref>
    </refs>
    <vuln_soft>
      <prod name="iprint_client" vendor="novell">
        <vers num="4.26" edition=":windows"/>
        <vers num="4.32" edition=":windows"/>
        <vers num="4.35" edition=":windows"/>
        <vers num="4.36" edition=":windows"/>
        <vers num="5.06" edition=":vista"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2437" seq="2008-2437" published="2008-09-16" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in cgiRecvFile.exe in Trend Micro OfficeScan 7.3 patch 4 build 1362 and other builds, OfficeScan 8.0 and 8.0 SP1, and Client Server Messaging Security 3.6 allows remote attackers to execute arbitrary code via an HTTP request containing a long ComputerName parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/4263">4263</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/496281/100/0/threaded">20080912 Secunia Research: Trend Micro OfficeScan "cgiRecvFile.exe" Buffer Overflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/31139" patch="1">31139</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020860">1020860</ref>
      <ref source="CONFIRM" url="http://www.trendmicro.com/ftp/documentation/readme/CSM_3.6_OSCE_7.6_Win_EN_CriticalPatch_B1195_readme.txt">http://www.trendmicro.com/ftp/documentation/readme/CSM_3.6_OSCE_7.6_Win_EN_CriticalPatch_B1195_readme.txt</ref>
      <ref source="CONFIRM" url="http://www.trendmicro.com/ftp/documentation/readme/OSCE_7.3_Win_EN_CriticalPatch_B1367_readme.txt">http://www.trendmicro.com/ftp/documentation/readme/OSCE_7.3_Win_EN_CriticalPatch_B1367_readme.txt</ref>
      <ref source="CONFIRM" url="http://www.trendmicro.com/ftp/documentation/readme/OSCE_8.0_SP1_Patch1_Win_EN_CriticalPatch_B3060_readme.txt">http://www.trendmicro.com/ftp/documentation/readme/OSCE_8.0_SP1_Patch1_Win_EN_CriticalPatch_B3060_readme.txt</ref>
      <ref source="CONFIRM" url="http://www.trendmicro.com/ftp/documentation/readme/OSCE_8.0_SP1_Win_EN_CriticalPatch_B2424_readme.txt">http://www.trendmicro.com/ftp/documentation/readme/OSCE_8.0_SP1_Win_EN_CriticalPatch_B2424_readme.txt</ref>
      <ref source="CONFIRM" url="http://www.trendmicro.com/ftp/documentation/readme/OSCE_8.0_Win_EN_CriticalPatch_B1361_readme.txt">http://www.trendmicro.com/ftp/documentation/readme/OSCE_8.0_Win_EN_CriticalPatch_B1361_readme.txt</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2555">ADV-2008-2555</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/45072">trendmicro-cgirecvfile-bo(45072)</ref>
    </refs>
    <vuln_soft>
      <prod name="client-server-messaging_security" vendor="trend_micro">
        <vers num="2.0"/>
        <vers num="3.0"/>
        <vers num="3.5"/>
        <vers num="3.6"/>
      </prod>
      <prod name="officescan" vendor="trend_micro">
        <vers num="7.0"/>
        <vers num="7.3" edition="patch_4"/>
        <vers num="8.0" edition="sp1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2438" seq="2008-2438" published="2009-04-28" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Integer overflow in ovalarmsrv.exe in HP OpenView Network Node Manager (OV NNM) 7.01, 7.51, and 7.53 allows remote attackers to execute arbitrary code via a crafted command to TCP port 2954, which triggers a heap-based buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://www.securityfocus.com/archive/1/503024">HPSBMA02424</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/503039/100/0/threaded">20090428 Secunia Research: HP OpenView Network Node Manager "ovalarmsrv" Integer Overflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/34738" patch="1">34738</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/1187" adv="1">ADV-2009-1187</ref>
    </refs>
    <vuln_soft>
      <prod name="openview_network_node_manager" vendor="hp">
        <vers num="7.01"/>
        <vers num="7.51"/>
        <vers num="7.53"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2439" seq="2008-2439" published="2008-10-03" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in the UpdateAgent function in TmListen.exe in the OfficeScanNT Listener service in the client in Trend Micro OfficeScan 7.3 Patch 4 build 1367 and other builds before 1372, OfficeScan 8.0 SP1 before build 1222, OfficeScan 8.0 SP1 Patch 1 before build 3087, and Worry-Free Business Security 5.0 before build 1220 allows remote attackers to read arbitrary files via directory traversal sequences in an HTTP request.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/496970/100/0/threaded">20081003 Secunia Research: Trend Micro OfficeScan Directory Traversal Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/31531">31531</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020975">1020975</ref>
      <ref source="CONFIRM" url="http://www.trendmicro.com/ftp/documentation/readme/OSCE_7.3_Win_EN_CriticalPatch_B1372_Readme.txt" patch="1">http://www.trendmicro.com/ftp/documentation/readme/OSCE_7.3_Win_EN_CriticalPatch_B1372_Readme.txt</ref>
      <ref source="CONFIRM" url="http://www.trendmicro.com/ftp/documentation/readme/OSCE_8.0_SP1_Win_EN_CriticalPatch_B2439_Readme.txt" patch="1">http://www.trendmicro.com/ftp/documentation/readme/OSCE_8.0_SP1_Win_EN_CriticalPatch_B2439_Readme.txt</ref>
      <ref source="CONFIRM" url="http://www.trendmicro.com/ftp/documentation/readme/OSCE8.0_SP1_Patch1_CriticalPatch_3087_Readme.txt" patch="1">http://www.trendmicro.com/ftp/documentation/readme/OSCE8.0_SP1_Patch1_CriticalPatch_3087_Readme.txt</ref>
      <ref source="CONFIRM" url="http://www.trendmicro.com/ftp/documentation/readme/Readme_WFBS5.0_EN_CriticalPatch1414.txt" patch="1">http://www.trendmicro.com/ftp/documentation/readme/Readme_WFBS5.0_EN_CriticalPatch1414.txt</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2711">ADV-2008-2711</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2712">ADV-2008-2712</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/45597">trendmicro-tmlisten-directory-traversal(45597)</ref>
    </refs>
    <vuln_soft>
      <prod name="officescan" vendor="trend_micro">
        <vers num="7.3"/>
        <vers num="8.0" edition="sp1"/>
        <vers num="8.0" edition="sp1_patch1"/>
      </prod>
      <prod name="worry_free_business_security" vendor="trend_micro">
        <vers num="5.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2441" seq="2008-2441" published="2008-09-04" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cisco Secure ACS 3.x before 3.3(4) Build 12 patch 7, 4.0.x, 4.1.x before 4.1(4) Build 13 Patch 11, and 4.2.x before 4.2(0) Build 124 Patch 4 does not properly handle an EAP Response packet in which the value of the length field exceeds the actual packet length, which allows remote authenticated users to cause a denial of service (CSRadius and CSAuth service crash) or possibly execute arbitrary code via a crafted RADIUS (1) EAP-Response/Identity, (2) EAP-Response/MD5, or (3) EAP-Response/TLS Message Attribute packet.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/4216">4216</ref>
      <ref source="CISCO" url="http://www.cisco.com/warp/public/707/cisco-sr-20080903-csacs.shtml">20080903 Cisco Security Response: Cisco Secure ACS Denial Of Service Vulnerability</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/495937/100/0/threaded">20080903 Cisco Secure ACS EAP Parsing Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30997">30997</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020814">1020814</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/44871">cisco-sacs-eap-dos(44871)</ref>
    </refs>
    <vuln_soft>
      <prod name="secure_acs" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="secure_access_control_server" vendor="cisco">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2443" seq="2008-2443" published="2008-05-27" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in dpage.php in The Real Estate Script allows remote attackers to execute arbitrary SQL commands via the docID parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29200">29200</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1524/references">ADV-2008-1524</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42399">therealestatescript-docid-sql-injection(42399)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5610">5610</ref>
    </refs>
    <vuln_soft>
      <prod name="the_real_estate_script" vendor="therealestatescript">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2444" seq="2008-2444" published="2008-05-27" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in userreg.php in CaLogic Calendars 1.2.2 allows remote attackers to execute arbitrary SQL commands via the langsel parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29193">29193</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42391">calogic-calendars-userreg-sql-injection(42391)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5607">5607</ref>
    </refs>
    <vuln_soft>
      <prod name="calogic_calendars" vendor="calogic">
        <vers num="1.2.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2445" seq="2008-2445" published="2008-05-27" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in profile.php in Web Group Communication Center (WGCC) 1.0.3 PreRelease 1 and earlier allows remote attackers to inject arbitrary web script or HTML via the userid parameter in a show action.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29188">29188</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42383">wgcc-profile-xss(42383)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5606">5606</ref>
    </refs>
    <vuln_soft>
      <prod name="web_group_communication_center" vendor="wgcc">
        <vers num="1.0.3" edition="prerelease1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2446" seq="2008-2446" published="2008-05-27" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in Web Group Communication Center (WGCC) 1.0.3 PreRelease 1 and earlier allow remote authenticated users to execute arbitrary SQL commands via the (1) userid parameter to (a) profile.php in a "show moreinfo" action; the (2) bildid parameter to (b) picturegallery.php in a shownext action; the (3) id parameter to (c) filebase.php in a freigeben action, (d) schedule.php in a del action, and (e) profile.php in an observe action; and the (4) pmid parameter in a delete action and (5) folderid parameter in a showfolder action to (f) message.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29188">29188</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42385">wgcc-multiple-sql-injection(42385)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5606">5606</ref>
    </refs>
    <vuln_soft>
      <prod name="web_group_communication_center" vendor="wgcc">
        <vers num="1.0.3_prerelease1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2447" seq="2008-2447" published="2008-05-27" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in products.php in the Mytipper ZoGo-shop plugin 1.15.5 and 1.16 Beta 13 for e107 allows remote attackers to execute arbitrary SQL commands via the cat parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29185">29185</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42384">zogoshop-products-sql-injection(42384)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5605">5605</ref>
    </refs>
    <vuln_soft>
      <prod name="zogo_shop" vendor="mytipper">
        <vers num="1.15.5"/>
        <vers num="1.16" edition="beta13"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2448" seq="2008-2448" published="2008-05-27" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in Meto Forum 1.1 allow remote attackers to execute arbitrary SQL commands via the (1) id parameter to (a) admin/duzenle.asp and (b) admin_oku.asp; the (2) kid parameter to (c) kategori.asp and (d) admin_kategori.asp; and unspecified parameters to (e) uye.asp and (f) oku.asp.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29189">29189</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29192">29192</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42390">metoforum-multiple-sql-injection(42390)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42398">metoforum-kategori-sql-injection(42398)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5608">5608</ref>
    </refs>
    <vuln_soft>
      <prod name="meto_forum" vendor="aspindir">
        <vers num="1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2449" seq="2008-2449" published="2008-05-27" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in Isaac McGowan phpInstantGallery 2.0 allow remote attackers to inject arbitrary web script or HTML via the (1) gallery parameter to (a) index.php and (b) image.php, and the (2) imgnum parameter to image.php.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29152">29152</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42374">phpinstantgallery-index-image-xss(42374)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpinstantgallery" vendor="ikemcg">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2450" seq="2008-2450" published="2008-05-27" modified="2019-03-12" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in the Statistics (aka ke_stats) extension 0.1.2 and earlier for TYPO3 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://typo3.org/teams/security/security-bulletins/typo3-20080513-4">http://typo3.org/teams/security/security-bulletins/typo3-20080513-4</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42366" adv="1">kestats-unspecified-xss(42366)</ref>
    </refs>
    <vuln_soft>
      <prod name="statistics" vendor="inmedias">
        <vers num="0.0.1" edition="alpha:~~~typo3~~"/>
        <vers num="0.1.0" edition="beta:~~~typo3~~"/>
        <vers num="0.1.1" edition="beta:~~~typo3~~"/>
        <vers num="0.1.2" edition="beta:~~~typo3~~"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2451" seq="2008-2451" published="2008-05-27" modified="2019-03-08" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in the Statistics (aka ke_stats) extension 0.1.2 and earlier for TYPO3 allow remote attackers to execute arbitrary SQL commands via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://typo3.org/teams/security/security-bulletins/typo3-20080513-4">http://typo3.org/teams/security/security-bulletins/typo3-20080513-4</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42368" adv="1">kestats-unspecified-sql-injection(42368)</ref>
    </refs>
    <vuln_soft>
      <prod name="statistics" vendor="inmedias">
        <vers num="0.1.2" prev="1" edition=":~~~typo3~~"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2452" seq="2008-2452" published="2008-05-27" modified="2019-03-12" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the Questionaire (aka pbsurvey) extension 1.2.0 and earlier for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://typo3.org/teams/security/security-bulletins/typo3-20080513-2">http://typo3.org/teams/security/security-bulletins/typo3-20080513-2</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42365" adv="1">pbsurvey-unspecified-xss(42365)</ref>
    </refs>
    <vuln_soft>
      <prod name="questionaire" vendor="inmedias">
        <vers num="1.2.0" prev="1" edition=":~~~typo3~~"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2453" seq="2008-2453" published="2008-05-27" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in PHP Classifieds Script allow remote attackers to execute arbitrary SQL commands via the fatherID parameter to (1) browse.php and (2) search.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29169">29169</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42380">phpclassifiedsscript-fatherid-sql-injection(42380)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5599">5599</ref>
    </refs>
    <vuln_soft>
      <prod name="php_classifieds_script" vendor="phpclassifiedsscript">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2454" seq="2008-2454" published="2008-05-27" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the xsstream-dm (com_xsstream-dm) component 0.01 Beta for Joomla! allows remote attackers to execute arbitrary SQL commands via the movie parameter to index.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491943/100/0/threaded">20080511 Joomla Component xsstream-dm 0.01 Beta SQL Injection</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29144">29144</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42323">xsstreamdm-movie-sql-injection(42323)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5587">5587</ref>
    </refs>
    <vuln_soft>
      <prod name="com_xsstream-dm" vendor="joomla">
        <vers num="0.01_beta"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2455" seq="2008-2455" published="2008-05-27" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in comment.php in the MacGuru BLOG Engine plugin 2.2 for e107 allows remote attackers to execute arbitrary SQL commands via the rid parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29181">29181</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42386">blogengine-comment-sql-injection(42386)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5604">5604</ref>
    </refs>
    <vuln_soft>
      <prod name="e107_blog_engine" vendor="e107coders">
        <vers num="2.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2456" seq="2008-2456" published="2008-05-27" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in ComicShout 2.5 and earlier allows remote attackers to execute arbitrary SQL commands via the comic_id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.comicshout.com/">http://www.comicshout.com/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29301">29301</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1594/references">ADV-2008-1594</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42547">comicshout-index-sql-injection(42547)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5658">5658</ref>
    </refs>
    <vuln_soft>
      <prod name="comicshout" vendor="comicshout">
        <vers num="2.5" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2457" seq="2008-2457" published="2008-05-27" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in jokes_category.php in PHP-Jokesite 2.0 allows remote attackers to execute arbitrary SQL commands via the cat_id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29308">29308</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1592/references">ADV-2008-1592</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42554">phpjokesite-jokescategory-sql-injection(42554)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5660">5660</ref>
    </refs>
    <vuln_soft>
      <prod name="php-jokesite" vendor="bitmixsoft">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2458" seq="2008-2458" published="2008-05-27" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php in Starsgames Control Panel 4.6.2 and earlier allows remote attackers to inject arbitrary web script or HTML via the st parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492264/100/0/threaded">20080520 Starsgames Control Panel &lt;= 4.6.2 Remote XSS Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29295">29295</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42544">starsgamescontrolpanel-index-xss(42544)</ref>
    </refs>
    <vuln_soft>
      <prod name="starsgames_control_panel" vendor="4shared">
        <vers num="4.6.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2459" seq="2008-2459" published="2008-05-27" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in page.php in EntertainmentScript 1.4.0 allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the page parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29306">29306</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42540">entertainmentscript-page-file-include(42540)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5655">5655</ref>
    </refs>
    <vuln_soft>
      <prod name="entertainmentscript" vendor="entertainmentscript">
        <vers num="1.4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2460" seq="2008-2460" published="2008-05-27" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in faq.php in vBulletin 3.7.0 Gold allows remote attackers to execute arbitrary SQL commands via the q parameter in a search action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492290/100/0/threaded">20080520 Vbulletin 3.7.0 Gold >> Sql injection on faq.php</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29293">29293</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42541">vbulletin-faq-sql-injection(42541)</ref>
    </refs>
    <vuln_soft>
      <prod name="vbulletin" vendor="vbulletin">
        <vers num="3.7.0" edition="gold"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2461" seq="2008-2461" published="2008-05-27" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in Netious CMS 0.4 allows remote attackers to execute arbitrary SQL commands via the pageid parameter, a different vector than CVE-2006-4047.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29319">29319</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1591/references">ADV-2008-1591</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42726">netiouscms-pageid-sql-injection(42726)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5661">5661</ref>
    </refs>
    <vuln_soft>
      <prod name="netious_cms" vendor="netious">
        <vers num="0.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2462" seq="2008-2462" published="2008-06-30" modified="2018-10-31" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the viewfile documentation command in Caucho Resin before 3.0.25, and 3.1.x before 3.1.4, allows remote attackers to inject arbitrary web script or HTML via the file parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.caucho.com/resin/changes/changes-31.xtp#3.1.4%20-%20Dec%205,%202007" adv="1">http://www.caucho.com/resin/changes/changes-31.xtp#3.1.4%20-%20Dec%205,%202007</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/305208" adv="1">VU#305208</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29948" adv="1">29948</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020372" adv="1">1020372</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1930/references" adv="1">ADV-2008-1930</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43367" adv="1">caucho-resin-file-xss(43367)</ref>
    </refs>
    <vuln_soft>
      <prod name="resin" vendor="caucho">
        <vers num="2.0.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
        <vers num="2.0.4"/>
        <vers num="2.0.5"/>
        <vers num="2.1.0"/>
        <vers num="2.1.1"/>
        <vers num="2.1.2"/>
        <vers num="2.1.3"/>
        <vers num="2.1.4"/>
        <vers num="2.1.5"/>
        <vers num="2.1.6"/>
        <vers num="2.1.7"/>
        <vers num="2.1.8"/>
        <vers num="2.1.9"/>
        <vers num="2.1.10"/>
        <vers num="2.1.11"/>
        <vers num="2.1.12"/>
        <vers num="2.1.13"/>
        <vers num="2.1.14"/>
        <vers num="2.1.15"/>
        <vers num="2.1.16"/>
        <vers num="2.1.snap"/>
        <vers num="3.0.0"/>
        <vers num="3.0.1" edition="beta"/>
        <vers num="3.0.2" edition="beta"/>
        <vers num="3.0.3"/>
        <vers num="3.0.4"/>
        <vers num="3.0.5"/>
        <vers num="3.0.6"/>
        <vers num="3.0.7"/>
        <vers num="3.0.8"/>
        <vers num="3.0.9"/>
        <vers num="3.0.10"/>
        <vers num="3.0.11"/>
        <vers num="3.0.12"/>
        <vers num="3.0.13"/>
        <vers num="3.0.14"/>
        <vers num="3.0.15"/>
        <vers num="3.0.16"/>
        <vers num="3.0.17"/>
        <vers num="3.0.18"/>
        <vers num="3.0.19"/>
        <vers num="3.0.20"/>
        <vers num="3.0.21"/>
        <vers num="3.0.22"/>
        <vers num="3.0.23"/>
        <vers num="3.1.0"/>
        <vers num="3.1.1"/>
        <vers num="3.1.2"/>
        <vers num="3.1.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2463" seq="2008-2463" published="2008-07-07" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The Microsoft Office Snapshot Viewer ActiveX control in snapview.ocx 10.0.5529.0, as distributed in the standalone Snapshot Viewer and Microsoft Office Access 2000 through 2003, allows remote attackers to download arbitrary files to a client machine via a crafted HTML document or e-mail message, probably involving use of the SnapshotPath and CompressedPath properties and the PrintSnapshot method. NOTE: this can be leveraged for code execution by writing to a Startup folder.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=121915960406986&amp;w=2">HPSBST02360</ref>
      <ref source="EXPLOIT-DB" url="http://www.exploit-db.com/exploits/6124">6124</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/837785">VU#837785</ref>
      <ref source="CONFIRM" url="http://www.microsoft.com/technet/security/advisory/955179.mspx">http://www.microsoft.com/technet/security/advisory/955179.mspx</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30114">30114</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020433">1020433</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-189A.html">TA08-189A</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-225A.html">TA08-225A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2012/references">ADV-2008-2012</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43613">microsoft-snapshotviewer-code-execution(43613)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6120">oval:org.mitre.oval:def:6120</ref>
    </refs>
    <vuln_soft>
      <prod name="office_snapshot_viewer_activex" vendor="microsoft">
        <vers num="office2000"/>
        <vers num="office_2003"/>
        <vers num="office_xp"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2464" seq="2008-2464" published="2008-09-10" modified="2008-09-11" severity="High" CVSS_version="2.0" CVSS_score="7.1" CVSS_base_score="7.1" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">The mld_input function in sys/netinet6/mld6.c in the kernel in NetBSD 4.0, FreeBSD, and KAME, when INET6 is enabled, allows remote attackers to cause a denial of service (divide-by-zero error and panic) via a malformed ICMPv6 Multicast Listener Discovery (MLD) query with a certain Maximum Response Delay value.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://cert.fi/haavoittuvuudet/2008/advisory-netbsd.html">http://cert.fi/haavoittuvuudet/2008/advisory-netbsd.html</ref>
      <ref source="CONFIRM" url="http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/netinet6/mld6.c">http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/netinet6/mld6.c</ref>
      <ref source="CONFIRM" url="http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/netinet6/mld6.c.diff?r1=1.46&amp;r2=1.47&amp;f=h">http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/netinet6/mld6.c.diff?r1=1.46&amp;r2=1.47&amp;f=h</ref>
      <ref source="NETBSD" url="http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-011.txt.asc">NetBSD-SA2008-011</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020822">1020822</ref>
      <ref source="CONFIRM" url="http://www.freebsd.org/cgi/cvsweb.cgi/src/sys/netinet6/mld6.c">http://www.freebsd.org/cgi/cvsweb.cgi/src/sys/netinet6/mld6.c</ref>
      <ref source="CONFIRM" url="http://www.freebsd.org/cgi/cvsweb.cgi/src/sys/netinet6/mld6.c.diff?r1=1.34;r2=1.35;f=h">http://www.freebsd.org/cgi/cvsweb.cgi/src/sys/netinet6/mld6.c.diff?r1=1.34;r2=1.35;f=h</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/817940">VU#817940</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/31026">31026</ref>
    </refs>
    <vuln_soft>
      <prod name="kame" vendor="kame">
        <vers num=""/>
      </prod>
      <prod name="freebsd" vendor="freebsd">
        <vers num=""/>
      </prod>
      <prod name="netbsd" vendor="netbsd">
        <vers num="4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2468" seq="2008-2468" published="2008-09-18" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple buffer overflows in the QIP Server Service (aka qipsrvr.exe) in LANDesk Management Suite, Security Suite, and Server Manager 8.8 and earlier allow remote attackers to execute arbitrary code via a crafted heal request, related to the StringToMap and StringSize arguments.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://community.landesk.com/support/docs/DOC-3276" patch="1">http://community.landesk.com/support/docs/DOC-3276</ref>
      <ref source="MISC" url="http://dvlabs.tippingpoint.com/advisory/TPTI-08-06">http://dvlabs.tippingpoint.com/advisory/TPTI-08-06</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/4269">4269</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/538011">VU#538011</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/496369/100/0/threaded">20080915 TPTI-08-06: Landesk QIP Server Service Heal Packet Buffer Overflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/31193" patch="1">31193</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020888">1020888</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2588">ADV-2008-2588</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/45154">landesk-qip-bo(45154)</ref>
    </refs>
    <vuln_soft>
      <prod name="landesk_management_suite" vendor="landesk">
        <vers num="8.7"/>
        <vers num="8.8" prev="1"/>
      </prod>
      <prod name="landesk_security_suite" vendor="landesk">
        <vers num="8.7"/>
        <vers num="8.8" prev="1"/>
      </prod>
      <prod name="landesk_server_manager" vendor="landesk">
        <vers num="8.7"/>
        <vers num="8.8" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2469" seq="2008-2469" published="2008-10-23" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in the SPF_dns_resolv_lookup function in Spf_dns_resolv.c in libspf2 before 1.2.8 allows remote attackers to execute arbitrary code via a long DNS TXT record with a modified length field.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.gentoo.org/show_bug.cgi?format=multiple&amp;id=242254">http://bugs.gentoo.org/show_bug.cgi?format=multiple&amp;id=242254</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200810-03.xml">GLSA-200810-03</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/4487">4487</ref>
      <ref source="CONFIRM" url="http://up2date.astaro.com/2008/11/up2date_7305_released.html">http://up2date.astaro.com/2008/11/up2date_7305_released.html</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1659">DSA-1659</ref>
      <ref source="MISC" url="http://www.doxpara.com/?p=1263">http://www.doxpara.com/?p=1263</ref>
      <ref source="MISC" url="http://www.doxpara.com/?page_id=1256">http://www.doxpara.com/?page_id=1256</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/183657">VU#183657</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/31881" patch="1">31881</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2896">ADV-2008-2896</ref>
      <ref source="CONFIRM" url="https://answers.launchpad.net/ubuntu/gutsy/+source/libspf2/1.2.5.dfsg-4ubuntu0.7.10.1">https://answers.launchpad.net/ubuntu/gutsy/+source/libspf2/1.2.5.dfsg-4ubuntu0.7.10.1</ref>
      <ref source="CONFIRM" url="https://bugs.launchpad.net/ubuntu/feisty/+source/libspf2/+bug/271025">https://bugs.launchpad.net/ubuntu/feisty/+source/libspf2/+bug/271025</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/46055">libspf2-dnstxtrecord-bo(46055)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/6805">6805</ref>
    </refs>
    <vuln_soft>
      <prod name="libspf2" vendor="libspf">
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.4"/>
        <vers num="1.2.1"/>
        <vers num="1.2.3"/>
        <vers num="1.2.4"/>
        <vers num="1.2.5"/>
        <vers num="1.2.6"/>
        <vers num="1.2.7" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2470" seq="2008-2470" published="2008-09-18" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The InstallShield Update Service Agent ActiveX control in isusweb.dll allows remote attackers to cause a denial of service (memory corruption and browser crash) and possibly execute arbitrary code via a call to ExecuteRemote with a URL that results in a 404 error response.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://support.installshield.com/kb/view.asp?articleid=Q113020" patch="1">http://support.installshield.com/kb/view.asp?articleid=Q113020</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/630017">VU#630017</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/31235">31235</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2625">ADV-2008-2625</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/45248">installshield-updateservice-bo(45248)</ref>
    </refs>
    <vuln_soft>
      <prod name="flexnet_connect" vendor="macrovision">
        <vers num="6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2474" seq="2008-2474" published="2008-09-29" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in x87 before 3.5.5 in ABB Process Communication Unit 400 (PCU400) 4.4 through 4.6 allows remote attackers to execute arbitrary code via a crafted packet using the (1) IEC60870-5-101 or (2) IEC60870-5-104 communication protocol to the X87 web interface.</descript>
    </desc>
    <sols>
      <sol source="nvd">This issue is corrected in version 3.5.5 of the x87 executable. To obtain a patch or upgrade software please contact your vendor. The x87 executable is considered obsolete in newer versions of the PCU 400 and should be replaced
by the newer x88 or x89 executable where applicable.

Link to contact information: http://www.abb.com/industries/db0003db004333/c12573e7003305cbc1257074003d0702.aspx?productLanguage=us&amp;country=US&amp;tabKey=Contacts</sol>
    </sols>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/4320">4320</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/343971">VU#343971</ref>
      <ref source="CONFIRM" url="http://www.kb.cert.org/vuls/id/CTAR-7JTNRX">http://www.kb.cert.org/vuls/id/CTAR-7JTNRX</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/496739/100/0/threaded">20080925 C4 Security Advisory - ABB PCU400 4.4-4.6 Remote Buffer Overflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/31391">31391</ref>
    </refs>
    <vuln_soft>
      <prod name="pcu400" vendor="abb">
        <vers num="4.4"/>
        <vers num="4.5"/>
        <vers num="4.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2475" seq="2008-2475" published="2009-06-09" modified="2009-07-09" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">eBay Enhanced Picture Uploader ActiveX control (EPUWALcontrol.dll) before 1.0.27 allows remote attackers to execute arbitrary commands via the PictureUrls property.</descript>
    </desc>
    <sols>
      <sol source="nvd">Per http://www.kb.cert.org/vuls/id/983731

This update is addressed in version 1.0.27 of the Ebay Enhanced Picture Control software.</sol>
    </sols>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://pages.ebay.com/securitycenter/activex/index.html" adv="1">http://pages.ebay.com/securitycenter/activex/index.html</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/983731" patch="1">VU#983731</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/35248">35248</ref>
    </refs>
    <vuln_soft>
      <prod name="enhanced_picture_uploader_activex_control" vendor="ebay">
        <vers num="1.0.26" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2476" seq="2008-2476" published="2008-10-03" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The IPv6 Neighbor Discovery Protocol (NDP) implementation in (1) FreeBSD 6.3 through 7.1, (2) OpenBSD 4.2 and 4.3, (3) NetBSD, (4) Force10 FTOS before E7.7.1.1, (5) Juniper JUNOS, and (6) Wind River VxWorks 5.x through 6.4 does not validate the origin of Neighbor Discovery messages, which allows remote attackers to cause a denial of service (loss of connectivity) or read private network traffic via a spoofed message that modifies the Forward Information Base (FIB).</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="NETBSD" url="ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-013.txt.asc">NetBSD-SA2008-013</ref>
      <ref source="FREEBSD" url="http://security.freebsd.org/advisories/FreeBSD-SA-08:10.nd6.asc" adv="1">FreeBSD-SA-08:10</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020968">1020968</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3467">http://support.apple.com/kb/HT3467</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/472363">VU#472363</ref>
      <ref source="CONFIRM" url="http://www.kb.cert.org/vuls/id/MAPG-7H2RY7">http://www.kb.cert.org/vuls/id/MAPG-7H2RY7</ref>
      <ref source="CONFIRM" url="http://www.kb.cert.org/vuls/id/MAPG-7H2S68">http://www.kb.cert.org/vuls/id/MAPG-7H2S68</ref>
      <ref source="OPENBSD" url="http://www.openbsd.org/errata42.html#015_ndp">[4.2] 015: SECURITY FIX: October 2, 2008</ref>
      <ref source="OPENBSD" url="http://www.openbsd.org/errata43.html#006_ndp">[4.3] 006: SECURITY FIX: October 2, 2008</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/31529">31529</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1021109">1021109</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1021132">1021132</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2750">ADV-2008-2750</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2751">ADV-2008-2751</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2752">ADV-2008-2752</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/0633">ADV-2009-0633</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/45601">multiple-vendors-ndp-dos(45601)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5670">oval:org.mitre.oval:def:5670</ref>
      <ref source="MISC" url="https://www.juniper.net/alerts/viewalert.jsp?actionBtn=Search&amp;txtAlertNumber=PSN-2008-09-036&amp;viewMode=view">https://www.juniper.net/alerts/viewalert.jsp?actionBtn=Search&amp;txtAlertNumber=PSN-2008-09-036&amp;viewMode=view</ref>
    </refs>
    <vuln_soft>
      <prod name="ftos" vendor="force10">
        <vers num=""/>
      </prod>
      <prod name="freebsd" vendor="freebsd">
        <vers num="6.3"/>
        <vers num="7.1"/>
      </prod>
      <prod name="jnos" vendor="juniper">
        <vers num=""/>
      </prod>
      <prod name="netbsd" vendor="netbsd">
        <vers num=""/>
      </prod>
      <prod name="openbsd" vendor="openbsd">
        <vers num="4.2"/>
        <vers num="4.3"/>
      </prod>
      <prod name="vxworks" vendor="windriver">
        <vers num="5"/>
        <vers num="5.5"/>
        <vers num="6.4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2477" seq="2008-2477" published="2008-05-28" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in MxBB (aka MX-System) Portal 2.7.3 allows remote attackers to execute arbitrary SQL commands via the page parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29307">29307</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1593/references">ADV-2008-1593</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42551">mxsystem-index-sql-injection(42551)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5659">5659</ref>
    </refs>
    <vuln_soft>
      <prod name="mxbb_portal" vendor="mx-system">
        <vers num="2.7.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2478" seq="2008-2478" published="2008-05-28" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="8.5" CVSS_base_score="8.5" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="6.8" CVSS_vector="(AV:N/AC:M/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">** DISPUTED **  scripts/wwwacct in cPanel 11.18.6 STABLE and earlier and 11.23.1 CURRENT and earlier allows remote authenticated users with reseller privileges to execute arbitrary code via shell metacharacters in the Email address field (aka Email text box).  NOTE: the vendor disputes this, stating "I'm unable to reproduce such an issue on multiple servers running different versions of cPanel."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492223/100/0/threaded">20080518 Cpanel all version >> root access with a reseller account.</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492259/100/0/threaded">20080519 Re: Cpanel all version >> root access with a reseller account.</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29277">29277</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020042">1020042</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42529">cpanel-wwwact-privilege-escalation(42529)</ref>
    </refs>
    <vuln_soft>
      <prod name="cpanel" vendor="cpanel">
        <vers num="11.8.6" prev="1" edition="stable"/>
        <vers num="11.23.1" prev="1" edition="current"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2479" seq="2008-2479" published="2008-05-28" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in phpFix 2.0 allow remote attackers to execute arbitrary SQL commands via the (1) kind parameter to fix/browse.php and the (2) account parameter to auth/00_pass.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492582/100/0/threaded">20080526 phpFix v2 Multiple SQL Injection Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29371">29371</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42636">phpfix-browse-sql-injection(42636)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42637">phpfix-00pass-sql-injection(42637)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpfix" vendor="badongo">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2480" seq="2008-2480" published="2008-05-28" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in plus.php in plusPHP Short URL Multi-User Script 1.6 allows remote attackers to execute arbitrary PHP code via a URL in the _pages_dir parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29357">29357</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1645/references">ADV-2008-1645</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42623">plusphp-plus-file-include(42623)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5672">5672</ref>
    </refs>
    <vuln_soft>
      <prod name="plusphp_short_url_multi-user_script" vendor="plusphp">
        <vers num="1.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2481" seq="2008-2481" published="2008-05-28" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in authentication/phpbb3/phpbb3.functions.php in phpRaider 1.0.7 and 1.0.7a, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the pConfig_auth[phpbb_path] parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://forums.phpraider.com/showthread.php?t=1087#v1_0_7b_-_May_29__2008">http://forums.phpraider.com/showthread.php?t=1087#v1_0_7b_-_May_29__2008</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29356">29356</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1646/references">ADV-2008-1646</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42622">phpraider-phpbb3functions-file-include(42622)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5671">5671</ref>
    </refs>
    <vuln_soft>
      <prod name="phpraider" vendor="phpraider">
        <vers num="1.0.7"/>
        <vers num="1.0.7a"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2482" seq="2008-2482" published="2008-05-28" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in install_mod.php in insanevisions OneCMS 2.5 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the load parameter in a go action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492513/100/0/threaded">20080523 [DSECRG-08-025] Local File Include in OneCMS 2.5</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29374">29374</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1648/references">ADV-2008-1648</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42600">onecms-installmod-file-include(42600)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5669">5669</ref>
    </refs>
    <vuln_soft>
      <prod name="onecms" vendor="insanevisions">
        <vers num="2.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2483" seq="2008-2483" published="2008-05-28" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in index.php in Xomol CMS 1.20071213 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the op parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29359">29359</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1644/references">ADV-2008-1644</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42632">xomolcms-index-file-include(42632)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5673">5673</ref>
    </refs>
    <vuln_soft>
      <prod name="xomol_cms" vendor="xomol">
        <vers num="1.20071213"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2484" seq="2008-2484" published="2008-05-28" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in Xomol CMS 1.20071213, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the email parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29358">29358</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1644/references">ADV-2008-1644</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42631">xomolcms-index-sql-injection(42631)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5673">5673</ref>
    </refs>
    <vuln_soft>
      <prod name="xomol_cms" vendor="xomol">
        <vers num="1.20071213"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2485" seq="2008-2485" published="2008-05-28" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the URL redirection script (inc/url_redirection.inc.php) in PCPIN Chat before 6.11 allows remote attackers to inject arbitrary web script or HTML via unknown vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://community.pcpin.com/?include=700&amp;thread_id=6918">http://community.pcpin.com/?include=700&amp;thread_id=6918</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492563/100/0/threaded">20080524 PCPIN Chat 6: potential XSS vulnerability in URL redirection script</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29363">29363</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42627">pcpinchat-urlredirection-xss(42627)</ref>
    </refs>
    <vuln_soft>
      <prod name="pcpin_chat" vendor="pcpin">
        <vers num="6.11" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2486" seq="2008-2486" published="2008-05-28" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in eMule Plus before 1.2d has unknown impact and attack vectors related to "staticservers.dat processing."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=600155">http://sourceforge.net/project/shownotes.php?release_id=600155</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29361">29361</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1651/references">ADV-2008-1651</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42620">emuleplus-staticservers-unspecified(42620)</ref>
    </refs>
    <vuln_soft>
      <prod name="emule_plus" vendor="emule">
        <vers num="1.2d" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2487" seq="2008-2487" published="2008-05-28" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in MAXSITE 1.10 and earlier allows remote attackers to execute arbitrary SQL commands via the category parameter in a webboard action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1656/references">ADV-2008-1656</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42634">maxsite-index-sql-injection(42634)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5676">5676</ref>
    </refs>
    <vuln_soft>
      <prod name="maxsite" vendor="maxsite">
        <vers num="1.10" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2488" seq="2008-2488" published="2008-05-28" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">admin/userform.php in RoomPHPlanning 1.5 does not require administrative credentials, which allows remote authenticated users to create new admin accounts.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29377">29377</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42629">roomphplanning-userform-security-bypass(42629)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5674">5674</ref>
    </refs>
    <vuln_soft>
      <prod name="roomphplanning" vendor="beaussier">
        <vers num="1.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2489" seq="2008-2489" published="2008-05-28" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the Library for Frontend Plugins (aka sg_zfelib) extension 1.1.512 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified "user input."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://typo3.org/teams/security/security-bulletins/typo3-20080527-2/" patch="1">http://typo3.org/teams/security/security-bulletins/typo3-20080527-2/</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1665/references">ADV-2008-1665</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42625">sqzfelib-unspecified-sql-injection(42625)</ref>
    </refs>
    <vuln_soft>
      <prod name="sg_zfelib" vendor="typo3">
        <vers num="1.1.512" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2490" seq="2008-2490" published="2008-05-28" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the KJ Image Lightbox 2 (aka kj_imagelightbox2) extension 1.4.2 and earlier for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified "user input."</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://typo3.org/teams/security/security-bulletins/typo3-20080527-1/" patch="1">http://typo3.org/teams/security/security-bulletins/typo3-20080527-1/</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1666/references">ADV-2008-1666</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42628">kjimagelightbox2-unspecified-xss(42628)</ref>
    </refs>
    <vuln_soft>
      <prod name="kj_imagelightbox2" vendor="typo3">
        <vers num="1.4.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2491" seq="2008-2491" published="2008-05-28" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in adv_cat.php in AbleSpace 1.0 allows remote attackers to execute arbitrary SQL commands via the cat_id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492576/100/0/threaded">20080525 Ablespace 1.0 'cat_id' Parameter SQL Injection Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29369">29369</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42635">ablespace-advcat-sql-injection(42635)</ref>
    </refs>
    <vuln_soft>
      <prod name="ablespace" vendor="hotscripts">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2492" seq="2008-2492" published="2008-05-28" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in Campus Bulletin Board 3.4 allow remote attackers to execute arbitrary SQL commands via the (1) id parameter to post3/view.asp and the (2) review parameter to post3/book.asp.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492586/100/0/threaded">20080526 Campus Bulletin Board v3.4 Multiple Remote Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29375">29375</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42660">campusbulletinboard-multiple-sql-injection(42660)</ref>
    </refs>
    <vuln_soft>
      <prod name="campus_bulletin_board" vendor="badongo">
        <vers num="3.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2493" seq="2008-2493" published="2008-05-28" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in post3/Book.asp in Campus Bulletin Board 3.4 allows remote attackers to inject arbitrary web script or HTML via the review parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492586/100/0/threaded">20080526 Campus Bulletin Board v3.4 Multiple Remote Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29375">29375</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42661">campusbulletinboard-book-xss(42661)</ref>
    </refs>
    <vuln_soft>
      <prod name="campus_bulletin_board" vendor="badongo">
        <vers num="3.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2494" seq="2008-2494" published="2008-05-28" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php in Zina 1.0 RC3 allows remote attackers to inject arbitrary web script or HTML via the l parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492593/100/0/threaded">20080525 Zina 1.0rc3 Remote Directory Traversal Vulnerability &amp; XSS Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29367">29367</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42642">zina-index-xss(42642)</ref>
    </refs>
    <vuln_soft>
      <prod name="zina" vendor="pancake">
        <vers num="1.0_rc3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2495" seq="2008-2495" published="2008-05-28" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in index.php in Zina 1.0 RC3 allows remote attackers to have an unknown impact via a .. (dot dot) in the p parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492593/100/0/threaded">20080525 Zina 1.0rc3 Remote Directory Traversal Vulnerability &amp; XSS Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29367">29367</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42641">zina-index-file-include(42641)</ref>
    </refs>
    <vuln_soft>
      <prod name="zina" vendor="pancake">
        <vers num="1.0_rc3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2496" seq="2008-2496" published="2008-05-28" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in Quate CMS 0.3.4 allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO to (1) index.php, (2) login.php, and (3) credits.php in admin/, and (4) upgrade/index.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29348">29348</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42603">quate-multiple-xss(42603)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5668">5668</ref>
    </refs>
    <vuln_soft>
      <prod name="quate_cms" vendor="quate">
        <vers num="0.3.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2497" seq="2008-2497" published="2008-05-28" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">CRLF injection vulnerability in Mambo before 4.6.4 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://forum.mambo-foundation.org/showthread.php?t=11799" patch="1">http://forum.mambo-foundation.org/showthread.php?t=11799</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29373" patch="1">29373</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1660/references">ADV-2008-1660</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42645">mambo-unspecified-response-splitting(42645)</ref>
    </refs>
    <vuln_soft>
      <prod name="mambo" vendor="mambo-foundation">
        <vers num="4.6.4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2498" seq="2008-2498" published="2008-05-28" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in index.php in Mambo before 4.6.4, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary SQL commands via the (1) articleid and (2) mcname parameters.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://forum.mambo-foundation.org/showthread.php?t=11799" patch="1">http://forum.mambo-foundation.org/showthread.php?t=11799</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29373" patch="1">29373</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1660/references">ADV-2008-1660</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42644">mambo-index-sql-injection(42644)</ref>
    </refs>
    <vuln_soft>
      <prod name="mambo" vendor="mambo-foundation">
        <vers num="4.6.4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2499" seq="2008-2499" published="2008-05-29" modified="2018-10-31" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the Community Services Multiplexer (aka MUX or StMux.exe) in IBM Lotus Sametime 7.5.1 CF1 and earlier, and 8.x before 8.0.1, allows remote attackers to execute arbitrary code via a crafted URL.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29328" adv="1">29328</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020093" adv="1">1020093</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1595/references" adv="1">ADV-2008-1595</ref>
      <ref source="MISC" url="http://www.zerodayinitiative.com/advisories/ZDI-08-028/" adv="1">http://www.zerodayinitiative.com/advisories/ZDI-08-028/</ref>
      <ref source="CONFIRM" url="http://www-1.ibm.com/support/docview.wss?rs=463&amp;uid=swg21303920" adv="1">http://www-1.ibm.com/support/docview.wss?rs=463&amp;uid=swg21303920</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42575" adv="1">sametime-stmux-bo(42575)</ref>
    </refs>
    <vuln_soft>
      <prod name="lotus_sametime" vendor="ibm">
        <vers num="7.5" prev="1"/>
        <vers num="7.5.1" edition="cf1"/>
        <vers num="8.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2500" seq="2008-2500" published="2008-05-29" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the MOStlyContent Editor (MOStlyCE) component before 3.0 for Mambo allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://forum.mambo-foundation.org/showthread.php?t=11799" patch="1">http://forum.mambo-foundation.org/showthread.php?t=11799</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42749">mostlyce-unspecified-xss(42749)</ref>
    </refs>
    <vuln_soft>
      <prod name="mostlyce" vendor="mambo">
        <vers num="2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2501" seq="2008-2501" published="2008-05-29" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in PHPhotoalbum 0.5 allow remote attackers to execute arbitrary SQL commands via the (1) album parameter to thumbnails.php and the (2) pid parameter to displayimage.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42670">phphotoalbum-multiple-sql-injection(42670)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5683">5683</ref>
    </refs>
    <vuln_soft>
      <prod name="phphotoalbum" vendor="henning_stoverud">
        <vers num="0.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2502" seq="2008-2502" published="2008-05-29" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the web server in eMule X-Ray before 1.4 allows remote attackers to trigger memory corruption via unknown attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=599894">http://sourceforge.net/project/shownotes.php?release_id=599894</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1685/references">ADV-2008-1685</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42686">emule-xray-unspecified-code-execution(42686)</ref>
    </refs>
    <vuln_soft>
      <prod name="x_ray" vendor="emule">
        <vers num="1.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2503" seq="2008-2503" published="2008-05-29" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in Uploadlist in eMule X-Ray before 1.4 has unknown impact and remote attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=599894">http://sourceforge.net/project/shownotes.php?release_id=599894</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1685/references">ADV-2008-1685</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42687">emule-xray-unspecified-bo(42687)</ref>
    </refs>
    <vuln_soft>
      <prod name="emule_x-ray" vendor="sourceforge">
        <vers num="1.2"/>
        <vers num="1.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2504" seq="2008-2504" published="2008-05-29" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in Simpel Side Netbutik 1 through 4 allow remote attackers to execute arbitrary SQL commands via the (1) cat parameter to netbutik.php and the (2) id parameter to product.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29333">29333</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1658">ADV-2008-1658</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42572">netbutik-netbutik-product-sql-injection(42572)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5665">5665</ref>
    </refs>
    <vuln_soft>
      <prod name="netbutik" vendor="simpel_side">
        <vers num="1"/>
        <vers num="2"/>
        <vers num="3"/>
        <vers num="4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2505" seq="2008-2505" published="2008-05-29" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in result.php in Simpel Side Weblosning 1 through 4 allows remote attackers to inject arbitrary web script or HTML via the search parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29332">29332</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42574">weblosning-result-xss(42574)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5664">5664</ref>
    </refs>
    <vuln_soft>
      <prod name="weblosninger" vendor="simpel_side">
        <vers num="1"/>
        <vers num="2"/>
        <vers num="3"/>
        <vers num="4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2506" seq="2008-2506" published="2008-05-29" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in Simpel Side Weblosning 1 through 4 allow remote attackers to execute arbitrary SQL commands via the (1) mainid and (2) id parameters to index2.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29332">29332</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42573">weblosning-index2-sql-injection(42573)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5664">5664</ref>
    </refs>
    <vuln_soft>
      <prod name="weblosning" vendor="simpel_side">
        <vers num="1"/>
        <vers num="2"/>
        <vers num="3"/>
        <vers num="4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2507" seq="2008-2507" published="2008-05-29" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Calcium40.pl in Brown Bear Software Calcium 3.10 and 4.0.4 allows remote attackers to inject arbitrary web script or HTML via the CalendarName parameter in a ShowIt action.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492719/100/0/threaded">20080528 Calcium web calendar: Reflected XSS</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29411">29411</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42704">calcium-calcium40-xss(42704)</ref>
    </refs>
    <vuln_soft>
      <prod name="calcium" vendor="brown_bear_software">
        <vers num="3.10"/>
        <vers num="4.0.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2508" seq="2008-2508" published="2008-05-29" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in news.php in Tr Script News 2.1 allows remote attackers to inject arbitrary web script or HTML via the "nb" parameter in voir mode.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29388">29388</ref>
      <ref source="MISC" url="http://www.z0rlu.ownspace.org/index.php?/archives/91-TR-News-v2.1-xss.html">http://www.z0rlu.ownspace.org/index.php?/archives/91-TR-News-v2.1-xss.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42648">trscriptnews-news-xss(42648)</ref>
    </refs>
    <vuln_soft>
      <prod name="tr_script_news" vendor="tr_script_news">
        <vers num="2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2509" seq="2008-2509" published="2008-05-29" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in pwd.asp in Excuse Online allows remote attackers to execute arbitrary SQL commands via the pID parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.chroot.org/exploits/chroot_uu_002">http://www.chroot.org/exploits/chroot_uu_002</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492580/100/0/threaded">20080526 Excuse Online (pwd) SQL Injection Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29370">29370</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42643">excuseonline-pwd-sql-injection(42643)</ref>
    </refs>
    <vuln_soft>
      <prod name="excuse_online" vendor="excuse_online">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2510" seq="2008-2510" published="2008-05-29" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in wp-uploadfile.php in the Upload File plugin for WordPress allows remote attackers to execute arbitrary SQL commands via the f_id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492555/100/0/threaded">20080524 vuln in WordPress plugin Upload File(UP)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29352">29352</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42659">uploadfile-wpuploadfile-sql-injection(42659)</ref>
    </refs>
    <vuln_soft>
      <prod name="upload_file_plugin" vendor="wordpress">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2511" seq="2008-2511" published="2008-06-02" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in the UmxEventCli.CachedAuditDataList.1 (aka UmxEventCliLib) ActiveX control in UmxEventCli.dll in CA Internet Security Suite 2008 allows remote attackers to create and overwrite arbitrary files via a .. (dot dot) in the argument to the SaveToFile method.  NOTE: this can be leveraged for code execution by writing to a Startup folder.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://retrogod.altervista.org/9sg_CA_poc.html">http://retrogod.altervista.org/9sg_CA_poc.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492679/100/0/threaded">20080528 [NSG_28-5-08] CA Internet Security Suite 2008 (UmxEventCli.dll/SaveToFile()) remote file corruption poc</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020129">1020129</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1696/references">ADV-2008-1696</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42712">internet-security-umxeventcli-file-overwrite(42712)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5682">5682</ref>
    </refs>
    <vuln_soft>
      <prod name="internet_security_suite_plus_2008" vendor="ca">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2512" seq="2008-2512" published="2008-06-02" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in Symantec Backup Exec System Recovery Manager 7.x before 7.0.4 and 8.x before 8.0.2 allows remote attackers to read arbitrary files via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://securityresponse.symantec.com/avcenter/security/Content/2008.05.28c.html" patch="1">http://securityresponse.symantec.com/avcenter/security/Content/2008.05.28c.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29350">29350</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020128">1020128</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1686/references">ADV-2008-1686</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42714">recoverymanager-unspecified-dir-traversal(42714)</ref>
    </refs>
    <vuln_soft>
      <prod name="backupexec_system_recovery" vendor="symantec">
        <vers num="7.0"/>
        <vers num="7.0.1"/>
        <vers num="7.0.2"/>
        <vers num="7.0.3"/>
        <vers num="8.0"/>
        <vers num="8.0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2513" seq="2008-2513" published="2008-06-02" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the kernel in IBM AIX 5.2, 5.3, and 6.1 allows local users to execute arbitrary code in kernel mode via unknown attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://aix.software.ibm.com/aix/efixes/security/unix_advisory.asc">http://aix.software.ibm.com/aix/efixes/security/unix_advisory.asc</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020083">1020083</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ19911" patch="1">IZ19911</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ21481" patch="1">IZ21481</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ22368">IZ22368</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ22369">IZ22369</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ22370">IZ22370</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29329">29329</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1626/references">ADV-2008-1626</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42577">ibm-aix-aix-bo(42577)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5684">oval:org.mitre.oval:def:5684</ref>
    </refs>
    <vuln_soft>
      <prod name="aix" vendor="ibm">
        <vers num="5.2"/>
        <vers num="5.3"/>
        <vers num="6.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2514" seq="2008-2514" published="2008-06-02" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in errpt in IBM AIX 5.2, 5.3, and 6.1 allows local users to gain privileges via unknown attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://aix.software.ibm.com/aix/efixes/security/errpt_advisory.asc">http://aix.software.ibm.com/aix/efixes/security/errpt_advisory.asc</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020084">1020084</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ19905">IZ19905</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ21494">IZ21494</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ22346">IZ22346</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ22347">IZ22347</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ22348">IZ22348</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29323">29323</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1626/references">ADV-2008-1626</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42578">ibm-aix-setuidroot-errpt-bo(42578)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5629">oval:org.mitre.oval:def:5629</ref>
    </refs>
    <vuln_soft>
      <prod name="aix" vendor="ibm">
        <vers num="5.2"/>
        <vers num="5.3"/>
        <vers num="6.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2515" seq="2008-2515" published="2008-06-02" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in iostat in IBM AIX 5.2, 5.3, and 6.1 allows local users to gain privileges via unknown vectors related to an "environment variable handling error."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://aix.software.ibm.com/aix/efixes/security/iostat_advisory.asc" adv="1">http://aix.software.ibm.com/aix/efixes/security/iostat_advisory.asc</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020085">1020085</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ20635" patch="1">IZ20635</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ21506" patch="1">IZ21506</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ22349" patch="1">IZ22349</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ22350" patch="1">IZ22350</ref>
      <ref source="AIXAPAR" url="http://www.ibm.com/support/docview.wss?uid=isg1IZ22351" adv="1" patch="1">IZ22351</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29325" patch="1">29325</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1626/references" adv="1">ADV-2008-1626</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42579">ibm-aix-setuidroot-iostat-bo(42579)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5424">oval:org.mitre.oval:def:5424</ref>
    </refs>
    <vuln_soft>
      <prod name="aix" vendor="ibm">
        <vers num="5.2"/>
        <vers num="5.3"/>
        <vers num="6.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2516" seq="2008-2516" published="2008-06-03" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">pam_sm_authenticate in pam_pgsql.c in libpam-pgsql 0.6.3 does not properly consider operator precedence when evaluating the success of a pam_get_pass function call, which allows local users to gain privileges via a SIGINT signal when this function is executing, as demonstrated by a CTRL-C sequence at a sudo password prompt in an "auth sufficient pam_pgsql.so" configuration.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=481970">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=481970</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=601775">http://sourceforge.net/project/shownotes.php?release_id=601775</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29360">29360</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020111">1020111</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1654/references">ADV-2008-1654</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42653">libpampgsql-pamsm-security-bypass(42653)</ref>
    </refs>
    <vuln_soft>
      <prod name="libpam-pgsql" vendor="libpam-pgsql">
        <vers num="0.6.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2517" seq="2008-2517" published="2008-06-03" modified="2017-08-07" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The sarab.sh script in SaraB before 0.2.4 places the dar program's encryption key on the command line, which allows local users to obtain sensitive information by listing the process.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sarab.svn.sourceforge.net/viewvc/sarab/sarab/sarab.sh?r1=34&amp;r2=36">http://sarab.svn.sourceforge.net/viewvc/sarab/sarab/sarab.sh?r1=34&amp;r2=36</ref>
      <ref source="CONFIRM" url="http://sarab.svn.sourceforge.net/viewvc/sarab/sarab/sarab.sh?view=log">http://sarab.svn.sourceforge.net/viewvc/sarab/sarab/sarab.sh?view=log</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=601603&amp;group_id=91804">http://sourceforge.net/project/shownotes.php?release_id=601603&amp;group_id=91804</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29364">29364</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1659/references">ADV-2008-1659</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42621">sarab-ciphers-information-disclosure(42621)</ref>
    </refs>
    <vuln_soft>
      <prod name="sarab" vendor="sarab">
        <vers num="0.2.2"/>
        <vers num="0.2.3" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2518" seq="2008-2518" published="2008-06-03" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the advanced search mechanism (webapps/search/advanced.jsp) in Sun Java System Web Server 6.1 before SP9 and 7.0 before Update 3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, probably related to the next parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-236481-1" patch="1">236481</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29355">29355</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020110">1020110</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1649/references">ADV-2008-1649</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42624">javasystem-advancedsearch-xss(42624)</ref>
    </refs>
    <vuln_soft>
      <prod name="java_system_web_server" vendor="sun">
        <vers num="6.1" edition="sp1"/>
        <vers num="6.1" edition="sp2"/>
        <vers num="6.1" edition="sp3"/>
        <vers num="6.1" edition="sp4"/>
        <vers num="6.1" edition="sp5"/>
        <vers num="6.1" edition="sp6"/>
        <vers num="6.1" edition="sp7"/>
        <vers num="6.1" edition="sp8"/>
        <vers num="7.0" edition="update_1"/>
        <vers num="7.0" edition="update_2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2519" seq="2008-2519" published="2008-06-03" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in Core FTP client 2.1 Build 1565 allows remote FTP servers to create or overwrite arbitrary files via .. (dot dot) sequences in responses to LIST commands, a related issue to CVE-2002-1345.  NOTE: this can be leveraged for code execution by writing to a Startup folder.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://vuln.sg/coreftp211565-en.html">http://vuln.sg/coreftp211565-en.html</ref>
      <ref source="CONFIRM" url="http://www.coreftp.com/forums/viewtopic.php?t=6078" patch="1">http://www.coreftp.com/forums/viewtopic.php?t=6078</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29362">29362</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1643/references">ADV-2008-1643</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42605">coreftp-list-directory-traversal(42605)</ref>
    </refs>
    <vuln_soft>
      <prod name="core_ftp" vendor="core_ftp">
        <vers num="2.1" edition="build_1565:le"/>
        <vers num="2.1" edition="build_1565:pro"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2520" seq="2008-2520" published="2008-06-03" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple PHP remote file inclusion vulnerabilities in BigACE 2.4, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the (1) GLOBALS[_BIGACE][DIR][addon] parameter to (a) addon/smarty/plugins/function.captcha.php and (b) system/classes/sql/AdoDBConnection.php; and the (2) GLOBALS[_BIGACE][DIR][admin] parameter to (c) item_information.php and (d) jstree.php in system/application/util/, and (e) system/admin/plugins/menu/menuTree/plugin.php, different vectors than CVE-2006-4423.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29157" patch="1">29157</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42343">bigace-multiple-file-include(42343)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5596">5596</ref>
    </refs>
    <vuln_soft>
      <prod name="bigace" vendor="bigace">
        <vers num="2.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2521" seq="2008-2521" published="2008-06-03" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in members.php in YABSoft Mega File Hosting Script (aka MFH or MFHS) 1.2 allows remote authenticated users to execute arbitrary SQL commands via the fid parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29167">29167</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42355">megafile-members-sql-injection(42355)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5598">5598</ref>
    </refs>
    <vuln_soft>
      <prod name="mega_file_hosting_script" vendor="yabsoft">
        <vers num="1.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2522" seq="2008-2522" published="2008-06-03" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in members.php in Battle.net Clan Script for PHP 1.5.3 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the showmember parameter in a members action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29166">29166</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42354">battlenetclanscript-members-sql-injection(42354)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5597">5597</ref>
    </refs>
    <vuln_soft>
      <prod name="battlenet_clan_script" vendor="haudenschilt">
        <vers num="1.5.1"/>
        <vers num="1.5.2"/>
        <vers num="1.5.3" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2523" seq="2008-2523" published="2008-06-03" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the Autopatcher server plugin in RakNet before 3.23 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.jenkinssoftware.com/raknet/forum/index.php?topic=1787.0">http://www.jenkinssoftware.com/raknet/forum/index.php?topic=1787.0</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29178">29178</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42352">raknet-autopatcher-sql-injection(42352)</ref>
    </refs>
    <vuln_soft>
      <prod name="autopatcher_server" vendor="raknet">
        <vers num="3.001"/>
        <vers num="3.02"/>
        <vers num="3.03"/>
        <vers num="3.004"/>
        <vers num="3.005"/>
        <vers num="3.06"/>
        <vers num="3.007"/>
        <vers num="3.08"/>
        <vers num="3.009"/>
        <vers num="3.11"/>
        <vers num="3.21"/>
        <vers num="3.22" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2524" seq="2008-2524" published="2008-06-03" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">BlogPHP 2.0 allows remote attackers to bypass authentication, and post (1) messages or (2) comments as an arbitrary user, via a modified blogphp_username field in a cookie.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.davidsopas.com/soapbox/blogphp.txt">http://www.davidsopas.com/soapbox/blogphp.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29133">29133</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42372">blogphp-blogphpusername-security-bypass(42372)</ref>
    </refs>
    <vuln_soft>
      <prod name="blogphp" vendor="blogphp">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2525" seq="2008-2525" published="2008-06-03" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the Event Database (aka rlmp_eventdb) extension before 1.1.2 for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://typo3.org/teams/security/security-bulletins/typo3-20080513-3/" patch="1">http://typo3.org/teams/security/security-bulletins/typo3-20080513-3/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29180">29180</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42361">rlmpeventdb-unspecified-xss(42361)</ref>
    </refs>
    <vuln_soft>
      <prod name="rlmp_eventdb" vendor="typo3">
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.4"/>
        <vers num="1.0.5"/>
        <vers num="1.1.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2526" seq="2008-2526" published="2008-06-03" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the WT Gallery (aka wt_gallery) extension 2.6.2 and earlier for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://typo3.org/teams/security/security-bulletins/typo3-20080513-1/" patch="1">http://typo3.org/teams/security/security-bulletins/typo3-20080513-1/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29182">29182</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42363">wtgallery-unspecified-xss(42363)</ref>
    </refs>
    <vuln_soft>
      <prod name="wt_gallery" vendor="typo3">
        <vers num="2.50"/>
        <vers num="2.62" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2527" seq="2008-2527" published="2008-06-03" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in view.php in ActualScripts ActualAnalyzer Server 8.37 and earlier, ActualAnalyzer Gold 7.74 and earlier, ActualAnalyzer Pro 6.95 and earlier, and ActualAnalyzer Lite 2.78 and earlier allows remote attackers to inject arbitrary web script or HTML via the language parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.majorsecurity.de/index_2.php?major_rls=major_rls52">http://www.majorsecurity.de/index_2.php?major_rls=major_rls52</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/491982/100/0/threaded">20080512 [MajorSecurity Advisory #52]ActualAnalyzer family - Cross Site Scripting Issues</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29177">29177</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42367">actualanalyzer-view-xss(42367)</ref>
    </refs>
    <vuln_soft>
      <prod name="actualanalyzer_gold" vendor="actualscripts">
        <vers num="7.21"/>
        <vers num="7.22"/>
        <vers num="7.23"/>
        <vers num="7.24"/>
        <vers num="7.25"/>
        <vers num="7.31"/>
        <vers num="7.32"/>
        <vers num="7.33"/>
        <vers num="7.34"/>
        <vers num="7.35"/>
        <vers num="7.41"/>
        <vers num="7.42"/>
        <vers num="7.43"/>
        <vers num="7.51"/>
        <vers num="7.61"/>
        <vers num="7.62"/>
        <vers num="7.63"/>
        <vers num="7.64"/>
        <vers num="7.71"/>
        <vers num="7.72"/>
        <vers num="7.73"/>
        <vers num="7.74"/>
      </prod>
      <prod name="actualanalyzer_lite" vendor="actualscripts">
        <vers num="2.77"/>
        <vers num="2.78" prev="1"/>
      </prod>
      <prod name="actualanalyzer_pro" vendor="actualscripts">
        <vers num="6.65"/>
        <vers num="6.67"/>
        <vers num="6.68"/>
        <vers num="6.69"/>
        <vers num="6.71"/>
        <vers num="6.72"/>
        <vers num="6.73"/>
        <vers num="6.81"/>
        <vers num="6.82"/>
        <vers num="6.83"/>
        <vers num="6.85"/>
        <vers num="6.86"/>
        <vers num="6.87"/>
        <vers num="6.88"/>
        <vers num="6.89"/>
        <vers num="6.91"/>
        <vers num="6.92"/>
        <vers num="6.93"/>
        <vers num="6.94"/>
        <vers num="6.95" prev="1"/>
      </prod>
      <prod name="actualanalyzer_server" vendor="actualscripts">
        <vers num="8.02"/>
        <vers num="8.11"/>
        <vers num="8.21"/>
        <vers num="8.22"/>
        <vers num="8.23"/>
        <vers num="8.24"/>
        <vers num="8.25"/>
        <vers num="8.31"/>
        <vers num="8.32"/>
        <vers num="8.33"/>
        <vers num="8.34"/>
        <vers num="8.35"/>
        <vers num="8.36"/>
        <vers num="8.37" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2528" seq="2008-2528" published="2008-06-03" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Citrix Access Gateway Standard Edition 4.5.7 and earlier and Advanced Edition 4.5 HF2 and earlier allows attackers to bypass authentication and gain "access to network resources" via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://support.citrix.com/article/CTX116930" patch="1">http://support.citrix.com/article/CTX116930</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29174">29174</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020025">1020025</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1474/references">ADV-2008-1474</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42356">citrix-access-unspecified-auth-bypass(42356)</ref>
    </refs>
    <vuln_soft>
      <prod name="access_gateway" vendor="citrix">
        <vers num="4.5" prev="1" edition="advanced:hf2"/>
        <vers num="4.5.5" edition=":standard"/>
        <vers num="4.5.6" edition=":standard"/>
        <vers num="4.5.7" prev="1" edition=":standard"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2529" seq="2008-2529" published="2008-06-03" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in read.php in Advanced Links Management (ALM) 1.5.2 allows remote attackers to execute arbitrary SQL commands via the catId parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29137">29137</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42320">alm-read-sql-injection(42320)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5581">5581</ref>
    </refs>
    <vuln_soft>
      <prod name="advanced_links_management" vendor="advanced_links_management">
        <vers num="1.5.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2530" seq="2008-2530" published="2008-06-03" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in Concepts &amp; Solutions QuickUpCMS allow remote attackers to execute arbitrary SQL commands via the (1) nr parameter to (a) frontend/news.php, the (2) id parameter to (b) events3.php and (c) videos2.php in frontend/, the (3) y parameter to (d) frontend/events2.php, and the (4) ser parameter to (e) frontend/fotos2.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29145">29145</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42325">quickupcms-news-sql-injection(42325)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5588">5588</ref>
    </refs>
    <vuln_soft>
      <prod name="quickupcms" vendor="quickupcms">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2531" seq="2008-2531" published="2008-06-03" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the search script in Build A Niche Store (BANS) 3.0 allows remote attackers to inject arbitrary web script or HTML via the q parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://holisticinfosec.org/content/view/64/45/">http://holisticinfosec.org/content/view/64/45/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29187">29187</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42373">bans-search-xss(42373)</ref>
    </refs>
    <vuln_soft>
      <prod name="bans" vendor="buildanichestore3">
        <vers num="3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2532" seq="2008-2532" published="2008-06-03" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in forum/topic_detail.php in AJ Square aj-hyip (aka AJ HYIP Acme) allows remote attackers to execute arbitrary SQL commands via the id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29173">29173</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42382">ajhyipacme-topicdetail-sql-injection(42382)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5602">5602</ref>
    </refs>
    <vuln_soft>
      <prod name="aj_hyip" vendor="aj_square">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2533" seq="2008-2533" published="2008-06-03" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in Phoenix View CMS Pre Alpha2 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) ltarget parameter to (a) admin/admin_frame.php and the (2) conf parameter to (b) gbuch.admin.php, (c) links.admin.php, (d) menue.admin.php, (e) news.admin.php, and (f) todo.admin.php in admin/module/.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29130">29130</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42314">phoenixview-adminframe-xss(42314)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5578">5578</ref>
    </refs>
    <vuln_soft>
      <prod name="phoenix_view_cms" vendor="fkrauthan">
        <vers num="2-pre-alpha"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2534" seq="2008-2534" published="2008-06-03" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in admin/admin_frame.php in Phoenix View CMS Pre Alpha2 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the ltarget parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42315">phoenixview-adminframe-file-include(42315)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5578">5578</ref>
    </refs>
    <vuln_soft>
      <prod name="phoenix_view_cms" vendor="fkrauthan">
        <vers num="2-pre-alpha"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2535" seq="2008-2535" published="2008-06-03" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in Phoenix View CMS Pre Alpha2 and earlier allow remote attackers to execute arbitrary SQL commands via the del parameter to (1) gbuch.admin.php, (2) links.admin.php, (3) menue.admin.php, (4) news.admin.php, and (5) todo.admin.php in admin/module/.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42316">phoenixview-del-sql-injection(42316)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5578">5578</ref>
    </refs>
    <vuln_soft>
      <prod name="phoenix_view_cms" vendor="fkrauthan">
        <vers num="2-pre-alpha"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2536" seq="2008-2536" published="2008-06-03" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in out.php in YABSoft Advanced Image Hosting (AIH) Script 2.1 and earlier allows remote attackers to execute arbitrary SQL commands via the t parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29172">29172</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42405">advancedimagehosting-out-sql-injection(42405)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5601">5601</ref>
    </refs>
    <vuln_soft>
      <prod name="advanced_image_hosting_script" vendor="yabsoft">
        <vers num="2.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2537" seq="2008-2537" published="2008-06-03" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in cat.php in HispaH Model Search allows remote attackers to execute arbitrary SQL commands via the cat parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29128">29128</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42312">modelsearch-cat-sql-injection(42312)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5577">5577</ref>
    </refs>
    <vuln_soft>
      <prod name="model_search" vendor="hispah">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2538" seq="2008-2538" published="2008-06-03" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.9" CVSS_base_score="6.9" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in crontab on Sun Solaris 8 through 10, and OpenSolaris before snv_93, allows local users to insert cron jobs into the crontab files of arbitrary users via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020151">1020151</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-237864-1">237864</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2008-222.htm">http://support.avaya.com/elmodocs2/security/ASA-2008-222.htm</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1714">ADV-2008-1714</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42763">solaris-crontab-code-execution(42763)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4725">oval:org.mitre.oval:def:4725</ref>
    </refs>
    <vuln_soft>
      <prod name="solaris" vendor="sun">
        <vers num="8" edition=":sparc"/>
        <vers num="8" edition=":x86"/>
        <vers num="9" edition=":sparc"/>
        <vers num="9" edition=":x86"/>
        <vers num="10" edition=":sparc"/>
        <vers num="10" edition=":x86"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2539" seq="2008-2539" published="2008-06-03" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The Sun Cluster Global File System in Sun Cluster 3.1 on Sun Solaris 8 through 10, when an underlying ufs filesystem is used, might allow local users to read data from arbitrary deleted files, or corrupt files in global filesystems, via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-201341-1">201341</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29458">29458</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020152">1020152</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1713">ADV-2008-1713</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42762">suncluster-unspecified-info-disclosure(42762)</ref>
    </refs>
    <vuln_soft>
      <prod name="cluster" vendor="sun">
        <vers num="3.1" edition=":solaris_10"/>
        <vers num="3.1" edition=":solaris_8"/>
        <vers num="3.1" edition=":solaris_9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2540" seq="2008-2540" published="2008-06-03" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Apple Safari on Mac OS X, and before 3.1.2 on Windows, does not prompt the user before downloading an object that has an unrecognized content type, which allows remote attackers to place malware into the (1) Desktop directory on Windows or (2) Downloads directory on Mac OS X, and subsequently allows remote attackers to execute arbitrary code on Windows by leveraging an untrusted search path vulnerability in (a) Internet Explorer 7 on Windows XP or (b) the SearchPath function in Windows XP, Vista, and Server 2003 and 2008, aka a "Carpet Bomb" and a "Blended Threat Elevation of Privilege Vulnerability," a different issue than CVE-2008-1032. NOTE: Apple considers this a vulnerability only because the Microsoft products can load application libraries from the desktop and, as of 20080619, has not covered the issue in an advisory for Mac OS X.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aviv.raffon.net/2008/05/31/SafariPwnsInternetExplorer.aspx" adv="1">http://aviv.raffon.net/2008/05/31/SafariPwnsInternetExplorer.aspx</ref>
      <ref source="MISC" url="http://blogs.zdnet.com/security/?p=1230" adv="1">http://blogs.zdnet.com/security/?p=1230</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//Jun/msg00001.html" adv="1">APPLE-SA-2008-06-19</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020150" adv="1">1020150</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2009-133.htm" adv="1">http://support.avaya.com/elmodocs2/security/ASA-2009-133.htm</ref>
      <ref source="CONFIRM" url="http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&amp;id=871138" adv="1">http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&amp;id=871138</ref>
      <ref source="MISC" url="http://www.dhanjani.com/archives/2008/05/safari_carpet_bomb.html">http://www.dhanjani.com/archives/2008/05/safari_carpet_bomb.html</ref>
      <ref source="MISC" url="http://www.microsoft.com/technet/security/advisory/953818.mspx" adv="1" patch="1">http://www.microsoft.com/technet/security/advisory/953818.mspx</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29445" adv="1">29445</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1022047" adv="1">1022047</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA09-104A.html" adv="1">TA09-104A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1706">ADV-2008-1706</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/1028">ADV-2009-1028</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/1029">ADV-2009-1029</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-014">MS09-014</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-015">MS09-015</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42765" adv="1">apple-safari-windows-code-execution(42765)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5782" adv="1">oval:org.mitre.oval:def:5782</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6108" adv="1">oval:org.mitre.oval:def:6108</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8509" adv="1">oval:org.mitre.oval:def:8509</ref>
    </refs>
    <vuln_soft>
      <prod name="safari" vendor="apple">
        <vers num="-"/>
        <vers num="1.0" edition="beta"/>
        <vers num="1.0" edition="beta2"/>
        <vers num="1.0.0"/>
        <vers num="1.0.0b1"/>
        <vers num="1.0.0b2"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3" edition="85.8"/>
        <vers num="1.0.3" edition="85.8.1"/>
        <vers num="1.0b1" edition="-:mac"/>
        <vers num="1.1"/>
        <vers num="1.1.0"/>
        <vers num="1.1.1"/>
        <vers num="1.2"/>
        <vers num="1.2.0"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2"/>
        <vers num="1.2.3"/>
        <vers num="1.2.4"/>
        <vers num="1.2.5"/>
        <vers num="1.3"/>
        <vers num="1.3.0"/>
        <vers num="1.3.1"/>
        <vers num="1.3.2" edition="312.5"/>
        <vers num="1.3.2" edition="312.6"/>
        <vers num="2"/>
        <vers num="2.0"/>
        <vers num="2.0.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3" edition="417.8"/>
        <vers num="2.0.3" edition="417.9"/>
        <vers num="2.0.3" edition="417.9.2"/>
        <vers num="2.0.3" edition="417.9.3"/>
        <vers num="2.0.4" edition="-:mac"/>
        <vers num="3"/>
        <vers num="3.0"/>
        <vers num="3.0.0" edition="-:mac"/>
        <vers num="3.0.0b" edition="-:windows"/>
        <vers num="3.0.1" edition="-:mac"/>
        <vers num="3.0.1" edition="beta"/>
        <vers num="3.0.1b" edition="-:windows"/>
        <vers num="3.0.2" edition="-:mac"/>
        <vers num="3.0.2b" edition="-:windows"/>
        <vers num="3.0.3" edition="-:mac"/>
        <vers num="3.0.3b" edition="-:windows"/>
        <vers num="3.0.4" edition="-:mac"/>
        <vers num="3.0.4b" edition="-:windows"/>
        <vers num="3.1.0" edition="-:mac"/>
        <vers num="3.1.0b" edition="-:windows"/>
        <vers num="3.1.1"/>
        <vers num="3.1.1b" edition="-:windows"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2541" seq="2008-2541" published="2008-06-04" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple stack-based buffer overflows in the HTTP Gateway Service (icihttp.exe) in CA eTrust Secure Content Manager 8.0 allow remote attackers to execute arbitrary code or cause a denial of service via long FTP responses, related to (1) the file month field in a LIST command; (2) the PASV command; and (3) directories, files, and links in a LIST command.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://dvlabs.tippingpoint.com/advisory/TPTI-08-05">http://dvlabs.tippingpoint.com/advisory/TPTI-08-05</ref>
      <ref source="CONFIRM" url="http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=36408">http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=36408</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493082/100/0/threaded">20080604 ZDI-08-036: CA ETrust Secure Content Manager Gateway FTP LIST Stack Overflow</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493084/100/0/threaded">20080604 ZDI-08-035: CA ETrust Secure Content Manager Gateway FTP PASV Stack Overflow Vulnerability</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493087/100/0/threaded">20080604 TPTI-08-05: CA ETrust Secure Content Manager Gateway FTP LIST Stack Overflow Vulnerability</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493124/100/0/threaded">20080604 CA Secure Content Manager HTTP Gateway Service FTP Request Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29528">29528</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020167">1020167</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1741/references" adv="1">ADV-2008-1741</ref>
      <ref source="MISC" url="http://www.zerodayinitiative.com/advisories/ZDI-08-035/">http://www.zerodayinitiative.com/advisories/ZDI-08-035/</ref>
      <ref source="MISC" url="http://www.zerodayinitiative.com/advisories/ZDI-08-036">http://www.zerodayinitiative.com/advisories/ZDI-08-036</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42821">ca-etrust-scm-ftp-bo(42821)</ref>
      <ref source="CONFIRM" url="https://support.ca.com/irj/portal/anonymous/SolutionResults?aparNo=QO99987&amp;os=NT&amp;actionID=3" patch="1">https://support.ca.com/irj/portal/anonymous/SolutionResults?aparNo=QO99987&amp;os=NT&amp;actionID=3</ref>
    </refs>
    <vuln_soft>
      <prod name="etrust_secure_content_manager" vendor="ca">
        <vers num="8.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2542" seq="2008-2542" published="2008-06-05" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the getline function in Ppm/ppm.C in NASA Ames Research Center BigView 1.8 allows user-assisted remote attackers to execute arbitrary code via a crafted PNM file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3924">3924</ref>
      <ref source="MISC" url="http://www.coresecurity.com/?action=item&amp;id=2304">http://www.coresecurity.com/?action=item&amp;id=2304</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493112/100/0/threaded">20080604 CORE-2008-0425 - NASA BigView Stack Buffer Overflow</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1745/references">ADV-2008-1745</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42847">bigview-getline-bo(42847)</ref>
    </refs>
    <vuln_soft>
      <prod name="bigview" vendor="nasa_ames_research_center">
        <vers num="1.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2543" seq="2008-2543" published="2008-06-05" modified="2018-10-15" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The ooh323 channel driver in Asterisk Addons 1.2.x before 1.2.9 and Asterisk-Addons 1.4.x before 1.4.7 creates a remotely accessible TCP port that is intended solely for localhost communication, and interprets some TCP application-data fields as addresses of memory to free, which allows remote attackers to cause a denial of service (daemon crash) via crafted TCP packets.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://downloads.digium.com/pub/security/AST-2008-009.html">http://downloads.digium.com/pub/security/AST-2008-009.html</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020202">1020202</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493122/100/0/threaded">20080604 AST-2008-009: AST-2008-007 Cryptographic keys generated by OpenSSL on Debian-based systems compromised</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493144/100/0/threaded">20080604 AST-2008-009: (Corrected subject) Remote crash vulnerability in ooh323 channel driver</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29567">29567</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1747/references">ADV-2008-1747</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42869">asterisk-addons-ooh323-dos(42869)</ref>
    </refs>
    <vuln_soft>
      <prod name="asterisk-addons" vendor="asterisk">
        <vers num="1.2.0"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2"/>
        <vers num="1.2.3"/>
        <vers num="1.2.4"/>
        <vers num="1.2.5"/>
        <vers num="1.2.6"/>
        <vers num="1.2.7"/>
        <vers num="1.2.8"/>
        <vers num="1.4.0"/>
        <vers num="1.4.1"/>
        <vers num="1.4.2"/>
        <vers num="1.4.3"/>
        <vers num="1.4.4"/>
        <vers num="1.4.5"/>
        <vers num="1.4.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2545" seq="2008-2545" published="2008-06-06" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Skype 3.6.0.248, and other versions before 3.8.0.139, uses a case-sensitive comparison when checking for dangerous extensions, which allows user-assisted remote attackers to bypass warning dialogs and possibly execute arbitrary code via a file: URI with a dangerous extension that uses a different case.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=711">20080604 Skype File URI Security Bypass Code Execution Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29553">29553</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020201">1020201</ref>
      <ref source="CONFIRM" url="http://www.skype.com/security/skype-sb-2008-003.html" patch="1">http://www.skype.com/security/skype-sb-2008-003.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1749/references">ADV-2008-1749</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43044">skype-fileuri-case-security-bypass(43044)</ref>
    </refs>
    <vuln_soft>
      <prod name="skype" vendor="skype_technologies">
        <vers num="3.0.0.106" edition="beta"/>
        <vers num="3.0.0.123" edition="beta"/>
        <vers num="3.0.0.137" edition="beta"/>
        <vers num="3.0.0.154" edition="beta"/>
        <vers num="3.0.0.190"/>
        <vers num="3.0.0.198"/>
        <vers num="3.0.0.205"/>
        <vers num="3.0.0.209"/>
        <vers num="3.0.0.214"/>
        <vers num="3.0.0.216"/>
        <vers num="3.0.0.217"/>
        <vers num="3.0.0.218"/>
        <vers num="3.1.0.112" edition="beta"/>
        <vers num="3.1.0.134" edition="beta"/>
        <vers num="3.1.0.144"/>
        <vers num="3.1.0.147"/>
        <vers num="3.1.0.150"/>
        <vers num="3.1.0.152"/>
        <vers num="3.2.0.53" edition="beta"/>
        <vers num="3.2.0.63" edition="beta"/>
        <vers num="3.2.0.82" edition="beta"/>
        <vers num="3.2.0.115" edition="beta"/>
        <vers num="3.2.0.145"/>
        <vers num="3.2.0.148"/>
        <vers num="3.2.0.152"/>
        <vers num="3.2.0.158"/>
        <vers num="3.2.0.163"/>
        <vers num="3.2.0.175"/>
        <vers num="3.5.0.107" edition="beta"/>
        <vers num="3.5.0.158" edition="beta"/>
        <vers num="3.5.0.178" edition="beta"/>
        <vers num="3.5.0.202"/>
        <vers num="3.5.0.214"/>
        <vers num="3.5.0.229"/>
        <vers num="3.5.0.234"/>
        <vers num="3.5.0.239"/>
        <vers num="3.6.0.127" edition="beta"/>
        <vers num="3.6.0.159" edition="beta"/>
        <vers num="3.6.0.216"/>
        <vers num="3.6.0.244"/>
        <vers num="3.6.0.248"/>
        <vers num="3.8.0.96" edition="beta"/>
        <vers num="3.8.0.115" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2546" seq="2008-2546" published="2008-06-06" modified="2008-09-10" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2008-1805.  Reason: This candidate is a reservation duplicate of CVE-2008-1805.  Notes: All CVE users should reference CVE-2008-1805 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2008-2547" seq="2008-2547" published="2008-06-04" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in msiexec.exe 3.1.4000.1823 and 4.5.6001.22159 in Microsoft Windows Installer allows context-dependent attackers to execute arbitrary code via a long GUID value for the /x (aka /uninstall) option.  NOTE: this issue might cross privilege boundaries if msiexec.exe is reachable via components such as ActiveX controls, and might additionally require a separate vulnerability in the control.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.aushack.com/200806-msiexec.txt">http://www.aushack.com/200806-msiexec.txt</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492961/100/0/threaded">20080603 Windows Installer msiexec GUID Buffer Overflow</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492986/100/0/threaded">20080603 Re: Windows Installer msiexec GUID Buffer Overflow</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492992/100/0/threaded">20080603 RE: Windows Installer msiexec GUID Buffer Overflow</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42887">win-msiexec-bo(42887)</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_installer" vendor="microsoft">
        <vers num="3.1.4000.1823"/>
        <vers num="4.5.6001.22159"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2548" seq="2008-2548" published="2008-06-04" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the JPEG thumbprint component in the EXIF parser on Motorola cell phones with RAZR firmware allows user-assisted remote attackers to execute arbitrary code via an MMS transmission of a malformed JPEG image, which triggers memory corruption.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492668/100/0/threaded">20080527 ZDI-08-033: Motorola RAZR JPG Processing Stack Overflow Vulnerability</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020117">1020117</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1671/references">ADV-2008-1671</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42656">razr-jpeg-bo(42656)</ref>
    </refs>
    <vuln_soft>
      <prod name="razr" vendor="motorola">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2549" seq="2008-2549" published="2008-06-04" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Adobe Acrobat Reader 8.1.2 and earlier, and before 7.1.1, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a malformed PDF document, as demonstrated by 2008-HI2.pdf.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://download.oracle.com/sunalerts/1019937.1.html">249366</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html">SUSE-SR:2008:026</ref>
      <ref source="CONFIRM" url="http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&amp;id=800801">http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&amp;id=800801</ref>
      <ref source="CONFIRM" url="http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&amp;id=909609">http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&amp;id=909609</ref>
      <ref source="CONFIRM" url="http://www.adobe.com/support/security/bulletins/apsb08-19.html">http://www.adobe.com/support/security/bulletins/apsb08-19.html</ref>
      <ref source="CONFIRM" url="http://www.adobe.com/support/security/bulletins/apsb09-04.html">http://www.adobe.com/support/security/bulletins/apsb09-04.html</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0974.html">RHSA-2008:0974</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29420">29420</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1021140">1021140</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-309A.html">TA08-309A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/3001">ADV-2008-3001</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/0098">ADV-2009-0098</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42886">acrobatreader-pdf-dos(42886)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5687">5687</ref>
    </refs>
    <vuln_soft>
      <prod name="acrobat_reader" vendor="adobe">
        <vers num="3.0"/>
        <vers num="4.0"/>
        <vers num="4.0.5"/>
        <vers num="4.5"/>
        <vers num="5.0"/>
        <vers num="5.0.5"/>
        <vers num="5.0.6"/>
        <vers num="5.0.7"/>
        <vers num="5.0.9"/>
        <vers num="5.0.10"/>
        <vers num="5.0.11"/>
        <vers num="5.1"/>
        <vers num="6.0"/>
        <vers num="6.0.1"/>
        <vers num="6.0.2"/>
        <vers num="6.0.3"/>
        <vers num="6.0.4"/>
        <vers num="6.0.5"/>
        <vers num="7.0"/>
        <vers num="7.0.1"/>
        <vers num="7.0.2"/>
        <vers num="7.0.3"/>
        <vers num="7.0.4"/>
        <vers num="7.0.5"/>
        <vers num="7.0.6"/>
        <vers num="7.0.7"/>
        <vers num="7.0.8"/>
        <vers num="7.0.9"/>
        <vers num="8.0"/>
        <vers num="8.1"/>
        <vers num="8.1.1"/>
        <vers num="8.1.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2550" seq="2008-2550" published="2008-06-04" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Web Services Security component in IBM WebSphere Application Server (WAS) 6.1 before 6.1.0.17 has unknown impact and attack vectors related to an attribute in the SOAP security header.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020168">1020168</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1734">ADV-2008-1734</ref>
      <ref source="CONFIRM" url="http://www-1.ibm.com/support/docview.wss?rs=180&amp;uid=swg27007951">http://www-1.ibm.com/support/docview.wss?rs=180&amp;uid=swg27007951</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42822">websphere-soap-information-disclosure(42822)</ref>
    </refs>
    <vuln_soft>
      <prod name="websphere_application_server" vendor="ibm">
        <vers num="6.1"/>
        <vers num="6.1.0"/>
        <vers num="6.1.0.0"/>
        <vers num="6.1.0.1"/>
        <vers num="6.1.0.2"/>
        <vers num="6.1.0.3"/>
        <vers num="6.1.0.4"/>
        <vers num="6.1.0.5"/>
        <vers num="6.1.0.6"/>
        <vers num="6.1.0.7"/>
        <vers num="6.1.0.8"/>
        <vers num="6.1.0.9"/>
        <vers num="6.1.0.10"/>
        <vers num="6.1.0.11"/>
        <vers num="6.1.0.12"/>
        <vers num="6.1.0.13"/>
        <vers num="6.1.0.14"/>
        <vers num="6.1.0.15"/>
        <vers num="6.1.0.16" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2551" seq="2008-2551" published="2008-06-04" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The DownloaderActiveX Control (DownloaderActiveX.ocx) in Icona SpA C6 Messenger 1.0.0.1 allows remote attackers to force the download and execution of arbitrary files via a URL in the propDownloadUrl parameter with the propPostDownloadAction parameter set to "run."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3926">3926</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493019/100/0/threaded">20080603 [NSG 03-06-2008] C6 Messenger Installation Url DownloaderActiveX Control Remote Download &amp; Execute Exploit</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29519">29519</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1733/references">ADV-2008-1733</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42825">iconaspa-downloaderactivex-code-execution(42825)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5732">5732</ref>
    </refs>
    <vuln_soft>
      <prod name="instant_messenger" vendor="icona">
        <vers num="1.0.0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2552" seq="2008-2552" published="2008-06-05" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="4.9" CVSS_base_score="4.9" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Service Tag Registry on Sun Solaris 10, and Sun Service Tag before 1.1.3, allows local users to cause a denial of service (disk consumption) via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-238414-1" patch="1">238414</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-77-1019316.1-1">1019316</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29561">29561</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020203">1020203</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1748/references">ADV-2008-1748</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42874">solaris-servicetagregistry-dos(42874)</ref>
    </refs>
    <vuln_soft>
      <prod name="service_tag" vendor="sun">
        <vers num="1.0"/>
        <vers num="1.1"/>
        <vers num="1.1.0"/>
        <vers num="1.1.1"/>
        <vers num="1.1.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2553" seq="2008-2553" published="2008-06-05" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Slashdot Like Automated Storytelling Homepage (Slash) (aka Slashcode) R_2_5_0_94 and earlier allows remote attackers to inject arbitrary web script or HTML via the userfield parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://slashcode.cvs.sourceforge.net/slashcode/slash/Slash/Utility/Environment/Environment.pm?r1=1.223&amp;r2=1.225">http://slashcode.cvs.sourceforge.net/slashcode/slash/Slash/Utility/Environment/Environment.pm?r1=1.223&amp;r2=1.225</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1633">DSA-1633</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29548">29548</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020207">1020207</ref>
      <ref source="CONFIRM" url="http://www.slashcode.com/article.pl?sid=08/01/04/1950244&amp;tid=4">http://www.slashcode.com/article.pl?sid=08/01/04/1950244&amp;tid=4</ref>
      <ref source="CONFIRM" url="http://www.slashcode.com/article.pl?sid=08/01/07/2314232">http://www.slashcode.com/article.pl?sid=08/01/07/2314232</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42882">slash-userfield-xss(42882)</ref>
    </refs>
    <vuln_soft>
      <prod name="slash" vendor="slashcode.com">
        <vers num="r_2_5_0_94" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2554" seq="2008-2554" published="2008-06-05" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in BP Blog 6.0 allow remote attackers to execute arbitrary SQL commands via the (1) id parameter to template_permalink.asp and (2) cat parameter to template_archives_cat.asp.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3925">3925</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492902/100/0/threaded">20080601 BP Blog 6.0 (id) Remote Blind SQL Injection Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29460">29460</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42894">bpblog-id-cat-sql-injection(42894)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5705">5705</ref>
    </refs>
    <vuln_soft>
      <prod name="bp_blog" vendor="bp_blog">
        <vers num="6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2555" seq="2008-2555" published="2008-06-05" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in EasyWay CMS allows remote attackers to execute arbitrary SQL commands via the mid parameter.</descript>
      <descript source="nvd">Additional resources found during analysis:

http://secunia.com/advisories/30494/</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42787">easyway-index-sql-injection(42787)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5706">5706</ref>
    </refs>
    <vuln_soft>
      <prod name="cms" vendor="easyway">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2556" seq="2008-2556" published="2008-06-05" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in read.php in PHP Visit Counter 0.4 and earlier allows remote attackers to execute arbitrary SQL commands via the datespan parameter in a read action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42789">phpvisitcounter-read-sql-injection(42789)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5703">5703</ref>
    </refs>
    <vuln_soft>
      <prod name="php_visit_counter" vendor="hessel_brouwer">
        <vers num="0.4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2557" seq="2008-2557" published="2008-06-05" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in CRE Loaded 6.2.13.1 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) Links and (2) Links Submit pages.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://oscommerceuniversity.com/lounge/index.php?topic=249.0">http://oscommerceuniversity.com/lounge/index.php?topic=249.0</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29786">29786</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42888">creloaded-links-linkssubmit-xss(42888)</ref>
    </refs>
    <vuln_soft>
      <prod name="cre_loaded" vendor="cre_loaded">
        <vers num="6.2.13.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2558" seq="2008-2558" published="2008-06-05" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">CRE Loaded 6.2.13.1 and earlier does not set the "Secure" attribute for cookies that are sent over HTTPS, which might allow remote attackers to sniff the cookies if they are sent over HTTP.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://oscommerceuniversity.com/lounge/index.php?topic=255.0">http://oscommerceuniversity.com/lounge/index.php?topic=255.0</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42889">creloaded-secure-mitm(42889)</ref>
    </refs>
    <vuln_soft>
      <prod name="cre_loaded" vendor="cre_loaded">
        <vers num="6.2.13.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2559" seq="2008-2559" published="2008-06-05" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Integer overflow in Borland Interbase 2007 SP2 (8.1.0.256) allows remote attackers to execute arbitrary code via a malformed packet to TCP port 3050, which triggers a stack-based buffer overflow.  NOTE: this issue might be related to CVE-2008-0467.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020092">1020092</ref>
      <ref source="MISC" url="http://www.coresecurity.com/?action=item&amp;id=2278">http://www.coresecurity.com/?action=item&amp;id=2278</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29302">29302</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1590">ADV-2008-1590</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42558">borland-packet-bo(42558)</ref>
    </refs>
    <vuln_soft>
      <prod name="borland_interbase" vendor="damian_frizza">
        <vers num="2007" edition="sp2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2560" seq="2008-2560" published="2008-06-06" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in showpost.php in 427BB 2.3.1 allows remote attackers to execute arbitrary SQL commands via the post parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29564">29564</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42876">427bb-showpost-sql-injection(42876)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5742">5742</ref>
    </refs>
    <vuln_soft>
      <prod name="427bb" vendor="fourtwosevenbb">
        <vers num="2.3.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2561" seq="2008-2561" published="2008-06-06" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in 427BB 2.3.1 allow remote attackers to inject arbitrary web script or HTML via the (1) PATH_INFO to (a) register.php, (b) reminder.php, and (c) search.php; the (2) uname, (3) email, and (4) email2 parameters to register.php; the (5) email parameter to reminder.php; and the (6) keywords parameter to search.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29564">29564</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42877">427bb-multiple-xss(42877)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5742">5742</ref>
    </refs>
    <vuln_soft>
      <prod name="427bb" vendor="fourtwosevenbb">
        <vers num="2.3.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2562" seq="2008-2562" published="2008-06-06" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in edCss.php in PowerPhlogger 2.2.5 and earlier allows remote authenticated users to execute arbitrary SQL commands via the css_str parameter in an edit action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29566">29566</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42870">powerphlogger-edcss-sql-injection(42870)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5744">5744</ref>
    </refs>
    <vuln_soft>
      <prod name="powerphlogger" vendor="powerphlogger">
        <vers num="2.0.9"/>
        <vers num="2.2.1"/>
        <vers num="2.2.2a"/>
        <vers num="2.2.5" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2563" seq="2008-2563" published="2008-06-06" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in (1) dsp_main.php and (2) dsp_task_editor.php in SamTodo 1.1 allow remote attackers to inject arbitrary web script or HTML via the (a) tid parameter in a main.taskeditor edit action, and the (b) completed parameter in a main.default action, to index.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.davidsopas.com/soapbox/samtodo.txt">http://www.davidsopas.com/soapbox/samtodo.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29568">29568</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29569">29569</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42868">samtodo-index-xss(42868)</ref>
    </refs>
    <vuln_soft>
      <prod name="samtodo" vendor="samtodo">
        <vers num="1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2564" seq="2008-2564" published="2008-06-06" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the JotLoader (com_jotloader) component 1.2.1.a and earlier for Joomla! allows remote attackers to execute arbitrary SQL commands via the cid parameter to index.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29554">29554</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42840">jotloader-index-sql-injection(42840)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5737">5737</ref>
    </refs>
    <vuln_soft>
      <prod name="com_jotloader" vendor="joomla">
        <vers num="1.0.1"/>
        <vers num="1.2.1.a" prev="1"/>
      </prod>
      <prod name="joomla" vendor="joomla">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2565" seq="2008-2565" published="2008-06-06" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in PHP Address Book 3.1.5 and earlier allow remote attackers to execute arbitrary SQL commands via the id parameter to (1) view.php and (2) edit.php.  NOTE: it was later reported that 4.0.x is also affected.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://packetstormsecurity.com/files/129789/PHP-Address-Book-Cross-Site-Scripting-SQL-Injection.html">http://packetstormsecurity.com/files/129789/PHP-Address-Book-Cross-Site-Scripting-SQL-Injection.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/504595/100/0/threaded">20090626 MULTIPLE SQL INJECTION VULNERABILITIES --PHP-AddressBook v-4.0.x--></ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/35511">35511</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42855">phpaddressbook-view-edit-sql-injection(42855)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/99622">phpaddressbook-viewphp-sql-injection(99622)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5739">5739</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/9023">9023</ref>
    </refs>
    <vuln_soft>
      <prod name="php-address_book" vendor="php-address_book">
        <vers num="1.0"/>
        <vers num="1.2"/>
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="2.1.1"/>
        <vers num="2.2"/>
        <vers num="2.3"/>
        <vers num="2.4"/>
        <vers num="2.6"/>
        <vers num="3.0"/>
        <vers num="3.1"/>
        <vers num="3.1.1"/>
        <vers num="3.1.2"/>
        <vers num="3.1.3"/>
        <vers num="3.1.4"/>
        <vers num="3.1.5"/>
        <vers num="3.3.16"/>
        <vers num="3.3.17"/>
        <vers num="3.3.18"/>
        <vers num="3.4"/>
        <vers num="3.4.1"/>
        <vers num="3.4.2"/>
        <vers num="3.4.3"/>
        <vers num="3.4.4"/>
        <vers num="3.4.5"/>
        <vers num="3.4.6"/>
        <vers num="3.4.7"/>
        <vers num="3.4.8"/>
        <vers num="4.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2566" seq="2008-2566" published="2008-06-06" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in PHP Address Book 3.1.5 and earlier allow remote attackers to inject arbitrary web script or HTML via the group parameter to (1) index.php or (2) the default URI.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://packetstormsecurity.com/files/129789/PHP-Address-Book-Cross-Site-Scripting-SQL-Injection.html">http://packetstormsecurity.com/files/129789/PHP-Address-Book-Cross-Site-Scripting-SQL-Injection.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42856">phpaddressbook-group-xss(42856)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/99624">phpaddressbook-grouppara-xss(99624)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5739">5739</ref>
    </refs>
    <vuln_soft>
      <prod name="php-address_book" vendor="php-address_book">
        <vers num="3.1.5" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2567" seq="2008-2567" published="2008-06-06" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Fenriru Sleipnir 2.7.1 Release2 and earlier, Portable Sleipnir 2.7.1 Release2 and earlier, and Grani 3.1 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to a history mechanism and favorites search, a different vulnerability than CVE-2007-6002.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="JVN" url="http://jvn.jp/jp/JVN25448394/index.html">JVN#25448394</ref>
      <ref source="CONFIRM" url="http://www.fenrir.co.jp/sleipnir/note.html">http://www.fenrir.co.jp/sleipnir/note.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29555" patch="1">29555</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42827">sleipnir-favoritesearch-xss(42827)</ref>
    </refs>
    <vuln_soft>
      <prod name="grani" vendor="fenrir">
        <vers num="3.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2568" seq="2008-2568" published="2008-06-06" modified="2017-10-18" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the Simple Shop Galore (com_simpleshop) component 3.4 and earlier for Joomla! allows remote attackers to execute arbitrary SQL commands via the catid parameter in a browse action to index.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29565">29565</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42871">simpleshopgalore-index-sql-injection(42871)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5743">5743</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5833">5833</ref>
    </refs>
    <vuln_soft>
      <prod name="com_simpleshop" vendor="joomla">
        <vers num="3.4" prev="1"/>
      </prod>
      <prod name="joomla" vendor="joomla">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2569" seq="2008-2569" published="2008-06-06" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the EasyBook (com_easybook) component 1.1 for Joomla! allows remote attackers to execute arbitrary SQL commands via the gbid parameter in a deleteentry action to index.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42853">easybook-gbid-sql-injection(42853)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5740">5740</ref>
    </refs>
    <vuln_soft>
      <prod name="easybook_component" vendor="joomla">
        <vers num="1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2570" seq="2008-2570" published="2008-06-06" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple unspecified vulnerabilities in LimeSurvey (formerly PHPSurveyor) before 1.71 have unknown impact and attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?group_id=74605&amp;release_id=603922">http://sourceforge.net/project/shownotes.php?group_id=74605&amp;release_id=603922</ref>
      <ref source="CONFIRM" url="http://www.limesurvey.org/content/view/102/1/lang,en/" patch="1">http://www.limesurvey.org/content/view/102/1/lang,en/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29506">29506</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42806">limesurvey-multiple-unspecified(42806)</ref>
    </refs>
    <vuln_soft>
      <prod name="limesurvey" vendor="limesurvey">
        <vers num="1.70" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2571" seq="2008-2571" published="2008-06-06" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site request forgery (CSRF) vulnerability in LimeSurvey (formerly PHPSurveyor) before 1.71 allows remote attackers to change arbitrary quotas as administrators via a "modify quota" action.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?group_id=74605&amp;release_id=603922">http://sourceforge.net/project/shownotes.php?group_id=74605&amp;release_id=603922</ref>
      <ref source="CONFIRM" url="http://www.limesurvey.org/content/view/102/1/lang,en/">http://www.limesurvey.org/content/view/102/1/lang,en/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29506" patch="1">29506</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42807">limesurvey-modifyquotaaction-csrf(42807)</ref>
    </refs>
    <vuln_soft>
      <prod name="limesurvey" vendor="limesurvey">
        <vers num="1.49"/>
        <vers num="1.52"/>
        <vers num="1.70" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2572" seq="2008-2572" published="2008-06-06" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in php/leer_comentarios.php in FlashBlog allows remote attackers to execute arbitrary SQL commands via the articulo_id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3927">3927</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492748/100/0/threaded">20080529 Flash Blog Sql Injection</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43040">flashblog-leercomentarios-sql-injection(43040)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5685">5685</ref>
    </refs>
    <vuln_soft>
      <prod name="flashblog" vendor="theflashblog">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2573" seq="2008-2573" published="2008-06-06" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="8.5" CVSS_base_score="8.5" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="6.8" CVSS_vector="(AV:N/AC:M/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in SFTP in freeSSHd 1.2.1 allows remote authenticated users to execute arbitrary code via a long directory name in an SSH_FXP_OPENDIR (aka opendir) command.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493180/100/0/threaded">20080606 FreeSSHD 1.2.1 (Post Auth) Remote Seh Overflow Exploit</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29453">29453</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020212">1020212</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1711/references">ADV-2008-1711</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5709">5709</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5751">5751</ref>
    </refs>
    <vuln_soft>
      <prod name="freesshd" vendor="freesshd">
        <vers num="1.2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2574" seq="2008-2574" published="2008-06-06" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unrestricted file upload vulnerability in admin/Editor/imgupload.php in FlashBlog 0.31 beta allows remote attackers to execute arbitrary code by uploading a .php file, then accessing it via a direct request to the file in tus_imagenes/.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3928">3928</ref>
      <ref source="MISC" url="http://www.dumenci.net/web-action/flashblog-beta0.31-remote-file-upload-vulnerability.html">http://www.dumenci.net/web-action/flashblog-beta0.31-remote-file-upload-vulnerability.html</ref>
      <ref source="MISC" url="http://www.flashblog.org">http://www.flashblog.org</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492738/100/0/threaded">20080529 FlashBlog Remote File Upload Vulnerability</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42820">flashblog-imgupload-file-upload(42820)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5728">5728</ref>
    </refs>
    <vuln_soft>
      <prod name="flashblog" vendor="flashblog">
        <vers num="0.31" edition="beta"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2575" seq="2008-2575" published="2008-06-06" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">cbrPager before 0.9.17 allows user-assisted remote attackers to execute arbitrary commands via shell metacharacters in a (1) ZIP (aka .cbz) or (2) RAR (aka .cbr) archive filename.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://cvs.fedoraproject.org/viewcvs/rpms/cbrpager/devel/cbrpager-0.9.16-filen-shell-escaping.patch?rev=1.2">http://cvs.fedoraproject.org/viewcvs/rpms/cbrpager/devel/cbrpager-0.9.16-filen-shell-escaping.patch?rev=1.2</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200806-05.xml">GLSA-200806-05</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/forum/forum.php?forum_id=827120" patch="1">http://sourceforge.net/forum/forum.php?forum_id=827120</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=601538&amp;group_id=119647" patch="1">http://sourceforge.net/project/shownotes.php?release_id=601538&amp;group_id=119647</ref>
      <ref source="CONFIRM" url="http://www.jcoppens.com/soft/cbrpager/log.en.php">http://www.jcoppens.com/soft/cbrpager/log.en.php</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1693/references">ADV-2008-1693</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=448285">https://bugzilla.redhat.com/show_bug.cgi?id=448285</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42741">cbrpager-archive-command-execution(42741)</ref>
    </refs>
    <vuln_soft>
      <prod name="cbrpager" vendor="jcoppens">
        <vers num="0.9.2"/>
        <vers num="0.9.3"/>
        <vers num="0.9.4"/>
        <vers num="0.9.5"/>
        <vers num="0.9.6"/>
        <vers num="0.9.7"/>
        <vers num="0.9.8"/>
        <vers num="0.9.9"/>
        <vers num="0.9.10"/>
        <vers num="0.9.11"/>
        <vers num="0.9.12"/>
        <vers num="0.9.13"/>
        <vers num="0.9.14"/>
        <vers num="0.9.15"/>
        <vers num="0.9.16"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2576" seq="2008-2576" published="2008-07-15" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.1" CVSS_vector="(AV:L/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the WebLogic Server component in Oracle BEA Product Suite 9.2, 9.1, 9.0, and 8.1 SP6 has unknown impact and local attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143">SSRT061201</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html">http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020498">1020498</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2109/references" adv="1">ADV-2008-2109</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2115" adv="1">ADV-2008-2115</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43828">oracle-weblogic-foreignjms-priv-escalation(43828)</ref>
    </refs>
    <vuln_soft>
      <prod name="bea_product_suite" vendor="oracle">
        <vers num="8.1" edition="sp6"/>
        <vers num="9.0"/>
        <vers num="9.1"/>
        <vers num="9.2"/>
      </prod>
      <prod name="weblogic_server" vendor="oracle">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2577" seq="2008-2577" published="2008-07-15" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:N/AC:H/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the WebLogic Server component in Oracle BEA Product Suite 9.2 MP1 has unknown impact and remote authenticated attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143">SSRT061201</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html">http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020498">1020498</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2109/references" adv="1">ADV-2008-2109</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2115" adv="1">ADV-2008-2115</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43826">oracle-weblogic-consolewlst-priv-escalation(43826)</ref>
    </refs>
    <vuln_soft>
      <prod name="bea_product_suite" vendor="oracle">
        <vers num="9.2" edition="mp1"/>
      </prod>
      <prod name="webloic_server_component" vendor="oracle">
        <vers num="9.2" edition="mp1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2578" seq="2008-2578" published="2008-07-15" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.1" CVSS_vector="(AV:L/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the WebLogic Server component in Oracle BEA Product Suite 10.0 and 9.2 MP1 has unknown impact and local attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143">SSRT061201</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html">http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020498">1020498</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2109/references" adv="1">ADV-2008-2109</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2115" adv="1">ADV-2008-2115</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43827">oracle-weblogic-log-priv-escalation(43827)</ref>
    </refs>
    <vuln_soft>
      <prod name="bea_product_suite" vendor="oracle">
        <vers num="9.2" edition="mp1"/>
        <vers num="10.0"/>
      </prod>
      <prod name="webloic_server_component" vendor="oracle">
        <vers num="9.2" edition="mp1"/>
        <vers num="10.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2579" seq="2008-2579" published="2008-07-15" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the WebLogic Server Plugins for Apache, Sun and IIS web servers component in Oracle BEA Product Suite 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, 7.0 SP7, and 6.1 SP7 has unknown impact and remote attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143">SSRT061201</ref>
      <ref source="JVN" url="http://jvn.jp/en/jp/JVN81667751/index.html">JVN#81667751</ref>
      <ref source="JVNDB" url="http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000040.html">JVNDB-2008-000040</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html">http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020498">1020498</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2109/references" adv="1">ADV-2008-2109</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2115" adv="1">ADV-2008-2115</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43823">oracle-weblogic-plugins-unauth-access(43823)</ref>
    </refs>
    <vuln_soft>
      <prod name="http_server" vendor="apache">
        <vers num=""/>
      </prod>
      <prod name="internet_information_server" vendor="microsoft">
        <vers num=""/>
      </prod>
      <prod name="bea_product_suite" vendor="oracle">
        <vers num="6.1" edition="sp7"/>
        <vers num="7.0" edition="sp7"/>
        <vers num="8.1" edition="sp6"/>
        <vers num="9.0"/>
        <vers num="9.1"/>
        <vers num="9.2" edition="mp3"/>
        <vers num="10.0" edition="mp1"/>
      </prod>
      <prod name="weblogic_server_component" vendor="oracle">
        <vers num="6.1" edition="sp7"/>
        <vers num="7.0" edition="sp7"/>
        <vers num="8.1" edition="sp6"/>
        <vers num="9.0"/>
        <vers num="9.1"/>
        <vers num="9.2" edition="mp3"/>
        <vers num="10.0" edition="mp1"/>
      </prod>
      <prod name="java_system_web_server" vendor="sun">
        <vers num=""/>
      </prod>
      <prod name="one_web_server" vendor="sun">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2580" seq="2008-2580" published="2008-07-15" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the WebLogic Server component in Oracle BEA Product Suite 10.0 MP1, 9.2 MP3, 9.1, and 9.0 has unknown impact and remote attack vectors.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143">SSRT061201</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html">http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020498">1020498</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2109/references" adv="1">ADV-2008-2109</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2115" adv="1">ADV-2008-2115</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43829">oracle-weblogic-jsp-info-disclosure(43829)</ref>
    </refs>
    <vuln_soft>
      <prod name="bea_product_suite" vendor="oracle">
        <vers num="9.0"/>
        <vers num="9.1"/>
        <vers num="9.2" edition="mp3"/>
        <vers num="10.0" edition="mp1"/>
      </prod>
      <prod name="weblogic_server_component" vendor="oracle">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2581" seq="2008-2581" published="2008-07-15" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.1" CVSS_base_score="5.1" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the WebLogic Server component in Oracle BEA Product Suite 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, and 7.0 SP7 has unknown impact and remote attack vectors related to UDDI Explorer.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143">SSRT061201</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html">http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020498">1020498</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2109/references" adv="1">ADV-2008-2109</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2115" adv="1">ADV-2008-2115</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43824">oracle-weblogic-uddiexplorer-unauth-access(43824)</ref>
    </refs>
    <vuln_soft>
      <prod name="bea_product_suite" vendor="oracle">
        <vers num="7.0" edition="sp7"/>
        <vers num="8.1" edition="sp6"/>
        <vers num="9.0"/>
        <vers num="9.1"/>
        <vers num="9.2" edition="mp3"/>
        <vers num="10.0" edition="mp1"/>
      </prod>
      <prod name="weblogic_server_component" vendor="oracle">
        <vers num="7.0" edition="sp7"/>
        <vers num="8.1" edition="sp6"/>
        <vers num="9.0"/>
        <vers num="9.1"/>
        <vers num="9.2" edition="mp3"/>
        <vers num="10.0" edition="mp1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2582" seq="2008-2582" published="2008-07-15" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the WebLogic Server component in Oracle BEA Product Suite 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, and 7.0 SP7 has unknown impact and remote attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143">SSRT061201</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html">http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020498">1020498</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2109/references" adv="1">ADV-2008-2109</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2115" adv="1">ADV-2008-2115</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43825">oracle-weblogic-dos(43825)</ref>
    </refs>
    <vuln_soft>
      <prod name="bea_product_suite" vendor="oracle">
        <vers num="7.0" edition="sp7"/>
        <vers num="8.1" edition="sp6"/>
        <vers num="9.0"/>
        <vers num="9.1"/>
        <vers num="9.2" edition="mp3"/>
        <vers num="10.0" edition="mp1"/>
      </prod>
      <prod name="weblogic_server_component" vendor="oracle">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2583" seq="2008-2583" published="2008-07-15" modified="2012-10-22" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the sample Discussion Forum Portlet for the Oracle Portal component in Oracle Application Server, as available from OTN before 20080715, has unknown impact and remote attack vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143">SSRT061201</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html">http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020494">1020494</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2109/references">ADV-2008-2109</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2115">ADV-2008-2115</ref>
    </refs>
    <vuln_soft>
      <prod name="application_server" vendor="oracle">
        <vers num=""/>
      </prod>
      <prod name="oracle_portal_component" vendor="oracle">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2584" seq="2008-2584" published="2017-05-11" modified="2017-05-11" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2008. Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2008-2585" seq="2008-2585" published="2008-07-15" modified="2012-10-22" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Oracle Report Manager component in Oracle E-Business Suite 12.0.4 has unknown impact and remote authenticated attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143">SSRT061201</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html">http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020495">1020495</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2109/references">ADV-2008-2109</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2115">ADV-2008-2115</ref>
    </refs>
    <vuln_soft>
      <prod name="e-business_suite" vendor="oracle">
        <vers num="12.0.4"/>
      </prod>
      <prod name="report_manager_component" vendor="oracle">
        <vers num="12.0.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2586" seq="2008-2586" published="2008-07-15" modified="2016-11-21" severity="Medium" CVSS_version="2.0" CVSS_score="4.0" CVSS_base_score="4.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Oracle Application Object Library component in Oracle E-Business Suite 12.0.4 has unknown impact and remote authenticated attack vectors, a different vulnerability than CVE-2008-2606.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143">SSRT061201</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html">http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020495">1020495</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2109/references">ADV-2008-2109</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2115">ADV-2008-2115</ref>
    </refs>
    <vuln_soft>
      <prod name="application_object_library" vendor="oracle">
        <vers num=""/>
      </prod>
      <prod name="e-business_suite" vendor="oracle">
        <vers num="12.0.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2587" seq="2008-2587" published="2008-07-15" modified="2012-10-22" severity="Low" CVSS_version="2.0" CVSS_score="1.5" CVSS_base_score="1.5" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="2.7" CVSS_vector="(AV:L/AC:M/Au:S/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Advanced Replication component in Oracle Database 9.0.1.5 FIPS+, 9.2.0.8, 9.2.0.8DV, 10.1.0.5, and 10.2.0.3 has unknown impact and local attack vectors.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143">SSRT061201</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html">http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020499">1020499</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2109/references">ADV-2008-2109</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2115">ADV-2008-2115</ref>
    </refs>
    <vuln_soft>
      <prod name="advanced_replication" vendor="oracle">
        <vers num=""/>
      </prod>
      <prod name="database_9i" vendor="oracle">
        <vers num="9.0.1.5" edition=":fips%2b"/>
        <vers num="9.2.0.8" edition="dv"/>
      </prod>
      <prod name="database_server" vendor="oracle">
        <vers num="10.1.0.5"/>
        <vers num="10.2.0.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2588" seq="2008-2588" published="2008-10-14" modified="2017-08-07" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Oracle JDeveloper component in Oracle Application Server 10.1.2.2 allows local users to affect confidentiality via unknown vectors.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpuoct2008-100299.html">http://www.oracle.com/technetwork/topics/security/cpuoct2008-100299.html</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1021054">1021054</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2825">ADV-2008-2825</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/45877">oracle-jdeveloper-info-disclosure(45877)</ref>
    </refs>
    <vuln_soft>
      <prod name="jdeveloper" vendor="oracle">
        <vers num="10.1.2.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2589" seq="2008-2589" published="2008-07-15" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Oracle Portal component in Oracle Application Server 9.0.4.3, 10.1.2.2, and 10.1.4.1 has unknown impact and remote attack vectors. NOTE: the previous information was obtained from the Oracle July 2008 CPU. Oracle has not commented on reliable researcher claims that this issue is a SQL injection vulnerability in the WWV_RENDER_REPORT package that allows remote attackers to execute arbitrary SQL (PL/SQL) commands via the second argument to the SHOW procedure.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143">SSRT061201</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html">http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/494410/100/0/threaded">20080715 Oracle Application Server PLSQL injection flaw</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020494">1020494</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2109/references" adv="1">ADV-2008-2109</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2115" adv="1">ADV-2008-2115</ref>
    </refs>
    <vuln_soft>
      <prod name="application_server" vendor="oracle">
        <vers num="9.0.4.3"/>
        <vers num="10.1.2.2"/>
        <vers num="10.1.4.1"/>
      </prod>
      <prod name="oracle_portal_component" vendor="oracle">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2590" seq="2008-2590" published="2008-07-15" modified="2012-10-22" severity="Low" CVSS_version="2.0" CVSS_score="3.5" CVSS_base_score="3.5" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="6.8" CVSS_vector="(AV:N/AC:M/Au:S/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Instance Management component in Oracle Database 10.1.0.5 and Enterprise Manager 10.1.0.6 has unknown impact and remote authenticated attack vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143">SSRT061201</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html">http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020496">1020496</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020499">1020499</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2109/references">ADV-2008-2109</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2115">ADV-2008-2115</ref>
    </refs>
    <vuln_soft>
      <prod name="database_server" vendor="oracle">
        <vers num="10.1.0.5"/>
      </prod>
      <prod name="enterprise_manager_10g" vendor="oracle">
        <vers num="10.1.0.6"/>
      </prod>
      <prod name="instance_management_component" vendor="oracle">
        <vers num="10.1.0.5"/>
        <vers num="10.1.0.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2591" seq="2008-2591" published="2008-07-15" modified="2012-10-22" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Oracle Database Vault component in Oracle Database 9.2.0.8DV, 10.2.0.3, and 11.1.0.6 has unknown impact and remote authenticated attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143">SSRT061201</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html">http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020499">1020499</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2109/references">ADV-2008-2109</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2115">ADV-2008-2115</ref>
    </refs>
    <vuln_soft>
      <prod name="database_9i" vendor="oracle">
        <vers num="9.2.0.8dv"/>
      </prod>
      <prod name="database_server" vendor="oracle">
        <vers num="10.2.0.3"/>
        <vers num="11.1.0.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2592" seq="2008-2592" published="2008-07-15" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.5" CVSS_base_score="5.5" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Advanced Replication component in Oracle Database 9.0.1.5 FIPS+, 9.2.0.8, 9.2.0.8DV, 10.1.0.5, 10.2.0.4, and 11.1.0.6 has unknown impact and remote authenticated attack vectors related to SYS.DBMS_DEFER_SYS. NOTE: the previous information was obtained from the Oracle July 2008 CPU. Oracle has not commented on reliable researcher claims that this is a SQL injection vulnerability in the DELETE_TRAN procedure.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143">SSRT061201</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html">http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/495094/100/0/threaded">20080804 Team SHATTER Security Advisory: SQL Injection in Oracle Database (DBMS_DEFER_SYS.DELETE_TRAN)</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/495336/100/0/threaded">20080811 Re: Team SHATTER Security Advisory: SQL Injection in Oracle Database (DBMS_DEFER_SYS.DELETE_TRAN)</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020499">1020499</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2109/references" adv="1">ADV-2008-2109</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2115" adv="1">ADV-2008-2115</ref>
    </refs>
    <vuln_soft>
      <prod name="advanced_replication_component" vendor="oracle">
        <vers num=""/>
      </prod>
      <prod name="database_server" vendor="oracle">
        <vers num="9.2.0.8"/>
        <vers num="10.1.0.5"/>
      </prod>
      <prod name="oracle_database" vendor="oracle">
        <vers num="9.0.1.5" edition=":fips%2b"/>
        <vers num="9.2.0.8" edition="dv"/>
        <vers num="10.2.0.4"/>
        <vers num="11.1.0.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2593" seq="2008-2593" published="2008-07-15" modified="2019-10-09" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Oracle Portal component in Oracle Application Server 10.1.2.3 and 10.1.4.2 has unknown impact and remote attack vectors, a different vulnerability than CVE-2008-2594.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html" adv="1">http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020494" adv="1">1020494</ref>
    </refs>
    <vuln_soft>
      <prod name="application_server_10g" vendor="oracle">
        <vers num="10.1.2.3"/>
        <vers num="10.1.4.2"/>
      </prod>
      <prod name="oracle_portal_component" vendor="oracle">
        <vers num="-"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2594" seq="2008-2594" published="2008-07-15" modified="2019-10-09" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Oracle Portal component in Oracle Application Server 10.1.2.3 and 10.1.4.2 has unknown impact and remote attack vectors, a different vulnerability than CVE-2008-2593.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html" adv="1">http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020494" adv="1">1020494</ref>
    </refs>
    <vuln_soft>
      <prod name="oracle_application_server" vendor="oracle">
        <vers num="10.1.2.3"/>
        <vers num="10.1.4.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2595" seq="2008-2595" published="2008-07-15" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Oracle Internet Directory component in Oracle Application Server 9.0.4.3, 10.1.2.3, and 10.1.4.2 has unknown impact and remote attack vectors.  NOTE: the previous information was obtained from the Oracle July 2008 CPU.  Oracle has not commented on reliable researcher claims that this issue is a denial of service (crash) via a malformed LDAP request that triggers a NULL pointer dereference.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143">SSRT061201</ref>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=725">20080715 Oracle Internet Directory Pre-Authentication LDAP DoS Vulnerability</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html">http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020494">1020494</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2109/references">ADV-2008-2109</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2115">ADV-2008-2115</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/6101">6101</ref>
    </refs>
    <vuln_soft>
      <prod name="database_10g" vendor="oracle">
        <vers num="10.1.2.3"/>
        <vers num="10.1.4.2"/>
      </prod>
      <prod name="database_9i" vendor="oracle">
        <vers num="9.0.4.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2596" seq="2008-2596" published="2008-07-15" modified="2012-10-22" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Mobile Application Server component in Oracle E-Business Suite 12.0.3 has unknown impact and remote authenticated attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143">SSRT061201</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html">http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020495">1020495</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2109/references">ADV-2008-2109</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2115">ADV-2008-2115</ref>
    </refs>
    <vuln_soft>
      <prod name="e-business_suite" vendor="oracle">
        <vers num="12.0.3"/>
      </prod>
      <prod name="mobile_application_server" vendor="oracle">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2597" seq="2008-2597" published="2008-07-15" modified="2012-10-22" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the TimesTen Client/Server component in Oracle Times Ten In-Memory Database 7.0.3.0.0 has unknown impact and remote attack vectors, a different vulnerability than CVE-2008-2598 and CVE-2008-2599.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143">SSRT061201</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html">http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020493">1020493</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2109/references">ADV-2008-2109</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2115">ADV-2008-2115</ref>
    </refs>
    <vuln_soft>
      <prod name="times_ten_client_server_component" vendor="oracle">
        <vers num=""/>
      </prod>
      <prod name="times_ten_in_memory_database" vendor="oracle">
        <vers num="7.0.3.0.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2598" seq="2008-2598" published="2008-07-15" modified="2012-10-22" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the TimesTen Client/Server component in Oracle Times Ten In-Memory Database 7.0.3.0.0 has unknown impact and remote attack vectors, a different vulnerability than CVE-2008-2597 and CVE-2008-2599.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143">SSRT061201</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html">http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020493">1020493</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2109/references">ADV-2008-2109</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2115">ADV-2008-2115</ref>
    </refs>
    <vuln_soft>
      <prod name="times_ten_client_server" vendor="oracle">
        <vers num="7.0.3.0.0"/>
      </prod>
      <prod name="times_ten_in_memory_database" vendor="oracle">
        <vers num="7.0.3.0.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2599" seq="2008-2599" published="2008-07-15" modified="2012-10-22" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the TimesTen Client/Server component in Oracle Times Ten In-Memory Database 7.0.3.0.0 has unknown impact and remote attack vectors, a different vulnerability than CVE-2008-2597 and CVE-2008-2598.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143">SSRT061201</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html">http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020493">1020493</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2109/references">ADV-2008-2109</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2115">ADV-2008-2115</ref>
    </refs>
    <vuln_soft>
      <prod name="times_ten_client_server" vendor="oracle">
        <vers num="7.0.3.0.0"/>
      </prod>
      <prod name="times_ten_in_memory_database" vendor="oracle">
        <vers num="7.0.3.0.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2600" seq="2008-2600" published="2008-07-15" modified="2012-10-22" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Oracle Spatial component in Oracle Database 10.1.0.5, 10.2.0.3, and 11.1.0.6 has unknown impact and remote authenticated attack vectors related to MDSYS.SDO_TOPO_MAP.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143">SSRT061201</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html">http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020499">1020499</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2109/references">ADV-2008-2109</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2115">ADV-2008-2115</ref>
    </refs>
    <vuln_soft>
      <prod name="database_server" vendor="oracle">
        <vers num="10.1.0.5"/>
        <vers num="10.2.0.3"/>
      </prod>
      <prod name="oracle_database" vendor="oracle">
        <vers num="11.1.0.6"/>
      </prod>
      <prod name="spatial_component" vendor="oracle">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2601" seq="2008-2601" published="2008-07-15" modified="2012-10-22" severity="Medium" CVSS_version="2.0" CVSS_score="5.5" CVSS_base_score="5.5" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Oracle iStore component in Oracle E-Business Suite 12.0.4 has unknown impact and remote authenticated attack vectors.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143">SSRT061201</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html">http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020495">1020495</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2109/references">ADV-2008-2109</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2115">ADV-2008-2115</ref>
    </refs>
    <vuln_soft>
      <prod name="e-business_suite" vendor="oracle">
        <vers num="12.0.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2602" seq="2008-2602" published="2008-07-15" modified="2012-10-22" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:N/AC:H/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Data Pump component in Oracle Database 10.1.0.5, 10.2.0.4, and 11.1.0.6 has unknown impact and remote authenticated attack vectors related to the IMP_FULL_DATABASE role.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143">SSRT061201</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html">http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020499">1020499</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2109/references">ADV-2008-2109</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2115">ADV-2008-2115</ref>
    </refs>
    <vuln_soft>
      <prod name="data_pump_component" vendor="oracle">
        <vers num=""/>
      </prod>
      <prod name="database_server" vendor="oracle">
        <vers num="10.1.0.5"/>
        <vers num="10.2.0.4"/>
        <vers num="11.1.0.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2603" seq="2008-2603" published="2008-07-15" modified="2018-10-11" severity="Low" CVSS_version="2.0" CVSS_score="3.5" CVSS_base_score="3.5" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="6.8" CVSS_vector="(AV:N/AC:M/Au:S/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Resource Manager component in Oracle Database 10.1.0.5, 10.2.0.4, and 11.1.0.6, and Database Control in Enterprise Manager, has unknown impact and remote authenticated attack vectors. NOTE: the previous information was obtained from the Oracle July 2008 CPU. Oracle has not commented on reliable researcher claims that this is a cross-site scripting (XSS) issue that allows remote attackers to inject arbitrary web script or HTML via the REFRESHCHOICE parameter in multiple web pages.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143">SSRT061201</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html">http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/495093/100/0/threaded">20080804 Team SHATTER Security Advisory: Cross-site scripting in Oracle Enterprise Manager (REFRESHCHOICE Parameter)</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020496">1020496</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020499">1020499</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2109/references" adv="1">ADV-2008-2109</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2115" adv="1">ADV-2008-2115</ref>
    </refs>
    <vuln_soft>
      <prod name="enterprise_manager" vendor="oracle">
        <vers num="10.1.0.5"/>
        <vers num="10.2.0.4"/>
        <vers num="11.1.0.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2604" seq="2008-2604" published="2008-07-15" modified="2016-11-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Authentication component in Oracle Database 11.1.0.6 has unknown impact and remote authenticated attack vectors, a different vulnerability than CVE-2008-2605.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143">SSRT061201</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html">http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020499">1020499</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2109/references">ADV-2008-2109</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2115">ADV-2008-2115</ref>
    </refs>
    <vuln_soft>
      <prod name="authentication_component" vendor="oracle">
        <vers num=""/>
      </prod>
      <prod name="database_server" vendor="oracle">
        <vers num="11.1.0.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2605" seq="2008-2605" published="2008-07-15" modified="2016-11-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.0" CVSS_base_score="4.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Authentication component in Oracle Database 11.1.0.6 has unknown impact and remote authenticated attack vectors, a different vulnerability than CVE-2008-2604.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143">SSRT061201</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html">http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020499">1020499</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2109/references">ADV-2008-2109</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2115">ADV-2008-2115</ref>
    </refs>
    <vuln_soft>
      <prod name="authentication_component" vendor="oracle">
        <vers num=""/>
      </prod>
      <prod name="database_server" vendor="oracle">
        <vers num="11.1.0.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2606" seq="2008-2606" published="2008-07-15" modified="2016-11-21" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Oracle Application Object Library component in Oracle E-Business Suite 12.0.4 has unknown impact and remote authenticated attack vectors, a different vulnerability than CVE-2008-2586.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143">SSRT061201</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html">http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020495">1020495</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2109/references">ADV-2008-2109</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2115">ADV-2008-2115</ref>
    </refs>
    <vuln_soft>
      <prod name="application_object_library" vendor="oracle">
        <vers num=""/>
      </prod>
      <prod name="e-business_suite" vendor="oracle">
        <vers num="12.0.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2607" seq="2008-2607" published="2008-07-15" modified="2012-10-22" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Advanced Queuing component in Oracle Database 9.2.0.8, 9.2.0.8DV, 10.1.0.5, 10.2.0.4, and 11.1.0.6 has unknown impact and remote authenticated attack vectors related to SYS.DBMS_AQELM.  NOTE: the previous information was obtained from the Oracle July 2008 CPU.  Oracle has not commented on reliable researcher claims that this issue is a buffer overflow that allows attackers to cause a denial of service (database corruption) and possibly execute arbitrary code via a long argument to an unspecified procedure.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143">SSRT061201</ref>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=726">20080715 Oracle Database DBMS_AQELM Package Buffer Overflow Vulnerability</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html">http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020499">1020499</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2109/references" adv="1">ADV-2008-2109</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2115" adv="1">ADV-2008-2115</ref>
    </refs>
    <vuln_soft>
      <prod name="advanced_queuing_component" vendor="oracle">
        <vers num=""/>
      </prod>
      <prod name="database_9i" vendor="oracle">
        <vers num="9.2.0.8" edition="dv"/>
      </prod>
      <prod name="database_server" vendor="oracle">
        <vers num="10.1.0.5"/>
        <vers num="10.2.0.4"/>
        <vers num="11.1.0.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2608" seq="2008-2608" published="2008-07-15" modified="2012-10-22" severity="Medium" CVSS_version="2.0" CVSS_score="4.0" CVSS_base_score="4.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Data Pump component in Oracle Database 10.1.0.5 and 10.2.0.3 has unknown impact and remote authenticated attack vectors related to SYS.KUPF$FILE_INT.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143">SSRT061201</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html">http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020499">1020499</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2109/references">ADV-2008-2109</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2115">ADV-2008-2115</ref>
    </refs>
    <vuln_soft>
      <prod name="data_pump_component" vendor="oracle">
        <vers num=""/>
      </prod>
      <prod name="database_server" vendor="oracle">
        <vers num="10.1.0.5"/>
        <vers num="10.2.0.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2609" seq="2008-2609" published="2008-07-15" modified="2012-10-22" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Oracle Portal component in Oracle Application Server 9.0.4.3, 10.1.2.3, and 10.1.4.2 has unknown impact and remote attack vectors.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143">SSRT061201</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html">http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020494">1020494</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2109/references">ADV-2008-2109</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2115">ADV-2008-2115</ref>
    </refs>
    <vuln_soft>
      <prod name="application_server" vendor="oracle">
        <vers num="9.0.4.3"/>
      </prod>
      <prod name="oracle_application_server" vendor="oracle">
        <vers num="10.1.2.3"/>
        <vers num="10.1.4.2"/>
      </prod>
      <prod name="oracle_portal_component" vendor="oracle">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2610" seq="2008-2610" published="2008-07-15" modified="2012-10-22" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Oracle Applications Technology Stack component in Oracle E-Business Suite 12.0.4 has unknown impact and remote authenticated attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143">SSRT061201</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html">http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020495">1020495</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2109/references">ADV-2008-2109</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2115">ADV-2008-2115</ref>
    </refs>
    <vuln_soft>
      <prod name="e-business_suite" vendor="oracle">
        <vers num="12.0.4"/>
      </prod>
      <prod name="oracle_applications_technology_stack_component" vendor="oracle">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2611" seq="2008-2611" published="2008-07-15" modified="2012-10-22" severity="Medium" CVSS_version="2.0" CVSS_score="4.0" CVSS_base_score="4.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Core RDBMS component in Oracle Database 9.0.1.5 FIPS+, 9.2.0.8, 9.2.0.8DV, 10.1.0.5, 10.2.0.4, and 11.1.0.6 has unknown impact and remote authenticated attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143">SSRT061201</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html">http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020499">1020499</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2109/references">ADV-2008-2109</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2115">ADV-2008-2115</ref>
    </refs>
    <vuln_soft>
      <prod name="core_rdbms_component" vendor="oracle">
        <vers num=""/>
      </prod>
      <prod name="database_server" vendor="oracle">
        <vers num="10.1.0.5"/>
      </prod>
      <prod name="oracle_database" vendor="oracle">
        <vers num="9.0.1.5" edition=":fips%2b"/>
        <vers num="9.2.0.8" edition="dv"/>
        <vers num="10.2.0.4"/>
        <vers num="11.1.0.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2612" seq="2008-2612" published="2008-07-15" modified="2012-10-22" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Hyperion BI Plus component in Oracle Application Server 8.3.2.4, 8.5.0.3, 9.2.0.3, 9.2.1.0, and 9.3.1.0 has unknown impact and remote attack vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143">SSRT061201</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html">http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020494">1020494</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2109/references">ADV-2008-2109</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2115">ADV-2008-2115</ref>
    </refs>
    <vuln_soft>
      <prod name="hyperion_bi_plus_component" vendor="oracle">
        <vers num=""/>
      </prod>
      <prod name="oracle_application_server" vendor="oracle">
        <vers num="8.3.2.4"/>
        <vers num="8.5.0.3"/>
        <vers num="9.2.0.3"/>
        <vers num="9.2.1.0"/>
        <vers num="9.3.1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2613" seq="2008-2613" published="2008-07-15" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Database Scheduler component in Oracle Database 10.2.0.4 and 11.1.0.6 has unknown impact and local attack vectors. NOTE: the previous information was obtained from the Oracle July 2008 CPU. Oracle has not commented on reliable researcher claims that this is an untrusted search path issue that allows local users to gain privileges via a malicious (1) libclntsh.so or (2) libnnz10.so library.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143">SSRT061201</ref>
      <ref source="IDEFENSE" url="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=727">20080715 Oracle Database Local Untrusted Library Path Vulnerability</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html">http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/494544/100/0/threaded">20080719 Oracle Database Local Untrusted Library Path Vulnerability</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020499">1020499</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2109/references" adv="1">ADV-2008-2109</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2115" adv="1">ADV-2008-2115</ref>
    </refs>
    <vuln_soft>
      <prod name="database_scheduler" vendor="oracle">
        <vers num=""/>
      </prod>
      <prod name="database_server" vendor="oracle">
        <vers num="10.2.0.4"/>
        <vers num="11.1.0.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2614" seq="2008-2614" published="2008-07-15" modified="2012-10-22" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Oracle HTTP Server component in Oracle Application Server 9.0.4.3, 10.1.2.3, and 10.1.3.3 has unknown impact and remote attack vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143">SSRT061201</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html">http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020494">1020494</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2109/references">ADV-2008-2109</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2115">ADV-2008-2115</ref>
    </refs>
    <vuln_soft>
      <prod name="application_server" vendor="oracle">
        <vers num="9.0.4.3"/>
        <vers num="10.1.3.3"/>
      </prod>
      <prod name="oracle_application_server" vendor="oracle">
        <vers num="10.1.2.3"/>
      </prod>
      <prod name="oracle_http_server_component" vendor="oracle">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2615" seq="2008-2615" published="2008-07-15" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the PeopleSoft PeopleTools component in Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne 8.48.17 and 8.49.11 has unknown impact and remote authenticated attack vectors, a different vulnerability than CVE-2008-2616, CVE-2008-2617, CVE-2008-2618, CVE-2008-2620, CVE-2008-2621, and CVE-2008-2622.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html" adv="1">http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020497" adv="1">1020497</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43816">oracle-peoplesoft-peoptools-priv-escalation1(43816)</ref>
    </refs>
    <vuln_soft>
      <prod name="jd_edwards_enterpriseone" vendor="oracle">
        <vers num="8.48.17"/>
        <vers num="8.49.11"/>
      </prod>
      <prod name="peoplesoft_enterprise" vendor="oracle">
        <vers num="8.48.17"/>
        <vers num="8.49.11"/>
      </prod>
      <prod name="peoplesoft_peopletools_component" vendor="oracle">
        <vers num="-"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2616" seq="2008-2616" published="2008-07-15" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the PeopleSoft PeopleTools component in Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne 8.48.17 and 8.49.11 has unknown impact and remote authenticated attack vectors, a different vulnerability than CVE-2008-2615, CVE-2008-2617, CVE-2008-2618, CVE-2008-2620, CVE-2008-2621, and CVE-2008-2622.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143">SSRT061201</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html" adv="1">http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020497" adv="1">1020497</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43818">oracle-peoplesoft-peoptools-unspecified(43818)</ref>
    </refs>
    <vuln_soft>
      <prod name="jd_edwards_enterpriseone" vendor="oracle">
        <vers num="8.48.17"/>
        <vers num="8.49.11"/>
      </prod>
      <prod name="peoplesoft_enterprise" vendor="oracle">
        <vers num="8.48.17"/>
        <vers num="8.49.11"/>
      </prod>
      <prod name="peoplesoft_peopletools" vendor="oracle">
        <vers num="8.48.17"/>
        <vers num="8.49.11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2617" seq="2008-2617" published="2008-07-15" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the PeopleSoft PeopleTools component in Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne 8.48.17 and 8.49.11 has unknown impact and remote authenticated attack vectors, a different vulnerability than CVE-2008-2615, CVE-2008-2616, CVE-2008-2618, CVE-2008-2620, CVE-2008-2621, and CVE-2008-2622.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html" adv="1">http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020497" adv="1">1020497</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43819">oracle-peoplesoft-enterprise-unspecified(43819)</ref>
    </refs>
    <vuln_soft>
      <prod name="jd_edwards_enterpriseone" vendor="oracle">
        <vers num="8.48.17"/>
        <vers num="8.49.11"/>
      </prod>
      <prod name="peoplesoft_enterprise" vendor="oracle">
        <vers num="8.48.17"/>
        <vers num="8.49.11"/>
      </prod>
      <prod name="peoplesoft_peopletools_component" vendor="oracle">
        <vers num="-"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2618" seq="2008-2618" published="2008-07-15" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the PeopleSoft PeopleTools component in Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne 8.48.17 and 8.49.11 has unknown impact and remote authenticated attack vectors, a different vulnerability than CVE-2008-2615, CVE-2008-2616, CVE-2008-2617, CVE-2008-2620, CVE-2008-2621, and CVE-2008-2622.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143">SSRT061201</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html" adv="1">http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020497" adv="1">1020497</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43820">oracle-peopletools-privilege-escalation(43820)</ref>
    </refs>
    <vuln_soft>
      <prod name="jd_edwards_enterpriseone" vendor="oracle">
        <vers num="8.48.17"/>
        <vers num="8.49.11"/>
      </prod>
      <prod name="peoplesoft_enterprise" vendor="oracle">
        <vers num="8.48.17"/>
        <vers num="8.49.11"/>
      </prod>
      <prod name="peoplesoft_peopletools_component" vendor="oracle">
        <vers num="-"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2619" seq="2008-2619" published="2008-10-14" modified="2017-08-07" severity="Low" CVSS_version="2.0" CVSS_score="1.7" CVSS_base_score="1.7" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.1" CVSS_vector="(AV:L/AC:L/Au:S/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Oracle Reports Developer component in Oracle Application Server 1.0.2.2, 9.0.4.3, and 10.1.2.2, and E-Business Suite 11.5.10.2, allows remote authenticated users to affect availability via unknown vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpuoct2008-100299.html">http://www.oracle.com/technetwork/topics/security/cpuoct2008-100299.html</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1021054">1021054</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1021057">1021057</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2825">ADV-2008-2825</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/45878">oracle-appserver-reportsdev-dos(45878)</ref>
    </refs>
    <vuln_soft>
      <prod name="application_server" vendor="oracle">
        <vers num="1.0.2.2"/>
        <vers num="9.0.4.3"/>
        <vers num="10.1.2.2"/>
      </prod>
      <prod name="e-business_suite" vendor="oracle">
        <vers num="11.5.10.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2620" seq="2008-2620" published="2008-07-15" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the PeopleSoft PeopleTools component in Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne 8.48.17 and 8.49.11 has unknown impact and remote authenticated attack vectors, a different vulnerability than CVE-2008-2615, CVE-2008-2616, CVE-2008-2617, CVE-2008-2618, CVE-2008-2621, and CVE-2008-2622.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143">SSRT061201</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html" adv="1">http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020497" adv="1">1020497</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43821">oracle-peopsoft-peopletools-unspecified(43821)</ref>
    </refs>
    <vuln_soft>
      <prod name="jd_edwards_enterpriseone" vendor="oracle">
        <vers num="8.48.17"/>
        <vers num="8.49.11"/>
      </prod>
      <prod name="peoplesoft_enterprise" vendor="oracle">
        <vers num="8.48.17"/>
        <vers num="8.49.11"/>
      </prod>
      <prod name="peoplesoft_peopletools_component" vendor="oracle">
        <vers num="-"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2621" seq="2008-2621" published="2008-07-15" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.0" CVSS_base_score="4.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the PeopleSoft PeopleTools component in Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne 8.48.17 and 8.49.11 has unknown impact and remote authenticated attack vectors, a different vulnerability than CVE-2008-2615, CVE-2008-2616, CVE-2008-2617, CVE-2008-2618, CVE-2008-2620, and CVE-2008-2622.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143">SSRT061201</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html" adv="1">http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020497" adv="1">1020497</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43822">oracle-peopsoft-peoptools-unspecified(43822)</ref>
    </refs>
    <vuln_soft>
      <prod name="jd_edwards_enterpriseone" vendor="oracle">
        <vers num="8.48.17"/>
        <vers num="8.49.11"/>
      </prod>
      <prod name="peoplesoft_enterprise" vendor="oracle">
        <vers num="8.48.17"/>
        <vers num="8.49.11"/>
      </prod>
      <prod name="peoplesoft_peopletools_component" vendor="oracle">
        <vers num="-"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2622" seq="2008-2622" published="2008-07-15" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the PeopleSoft PeopleTools component in Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne 8.48.17 and 8.49.11 has unknown impact and remote authenticated attack vectors, a different vulnerability than CVE-2008-2615, CVE-2008-2616, CVE-2008-2617, CVE-2008-2618, CVE-2008-2620, and CVE-2008-2621.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html" adv="1">http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020497" adv="1">1020497</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43817">oracle-peoplesoft-peoptools-priv-escalation2(43817)</ref>
    </refs>
    <vuln_soft>
      <prod name="jd_edwards_enterpriseone" vendor="oracle">
        <vers num="8.48.17"/>
        <vers num="8.49.11"/>
      </prod>
      <prod name="peoplesoft_enterprise" vendor="oracle">
        <vers num="8.48.17"/>
        <vers num="8.49.11"/>
      </prod>
      <prod name="peoplesoft_peopletools_component" vendor="oracle">
        <vers num="-"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2623" seq="2008-2623" published="2009-01-13" modified="2012-10-22" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Oracle JDeveloper component in Oracle Application Server 10.1.2.3 allows local users to affect confidentiality via unknown vectors.</descript>
      <descript source="nvd">Note 2 in Oracle Application Server Risk Matrix states "The versions in the matrix refer to standalone versions of JDeveloper."  Therefore, Oracle Application Server was not included in the CPE configuration.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujan2009-097901.html">http://www.oracle.com/technetwork/topics/security/cpujan2009-097901.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/33177">33177</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1021572">1021572</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/0115">ADV-2009-0115</ref>
    </refs>
    <vuln_soft>
      <prod name="jdeveloper" vendor="oracle">
        <vers num="10.1.2.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2624" seq="2008-2624" published="2008-10-14" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Oracle OLAP component in Oracle Database 10.1.0.5 allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpuoct2008-100299.html">http://www.oracle.com/technetwork/topics/security/cpuoct2008-100299.html</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1021050">1021050</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2825">ADV-2008-2825</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/45879">oracle-db-olap-unauth-access(45879)</ref>
    </refs>
    <vuln_soft>
      <prod name="database_10g" vendor="oracle">
        <vers num="10.1.0.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2625" seq="2008-2625" published="2008-10-14" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.0" CVSS_base_score="4.0" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Core RDBMS component in Oracle Database 9.2.0.8, 9.2.0.8DV, 10.1.0.5, and 10.2.0.2 allows remote attackers to affect confidentiality and integrity via unknown vectors. NOTE: the previous information was obtained from the Oracle October 2008 CPU. Oracle has not commented on reliable researcher claims that this issue involves an authentication bypass by establishing a TNS connection and impersonating a user session via a crafted authentication message during proxy authentication mode.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpuoct2008-100299.html">http://www.oracle.com/technetwork/topics/security/cpuoct2008-100299.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/497539/100/0/threaded">20081019 CVE-2008-2625: Oracle DBMS ? Proxy Authentication Vulnerability</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1021050">1021050</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2825" adv="1">ADV-2008-2825</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/45880">oracle-db-corerdbms-unauth-access(45880)</ref>
    </refs>
    <vuln_soft>
      <prod name="database_10g" vendor="oracle">
        <vers num="10.1.0.5"/>
        <vers num="10.2.0.2"/>
      </prod>
      <prod name="database_9i" vendor="oracle">
        <vers num="9.2.0.8"/>
        <vers num="9.2.0.8dv"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2626" seq="2008-2626" published="2008-06-09" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in comment.asp in Battle Blog 1.25 and earlier allows remote attackers to execute arbitrary SQL commands via the entry parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.davethewebguy.com/battleblog/article.asp?entry=24">http://www.davethewebguy.com/battleblog/article.asp?entry=24</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29507">29507</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1737/references">ADV-2008-1737</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42818">battleblog-comment-sql-injection(42818)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5731">5731</ref>
    </refs>
    <vuln_soft>
      <prod name="battleblog" vendor="battleblog">
        <vers num="1.0d" edition="build_3"/>
        <vers num="1.0d" edition="build_4"/>
        <vers num="1.0d" edition="build_5"/>
        <vers num="1.0d" edition="build_5a"/>
        <vers num="1.0d" edition="build_6"/>
        <vers num="1.05" edition="build_1"/>
        <vers num="1.20" edition="build_1"/>
        <vers num="1.20" edition="build_2"/>
        <vers num="1.20" edition="build_3"/>
        <vers num="1.25" prev="1" edition="build_4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2627" seq="2008-2627" published="2008-06-09" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the IDoBlog (com_idoblog) component b24 and earlier and 1.0, a component for Joomla!, allows remote attackers to execute arbitrary SQL commands via the userid parameter in a userblog action to index.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42819">idoblog-index-sql-injection(42819)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5730">5730</ref>
    </refs>
    <vuln_soft>
      <prod name="com_idoblog" vendor="joomla">
        <vers num="b24" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2628" seq="2008-2628" published="2008-06-09" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the eQuotes (com_equotes) component 0.9.4 for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter to index.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42805">equotes-index-sql-injection(42805)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5723">5723</ref>
    </refs>
    <vuln_soft>
      <prod name="com_equotes" vendor="ron_liskey">
        <vers num="0.9.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2629" seq="2008-2629" published="2008-06-09" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the LifeType (formerly pLog) module for Drupal allows remote attackers to execute arbitrary SQL commands via the albumId parameter in a ViewAlbum action to index.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29495">29495</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42808">plog-index-sql-injection(42808)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5724">5724</ref>
    </refs>
    <vuln_soft>
      <prod name="lifetype" vendor="lifetype">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2630" seq="2008-2630" published="2008-06-09" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the JooBlog (com_jb2) component 0.1.1 for Joomla! allows remote attackers to execute arbitrary SQL commands via the CategoryID parameter in a category action to index.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1736/references">ADV-2008-1736</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42838">jooblog-index-sql-injection(42838)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5734">5734</ref>
    </refs>
    <vuln_soft>
      <prod name="com_jb2" vendor="joomla">
        <vers num="0.1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2631" seq="2008-2631" published="2008-06-09" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The WordClient interface in Alt-N Technologies MDaemon 9.6.5 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted HTTP POST request. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42809">worldclient-worldclient-dos(42809)</ref>
    </refs>
    <vuln_soft>
      <prod name="mdaemon" vendor="altn">
        <vers num="9.6.5" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2632" seq="2008-2632" published="2008-06-09" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the acctexp (com_acctexp) component 0.12.x and earlier for Joomla! allows remote attackers to execute arbitrary SQL commands via the usage parameter in a subscribe action to index.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42794">acctexp-index-sql-injection(42794)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5721">5721</ref>
    </refs>
    <vuln_soft>
      <prod name="com_acctexp" vendor="joomla">
        <vers num="0.12"/>
      </prod>
      <prod name="joomla" vendor="joomla">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2633" seq="2008-2633" published="2008-06-09" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in the EXP JoomRadio (com_joomradio) component 1.0 for Joomla! allow remote attackers to execute arbitrary SQL commands via the id parameter in a (1) show_radio or (2) show_video action to index.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://packetstormsecurity.org/0806-exploits/joomlajoomradio-sql.txt">http://packetstormsecurity.org/0806-exploits/joomlajoomradio-sql.txt</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/501069/100/0/threaded">20090218 Re: [Full-disclosure] Joomla Component com_joomradio SQL Injection</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29504">29504</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42814">expjoomradio-id-sql-injection(42814)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5729">5729</ref>
    </refs>
    <vuln_soft>
      <prod name="com_joomradio" vendor="joomla">
        <vers num="1.0"/>
      </prod>
      <prod name="joomla" vendor="joomla">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2634" seq="2008-2634" published="2008-06-09" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.asp in I-Pos Internet Pay Online Store 1.3 Beta and earlier allows remote attackers to execute arbitrary SQL commands via the item parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42786">ipos-item-sql-injection(42786)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5717">5717</ref>
    </refs>
    <vuln_soft>
      <prod name="i-pos_internet_pay_online_store" vendor="bearrivernet.net">
        <vers num="1.1" edition="beta"/>
        <vers num="1.3" prev="1" edition="beta"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2635" seq="2008-2635" published="2008-06-09" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple directory traversal vulnerabilities in BitKinex 2.9.3 allow remote FTP and WebDAV servers to create or overwrite arbitrary files via a .. (dot dot) in (1) a response to a LIST command from the BitKinex FTP client and (2) a response to a PROPFIND command from the BitKinex WebDAV client.  NOTE: this can be leveraged for code execution by writing to a Startup folder.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://vuln.sg/bitkinex293-en.html">http://vuln.sg/bitkinex293-en.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1738/references">ADV-2008-1738</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42842">bitkinex-webdav-ftp-directory-traversal(42842)</ref>
    </refs>
    <vuln_soft>
      <prod name="bitkinex" vendor="barad_dur">
        <vers num="2.9.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2636" seq="2008-2636" published="2008-06-09" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">The HTTP service on the Cisco Linksys WRH54G with firmware 1.01.03 allows remote attackers to cause a denial of service (management interface outage) or possibly execute arbitrary code via a URI that begins with a "/./" sequence, contains many instances of a "front_page" sequence, and ends with a ".asp" sequence.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3929">3929</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493129/100/0/threaded">20080605 Remote DoS vulnerability in Linksys WRH54G</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020237">1020237</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1772/references">ADV-2008-1772</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42890">linksys-wrh54g-http-dos(42890)</ref>
    </refs>
    <vuln_soft>
      <prod name="linksys_wrh54g_router" vendor="cisco">
        <vers num="1.01.03"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2637" seq="2008-2637" published="2008-06-09" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in F5 FirePass SSL VPN 6.0.2 hotfix 3, and possibly earlier versions, allow remote attackers to inject arbitrary web script or HTML via quotes in (1) the css_exceptions parameter in vdesk/admincon/webyfiers.php and (2) the sql_matchscope parameter in vdesk/admincon/index.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3931">3931</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493149/100/0/threaded">20080605 F5 FirePass Content Inspection Management XSS</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29574">29574</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020205">1020205</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1765/references" adv="1">ADV-2008-1765</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42884">firepass-webyfiers-index-xss(42884)</ref>
    </refs>
    <vuln_soft>
      <prod name="firepass_ssl_vpn" vendor="f5">
        <vers num="6.0.2" edition="hotfix_3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2638" seq="2008-2638" published="2008-06-09" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Static code injection vulnerability in guestbook.php in 1Book 1.0.1 and earlier allows remote attackers to upload arbitrary PHP code via the message parameter in an HTML webform, which is written to data.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://1scripts.net/php-scripts/index.php?p=16">http://1scripts.net/php-scripts/index.php?p=16</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1735/references">ADV-2008-1735</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42854">1book-guestbook-code-execution(42854)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5736">5736</ref>
    </refs>
    <vuln_soft>
      <prod name="1-book" vendor="1-script">
        <vers num="1.0.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2639" seq="2008-2639" published="2008-06-16" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.6" CVSS_base_score="7.6" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the ODBC server service in Citect CitectSCADA 6 and 7, and CitectFacilities 7, allows remote attackers to execute arbitrary code via a long string in the second application packet in a TCP session on port 20222.</descript>
      <descript source="nvd">The vulnerability found in CitectSCADA could allow a remote un-authenticated attacker to force an abnormal termination of the vulnerable software (Denial of Service) or to execute arbitrary code on vulnerable systems to gain complete control of the software. The CitectSCADA and CitectFacilities applications include ODBC server capabilities to provide remote SQL access to a relational database. For that purpose, an ODBC Server component is used to service requests from clients on TCP/IP networks. Requests are serviced over a TCP high-port in which the application layer protocol reads an initial packet that specifies the length of data and then a second packet of data, of the same length is then read. Once the data is read from the network, it is then copied to an internal buffer of fixed size allocated in the stack without previously verifying that the buffer is big enough to store all the read data.

The vulnerability is related to a lack of a proper length-checking on data read from the network. A specially crafted combination of length and data packets could be used to exploit the vulnerability allowing an un-authenticated attacker to execute arbitrary code on vulnerable systems.

The bug is a texbook example of classic simple stack-based buffer overflow vulnerabilities of the 1990s that can be exploited by overwriting the return address of the currently running thread.

Fixes and Workarounds:

User organizations should deploy the vendor patch, which is available upon request at http://www.citect.com/ or disable the vulnerable service (ODBC server) if it is not needed in their particular installation.</descript>
    </desc>
    <impacts>
      <impact source="nvd">The access complexity for this vulnerability is set at High due to the fact that exploiting this vulnerability requires the SCADA system to be connected to the internet and the client needs to be using ODBC technology.  SCADA systems are not typically installed to connect to the internet for security purposes.  While the vendor acknowledges that this vulnerability exists and will provide a patch upon request, they point out that this can be easily mitigated by ensuring SCADA systems (not limited to Citect products) are not connected to the internet.
</impact>
    </impacts>
    <sols>
      <sol source="nvd">Citect will provide a patch upon request to mitigate this vulnerability.  Please see the following press release for more information:

http://www.citect.com/documents/news_and_media/pr-citect-address-security.pdf

For further information on properly securing SCADA systems, please see the following whitepaper published by Citect:

http://www.citect.com/documents/whitepapers/scada-security-whitepaper.pdf</sol>
    </sols>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://isc.sans.org/diary.html?storyid=4556">http://isc.sans.org/diary.html?storyid=4556</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3944">3944</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020241">1020241</ref>
      <ref source="MISC" url="http://www.coresecurity.com/?action=item&amp;id=2186">http://www.coresecurity.com/?action=item&amp;id=2186</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/476345">VU#476345</ref>
      <ref source="CONFIRM" url="http://www.kb.cert.org/vuls/id/CTAR-7ENQNH">http://www.kb.cert.org/vuls/id/CTAR-7ENQNH</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493272/100/0/threaded">20080611 CORE-2008-0125: CitectSCADA ODBC service vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29634">29634</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1834/references">ADV-2008-1834</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42992">citectscada-odbc-bo(42992)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/6387">6387</ref>
    </refs>
    <vuln_soft>
      <prod name="citectfacilities" vendor="citect">
        <vers num="7"/>
      </prod>
      <prod name="citectscada" vendor="citect">
        <vers num="6"/>
        <vers num="7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2640" seq="2008-2640" published="2008-06-18" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in the Flex 3 History Management feature in Adobe Flex 3.0.1 SDK and Flex Builder 3, and generated applications, allow remote attackers to inject arbitrary web script or HTML via the anchor identifier to (1) client-side-detection-with-history/history/historyFrame.html, (2) express-installation-with-history/history/historyFrame.html, or (3) no-player-detection-with-history/history/historyFrame.html in templates/html-templates/.  NOTE: Firefox 2.0 and possibly other browsers prevent exploitation.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://blog.watchfire.com/wfblog/2008/06/javascript-code.html">http://blog.watchfire.com/wfblog/2008/06/javascript-code.html</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020301">1020301</ref>
      <ref source="CONFIRM" url="http://www.adobe.com/support/security/bulletins/apsb08-14.html" patch="1">http://www.adobe.com/support/security/bulletins/apsb08-14.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29778" patch="1">29778</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1862">ADV-2008-1862</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43150">adobeflex-historymanagement-xss(43150)</ref>
    </refs>
    <vuln_soft>
      <prod name="flex" vendor="adobe">
        <vers num="3.0.1" edition=":sdk"/>
      </prod>
      <prod name="flex_builder" vendor="adobe">
        <vers num="3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2641" seq="2008-2641" published="2008-06-25" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Adobe Reader and Acrobat 7.0.9 and earlier, and 8.0 through 8.1.2, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors, related to an "input validation issue in a JavaScript method."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://isc.sans.org/diary.html?storyid=4616">http://isc.sans.org/diary.html?storyid=4616</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00001.html">SUSE-SR:2008:016</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-240106-1">240106</ref>
      <ref source="CONFIRM" url="http://www.adobe.com/support/security/bulletins/apsb08-15.html" patch="1">http://www.adobe.com/support/security/bulletins/apsb08-15.html</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200808-10.xml">GLSA-200808-10</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/788019">VU#788019</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0641.html">RHSA-2008:0641</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29908" patch="1">29908</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020352">1020352</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1906">ADV-2008-1906</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2289">ADV-2008-2289</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43307">adobe-javascript-method-code-execution(43307)</ref>
    </refs>
    <vuln_soft>
      <prod name="acrobat_3d" vendor="adobe">
        <vers num="7.0" edition=":professional"/>
        <vers num="7.0" edition=":standard"/>
        <vers num="7.0.0" edition=":professional"/>
        <vers num="7.0.0" edition=":standard"/>
        <vers num="7.0.1" edition=":professional"/>
        <vers num="7.0.1" edition=":standard"/>
        <vers num="7.0.2" edition=":professional"/>
        <vers num="7.0.2" edition=":standard"/>
        <vers num="7.0.3" edition=":professional"/>
        <vers num="7.0.3" edition=":standard"/>
        <vers num="7.0.4" edition=":professional"/>
        <vers num="7.0.4" edition=":standard"/>
        <vers num="7.0.5" edition=":professional"/>
        <vers num="7.0.5" edition=":standard"/>
        <vers num="7.0.6" edition=":professional"/>
        <vers num="7.0.6" edition=":standard"/>
        <vers num="7.0.7" edition=":professional"/>
        <vers num="7.0.7" edition=":standard"/>
        <vers num="7.0.8" edition=":professional"/>
        <vers num="7.0.8" edition=":standard"/>
        <vers num="7.0.9" edition=":professional"/>
        <vers num="7.0.9" edition=":standard"/>
        <vers num="8.1" edition=":professional"/>
        <vers num="8.1" edition=":standard"/>
        <vers num="8.1.1" edition=":professional"/>
        <vers num="8.1.1" edition=":standard"/>
        <vers num="8.1.2" edition=":professional"/>
        <vers num="8.1.2" edition=":standard"/>
      </prod>
      <prod name="acrobat_reader" vendor="adobe">
        <vers num="3.0"/>
        <vers num="4.0"/>
        <vers num="4.0.5"/>
        <vers num="4.5"/>
        <vers num="5.0"/>
        <vers num="5.0.5"/>
        <vers num="5.0.6"/>
        <vers num="5.0.7"/>
        <vers num="5.0.9"/>
        <vers num="5.0.10"/>
        <vers num="5.0.11"/>
        <vers num="5.1"/>
        <vers num="6.0"/>
        <vers num="6.0.1"/>
        <vers num="6.0.2"/>
        <vers num="6.0.3"/>
        <vers num="6.0.4"/>
        <vers num="6.0.5"/>
        <vers num="7.0"/>
        <vers num="7.0.1"/>
        <vers num="7.0.2"/>
        <vers num="7.0.3"/>
        <vers num="7.0.4"/>
        <vers num="7.0.5"/>
        <vers num="7.0.6"/>
        <vers num="7.0.7"/>
        <vers num="7.0.8"/>
        <vers num="7.0.9"/>
        <vers num="8.0"/>
        <vers num="8.1"/>
        <vers num="8.1.1"/>
        <vers num="8.1.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2642" seq="2008-2642" published="2008-06-10" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in login.php in OtomiGenX 2.2 allows remote attackers to execute arbitrary SQL commands via the userAccount parameter (aka the User Name field) to index.php.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3932">3932</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492914/100/0/threaded">20080601 OtomiGenX v2.2 Ultimate Authentication bypass Vulnerability</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42795">otomigenx-login-sql-injection(42795)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42817">otomigenx-index-sql-injection(42817)</ref>
    </refs>
    <vuln_soft>
      <prod name="otomigenx" vendor="kmrg-itb">
        <vers num="2.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2643" seq="2008-2643" published="2008-06-10" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the Bible Study (com_biblestudy) component before 6.0.7c for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a mediaplayer action to index.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://joomlacode.org/gf/project/biblestudy/news/?action=NewsThreadView&amp;id=1454">http://joomlacode.org/gf/project/biblestudy/news/?action=NewsThreadView&amp;id=1454</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42788">biblestudy-index-sql-injection(42788)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5710">5710</ref>
    </refs>
    <vuln_soft>
      <prod name="com_biblestudy" vendor="joomla">
        <vers num="6.0.7b" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2644" seq="2008-2644" published="2008-06-10" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in SMEWeb 1.4b and 1.4f allow remote attackers to inject arbitrary web script or HTML via the (1) data parameter to catalog.php, the (2) keyword parameter to search.php, the (3) page parameter to bb.php, and the (4) new_s parameter to order.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493130/100/0/threaded">20080605 SMEweb 1.4b (SQL/XSS) Multiple Remote Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29496">29496</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42813">smeweb-multiple-scripts-xss(42813)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5725">5725</ref>
    </refs>
    <vuln_soft>
      <prod name="smeweb" vendor="smeweb">
        <vers num="1.4b"/>
        <vers num="1.4f"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2645" seq="2008-2645" published="2008-06-10" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple PHP remote file inclusion vulnerabilities in Brim (formerly Booby) 1.0.1 allow remote attackers to execute arbitrary PHP code via a URL in the renderer parameter to template.tpl.php in (1) barrel/, (2) barry/, (3) mylook/, (4) oerdec/, (5) penguin/, (6) sidebar/, (7) slashdot/, and (8) text-only/ in templates/.  NOTE: this can also be leveraged to include and execute arbitrary local files via directory traversal sequences.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29469">29469</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1718/references">ADV-2008-1718</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42784">booby-renderer-file-include(42784)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5722">5722</ref>
    </refs>
    <vuln_soft>
      <prod name="brim" vendor="brim-project">
        <vers num="1.0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2646" seq="2008-2646" published="2008-06-10" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in meBiblio 0.4.7 allow remote attackers to inject arbitrary web script or HTML via the (1) sql parameter to dbadd.inc.php, (2) InsertJournal parameter to add_journal_mask.inc.php, (3) InsertBibliography parameter to insert_mask.inc.php, and (4) LabelYear parameter to search_mask.inc.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29465">29465</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42760">mebiblio-multiple-scripts-xss(42760)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5716">5716</ref>
    </refs>
    <vuln_soft>
      <prod name="mebiblio" vendor="mebiblio">
        <vers num="0.4.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2647" seq="2008-2647" published="2008-06-10" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in admin/journal_change_mask.inc.php in meBiblio 0.4.7 allows remote attackers to execute arbitrary SQL commands via the JID parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29465">29465</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42759">mebiblio-journalchangemask-sql-injection(42759)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5716">5716</ref>
    </refs>
    <vuln_soft>
      <prod name="mebiblio" vendor="mebiblio">
        <vers num="0.4.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2648" seq="2008-2648" published="2008-06-10" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unrestricted file upload vulnerability in upload/uploader.html in meBiblio 0.4.7 allows remote attackers to execute arbitrary code by uploading a .php file, then accessing it via a direct request to the files/ directory.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29465">29465</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42761">mebiblio-uploader-file-upload(42761)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5716">5716</ref>
    </refs>
    <vuln_soft>
      <prod name="mebiblio" vendor="mebiblio">
        <vers num="0.4.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2649" seq="2008-2649" published="2008-06-10" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple PHP remote file inclusion vulnerabilities in DesktopOnNet 3 Beta allow remote attackers to execute arbitrary PHP code via a URL in the app_path parameter to (1) don3_requiem.don3app/don3_requiem.php and (2) frontpage.don3app/frontpage.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42790">desktoponnet-apppath-file-include(42790)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5715">5715</ref>
    </refs>
    <vuln_soft>
      <prod name="desktoponnet" vendor="don3">
        <vers num="3" edition="beta"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2650" seq="2008-2650" published="2008-06-10" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in cmsimple/cms.php in CMSimple 3.1, when register_globals is enabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the sl parameter to index.php.  NOTE: this can be leveraged for remote file execution by including adm.php and then invoking the upload action. NOTE: on 20080601, the vendor patched 3.1 without changing the version number.</descript>
    </desc>
    <sols>
      <sol source="nvd">Upgrade requires login when downloads link is clicked from X-Force site.</sol>
    </sols>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.cmsimple.com/forum/viewtopic.php?f=2&amp;t=17">http://www.cmsimple.com/forum/viewtopic.php?f=2&amp;t=17</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29450">29450</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42792">cmsimple-index-file-include(42792)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42793">cmsimple-index-file-upload(42793)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5700">5700</ref>
    </refs>
    <vuln_soft>
      <prod name="cmsimple" vendor="cmsimple">
        <vers num="3.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2651" seq="2008-2651" published="2008-06-10" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the Joomla! Bulletin Board (aka Joo!BB or com_joobb) component 0.5.9 for Joomla! allows remote attackers to execute arbitrary SQL commands via the forum parameter in a forum action to index.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42791">joobb-forum-sql-injection(42791)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5719">5719</ref>
    </refs>
    <vuln_soft>
      <prod name="com_joobb" vendor="joomla">
        <vers num="0.5.9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2652" seq="2008-2652" published="2008-06-10" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in catalog.php in SMEWeb 1.4b and 1.4f allow remote attackers to execute arbitrary SQL commands via the (1) idp and (2) category parameters.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493130/100/0/threaded">20080605 SMEweb 1.4b (SQL/XSS) Multiple Remote Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29496">29496</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42811">smeweb-catalog-sql-injection(42811)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5725">5725</ref>
    </refs>
    <vuln_soft>
      <prod name="smeweb" vendor="smeweb">
        <vers num="1.4b"/>
        <vers num="1.4f"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2654" seq="2008-2654" published="2008-06-13" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Off-by-one error in the read_client function in webhttpd.c in Motion 3.2.10 and earlier might allow remote attackers to execute arbitrary code via a long request to a Motion HTTP Control interface, which triggers a stack-based buffer overflow with some combinations of processor architecture and compiler.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484572">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484572</ref>
      <ref source="MLIST" url="http://marc.info/?l=oss-security&amp;m=121311577731820&amp;w=2">[oss-security] 20080610 exploitability of off-by-one in motion webserver</ref>
      <ref source="MLIST" url="http://marc.info/?l=oss-security&amp;m=121314089321816&amp;w=2">[oss-security] 20080610 Re: exploitability of off-by-one in motion webserver</ref>
      <ref source="MLIST" url="http://marc.info/?l=oss-security&amp;m=121314329424538&amp;w=2">[oss-security] 20080611 Re: exploitability of off-by-one in motion webserver</ref>
      <ref source="MLIST" url="http://marc.info/?l=oss-security&amp;m=121314471626034&amp;w=2">[oss-security] 20080611 Re: exploitability of off-by-one in motion webserver</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200807-02.xml">GLSA-200807-02</ref>
      <ref source="CONFIRM" url="http://www.lavrsen.dk/twiki/pub/Motion/ReleaseNoteMotion3x2x10/webhttpd-security.diff">http://www.lavrsen.dk/twiki/pub/Motion/ReleaseNoteMotion3x2x10/webhttpd-security.diff</ref>
      <ref source="CONFIRM" url="http://www.lavrsen.dk/twiki/pub/Motion/ReleaseNoteMotion3x2x9/webhttpd-security-video2-backport.diff">http://www.lavrsen.dk/twiki/pub/Motion/ReleaseNoteMotion3x2x9/webhttpd-security-video2-backport.diff</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29636" patch="1">29636</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1796">ADV-2008-1796</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42979">motion-readclient-bo(42979)</ref>
    </refs>
    <vuln_soft>
      <prod name="motion" vendor="lavrsen">
        <vers num="3.1.17"/>
        <vers num="3.1.18"/>
        <vers num="3.1.19"/>
        <vers num="3.1.20"/>
        <vers num="3.2.1"/>
        <vers num="3.2.2"/>
        <vers num="3.2.3"/>
        <vers num="3.2.4"/>
        <vers num="3.2.5"/>
        <vers num="3.2.6"/>
        <vers num="3.2.7"/>
        <vers num="3.2.8"/>
        <vers num="3.2.9"/>
        <vers num="3.2.10" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2662" seq="2008-2662" published="2008-06-24" modified="2018-11-01" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple integer overflows in the rb_str_buf_append function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2 allow context-dependent attackers to execute arbitrary code or cause a denial of service via unknown vectors that trigger memory corruption, a different issue than CVE-2008-2663, CVE-2008-2664, and CVE-2008-2725.  NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. This CVE description should be regarded as authoritative, although it is likely to change.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://blog.phusion.nl/2008/06/23/ruby-186-p230187-broke-your-app-ruby-enterprise-edition-to-the-rescue/" adv="1">http://blog.phusion.nl/2008/06/23/ruby-186-p230187-broke-your-app-ruby-enterprise-edition-to-the-rescue/</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html" adv="1">APPLE-SA-2008-06-30</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html" adv="1">SUSE-SR:2008:017</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200812-17.xml" adv="1">GLSA-200812-17</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.429562" adv="1">SSA:2008-179-01</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT2163" adv="1">http://support.apple.com/kb/HT2163</ref>
      <ref source="MISC" url="http://weblog.rubyonrails.org/2008/6/21/multiple-ruby-security-vulnerabilities" adv="1">http://weblog.rubyonrails.org/2008/6/21/multiple-ruby-security-vulnerabilities</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0206">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0206</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1612" adv="1">DSA-1612</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1618" adv="1">DSA-1618</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:140" adv="1">MDVSA-2008:140</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:141" adv="1">MDVSA-2008:141</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:142" adv="1">MDVSA-2008:142</ref>
      <ref source="MISC" url="http://www.matasano.com/log/1070/updates-on-drew-yaos-terrible-ruby-vulnerabilities/" adv="1">http://www.matasano.com/log/1070/updates-on-drew-yaos-terrible-ruby-vulnerabilities/</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0561.html" adv="1">RHSA-2008:0561</ref>
      <ref source="MISC" url="http://www.ruby-forum.com/topic/157034" adv="1">http://www.ruby-forum.com/topic/157034</ref>
      <ref source="MISC" url="http://www.rubyinside.com/june-2008-ruby-security-vulnerabilities-927.html" adv="1">http://www.rubyinside.com/june-2008-ruby-security-vulnerabilities-927.html</ref>
      <ref source="CONFIRM" url="http://www.ruby-lang.org/en/news/2008/06/20/arbitrary-code-execution-vulnerabilities/" adv="1" patch="1">http://www.ruby-lang.org/en/news/2008/06/20/arbitrary-code-execution-vulnerabilities/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493688/100/0/threaded" adv="1">20080626 rPSA-2008-0206-1 ruby</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29903" adv="1">29903</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020347" adv="1">1020347</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-621-1" adv="1">USN-621-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1907/references" adv="1">ADV-2008-1907</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1981/references" adv="1">ADV-2008-1981</ref>
      <ref source="MISC" url="http://www.zedshaw.com/rants/the_big_ruby_vulnerabilities.html">http://www.zedshaw.com/rants/the_big_ruby_vulnerabilities.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43345" adv="1">ruby-rbstrbufappend-code-execution(43345)</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2626">https://issues.rpath.com/browse/RPL-2626</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11601" adv="1">oval:org.mitre.oval:def:11601</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00937.html" adv="1">FEDORA-2008-5649</ref>
    </refs>
    <vuln_soft>
      <prod name="ruby" vendor="ruby-lang">
        <vers num="1.8.4" prev="1"/>
        <vers num="1.8.5.1"/>
        <vers num="1.8.5.2"/>
        <vers num="1.8.5.3"/>
        <vers num="1.8.5.4"/>
        <vers num="1.8.5.5"/>
        <vers num="1.8.5.6"/>
        <vers num="1.8.5.7"/>
        <vers num="1.8.5.8"/>
        <vers num="1.8.5.9"/>
        <vers num="1.8.5.10"/>
        <vers num="1.8.5.11"/>
        <vers num="1.8.5.12"/>
        <vers num="1.8.5.13"/>
        <vers num="1.8.5.14"/>
        <vers num="1.8.5.15"/>
        <vers num="1.8.5.16"/>
        <vers num="1.8.5.17"/>
        <vers num="1.8.5.18"/>
        <vers num="1.8.5.19"/>
        <vers num="1.8.5.20"/>
        <vers num="1.8.5.21"/>
        <vers num="1.8.5.22"/>
        <vers num="1.8.5.23"/>
        <vers num="1.8.5.24"/>
        <vers num="1.8.5.25"/>
        <vers num="1.8.5.26"/>
        <vers num="1.8.5.27"/>
        <vers num="1.8.5.28"/>
        <vers num="1.8.5.29"/>
        <vers num="1.8.5.30"/>
        <vers num="1.8.5.31"/>
        <vers num="1.8.5.32"/>
        <vers num="1.8.5.33"/>
        <vers num="1.8.5.34"/>
        <vers num="1.8.5.35"/>
        <vers num="1.8.5.36"/>
        <vers num="1.8.5.37"/>
        <vers num="1.8.5.39"/>
        <vers num="1.8.5.40"/>
        <vers num="1.8.5.41"/>
        <vers num="1.8.5.42"/>
        <vers num="1.8.5.43"/>
        <vers num="1.8.5.44"/>
        <vers num="1.8.5.45"/>
        <vers num="1.8.5.46"/>
        <vers num="1.8.5.47"/>
        <vers num="1.8.5.48"/>
        <vers num="1.8.5.49"/>
        <vers num="1.8.5.51"/>
        <vers num="1.8.5.52"/>
        <vers num="1.8.5.53"/>
        <vers num="1.8.5.54"/>
        <vers num="1.8.5.55"/>
        <vers num="1.8.5.56"/>
        <vers num="1.8.5.57"/>
        <vers num="1.8.5.58"/>
        <vers num="1.8.5.59"/>
        <vers num="1.8.5.60"/>
        <vers num="1.8.5.61"/>
        <vers num="1.8.5.62"/>
        <vers num="1.8.5.63"/>
        <vers num="1.8.5.64"/>
        <vers num="1.8.5.65"/>
        <vers num="1.8.5.66"/>
        <vers num="1.8.5.67"/>
        <vers num="1.8.5.68"/>
        <vers num="1.8.5.69"/>
        <vers num="1.8.5.70"/>
        <vers num="1.8.5.71"/>
        <vers num="1.8.5.72"/>
        <vers num="1.8.5.73"/>
        <vers num="1.8.5.74"/>
        <vers num="1.8.5.75"/>
        <vers num="1.8.5.76"/>
        <vers num="1.8.5.77"/>
        <vers num="1.8.5.78"/>
        <vers num="1.8.5.79"/>
        <vers num="1.8.5.80"/>
        <vers num="1.8.5.81"/>
        <vers num="1.8.5.82"/>
        <vers num="1.8.5.83"/>
        <vers num="1.8.5.84"/>
        <vers num="1.8.5.85"/>
        <vers num="1.8.5.86"/>
        <vers num="1.8.5.87"/>
        <vers num="1.8.5.88"/>
        <vers num="1.8.5.89"/>
        <vers num="1.8.5.90"/>
        <vers num="1.8.5.91"/>
        <vers num="1.8.5.92"/>
        <vers num="1.8.5.93"/>
        <vers num="1.8.5.94"/>
        <vers num="1.8.5.95"/>
        <vers num="1.8.5.96"/>
        <vers num="1.8.5.97"/>
        <vers num="1.8.5.98"/>
        <vers num="1.8.5.99"/>
        <vers num="1.8.5.100"/>
        <vers num="1.8.5.101"/>
        <vers num="1.8.5.102"/>
        <vers num="1.8.5.103"/>
        <vers num="1.8.5.104"/>
        <vers num="1.8.5.105"/>
        <vers num="1.8.5.106"/>
        <vers num="1.8.5.107"/>
        <vers num="1.8.5.108"/>
        <vers num="1.8.5.109"/>
        <vers num="1.8.5.110"/>
        <vers num="1.8.5.111"/>
        <vers num="1.8.5.113"/>
        <vers num="1.8.5.114"/>
        <vers num="1.8.5.115"/>
        <vers num="1.8.5.116"/>
        <vers num="1.8.5.122"/>
        <vers num="1.8.5.123"/>
        <vers num="1.8.5.124"/>
        <vers num="1.8.5.125"/>
        <vers num="1.8.5.126"/>
        <vers num="1.8.5.127"/>
        <vers num="1.8.5.128"/>
        <vers num="1.8.5.129"/>
        <vers num="1.8.5.130"/>
        <vers num="1.8.5.131"/>
        <vers num="1.8.5.132"/>
        <vers num="1.8.5.133"/>
        <vers num="1.8.5.134"/>
        <vers num="1.8.5.135"/>
        <vers num="1.8.5.136"/>
        <vers num="1.8.5.137"/>
        <vers num="1.8.5.138"/>
        <vers num="1.8.5.139"/>
        <vers num="1.8.5.140"/>
        <vers num="1.8.5.141"/>
        <vers num="1.8.5.142"/>
        <vers num="1.8.5.145"/>
        <vers num="1.8.5.146"/>
        <vers num="1.8.5.147"/>
        <vers num="1.8.5.148"/>
        <vers num="1.8.5.149"/>
        <vers num="1.8.5.150"/>
        <vers num="1.8.5.151"/>
        <vers num="1.8.5.153"/>
        <vers num="1.8.5.154"/>
        <vers num="1.8.5.155"/>
        <vers num="1.8.5.156"/>
        <vers num="1.8.5.157"/>
        <vers num="1.8.5.158"/>
        <vers num="1.8.5.159"/>
        <vers num="1.8.5.160"/>
        <vers num="1.8.5.161"/>
        <vers num="1.8.5.162"/>
        <vers num="1.8.5.163"/>
        <vers num="1.8.5.164"/>
        <vers num="1.8.5.165"/>
        <vers num="1.8.5.166"/>
        <vers num="1.8.5.167"/>
        <vers num="1.8.5.168"/>
        <vers num="1.8.5.169"/>
        <vers num="1.8.5.170"/>
        <vers num="1.8.5.171"/>
        <vers num="1.8.5.172"/>
        <vers num="1.8.5.173"/>
        <vers num="1.8.5.174"/>
        <vers num="1.8.5.175"/>
        <vers num="1.8.5.176"/>
        <vers num="1.8.5.177"/>
        <vers num="1.8.5.178"/>
        <vers num="1.8.5.179"/>
        <vers num="1.8.5.180"/>
        <vers num="1.8.5.181"/>
        <vers num="1.8.5.182"/>
        <vers num="1.8.5.183"/>
        <vers num="1.8.5.184"/>
        <vers num="1.8.5.185"/>
        <vers num="1.8.5.186"/>
        <vers num="1.8.5.187"/>
        <vers num="1.8.5.188"/>
        <vers num="1.8.5.189"/>
        <vers num="1.8.5.190"/>
        <vers num="1.8.5.191"/>
        <vers num="1.8.5.192"/>
        <vers num="1.8.5.193"/>
        <vers num="1.8.5.194"/>
        <vers num="1.8.5.195"/>
        <vers num="1.8.5.196"/>
        <vers num="1.8.5.197"/>
        <vers num="1.8.5.198"/>
        <vers num="1.8.5.199"/>
        <vers num="1.8.5.200"/>
        <vers num="1.8.5.201"/>
        <vers num="1.8.5.202"/>
        <vers num="1.8.5.203"/>
        <vers num="1.8.5.204"/>
        <vers num="1.8.5.205"/>
        <vers num="1.8.5.206"/>
        <vers num="1.8.5.207"/>
        <vers num="1.8.5.208"/>
        <vers num="1.8.5.209"/>
        <vers num="1.8.5.210"/>
        <vers num="1.8.5.211"/>
        <vers num="1.8.5.212"/>
        <vers num="1.8.5.213"/>
        <vers num="1.8.5.214"/>
        <vers num="1.8.5.215"/>
        <vers num="1.8.5.216"/>
        <vers num="1.8.5.217"/>
        <vers num="1.8.5.218"/>
        <vers num="1.8.5.219"/>
        <vers num="1.8.5.220"/>
        <vers num="1.8.5.221"/>
        <vers num="1.8.5.222"/>
        <vers num="1.8.5.223"/>
        <vers num="1.8.5.224"/>
        <vers num="1.8.5.225"/>
        <vers num="1.8.5.226"/>
        <vers num="1.8.5.227"/>
        <vers num="1.8.5.228"/>
        <vers num="1.8.5.229"/>
        <vers num="1.8.5.230"/>
        <vers num="1.8.6" edition="preview1"/>
        <vers num="1.8.6" edition="preview2"/>
        <vers num="1.8.6" edition="preview3"/>
        <vers num="1.8.6-26"/>
        <vers num="1.8.6.1"/>
        <vers num="1.8.6.2"/>
        <vers num="1.8.6.4"/>
        <vers num="1.8.6.5"/>
        <vers num="1.8.6.6"/>
        <vers num="1.8.6.7"/>
        <vers num="1.8.6.8"/>
        <vers num="1.8.6.9"/>
        <vers num="1.8.6.10"/>
        <vers num="1.8.6.12"/>
        <vers num="1.8.6.13"/>
        <vers num="1.8.6.14"/>
        <vers num="1.8.6.15"/>
        <vers num="1.8.6.16"/>
        <vers num="1.8.6.17"/>
        <vers num="1.8.6.18"/>
        <vers num="1.8.6.19"/>
        <vers num="1.8.6.20"/>
        <vers num="1.8.6.21"/>
        <vers num="1.8.6.22"/>
        <vers num="1.8.6.23"/>
        <vers num="1.8.6.24"/>
        <vers num="1.8.6.25"/>
        <vers num="1.8.6.26"/>
        <vers num="1.8.6.27"/>
        <vers num="1.8.6.30"/>
        <vers num="1.8.6.31"/>
        <vers num="1.8.6.32"/>
        <vers num="1.8.6.33"/>
        <vers num="1.8.6.34"/>
        <vers num="1.8.6.35"/>
        <vers num="1.8.6.36"/>
        <vers num="1.8.6.37"/>
        <vers num="1.8.6.38"/>
        <vers num="1.8.6.39"/>
        <vers num="1.8.6.40"/>
        <vers num="1.8.6.41"/>
        <vers num="1.8.6.42"/>
        <vers num="1.8.6.43"/>
        <vers num="1.8.6.44"/>
        <vers num="1.8.6.45"/>
        <vers num="1.8.6.46"/>
        <vers num="1.8.6.47"/>
        <vers num="1.8.6.48"/>
        <vers num="1.8.6.49"/>
        <vers num="1.8.6.50"/>
        <vers num="1.8.6.51"/>
        <vers num="1.8.6.52"/>
        <vers num="1.8.6.53"/>
        <vers num="1.8.6.54"/>
        <vers num="1.8.6.55"/>
        <vers num="1.8.6.56"/>
        <vers num="1.8.6.57"/>
        <vers num="1.8.6.58"/>
        <vers num="1.8.6.59"/>
        <vers num="1.8.6.60"/>
        <vers num="1.8.6.63"/>
        <vers num="1.8.6.64"/>
        <vers num="1.8.6.65"/>
        <vers num="1.8.6.66"/>
        <vers num="1.8.6.67"/>
        <vers num="1.8.6.68"/>
        <vers num="1.8.6.69"/>
        <vers num="1.8.6.70"/>
        <vers num="1.8.6.72"/>
        <vers num="1.8.6.73"/>
        <vers num="1.8.6.74"/>
        <vers num="1.8.6.75"/>
        <vers num="1.8.6.76"/>
        <vers num="1.8.6.77"/>
        <vers num="1.8.6.78"/>
        <vers num="1.8.6.79"/>
        <vers num="1.8.6.80"/>
        <vers num="1.8.6.81"/>
        <vers num="1.8.6.82"/>
        <vers num="1.8.6.83"/>
        <vers num="1.8.6.84"/>
        <vers num="1.8.6.85"/>
        <vers num="1.8.6.86"/>
        <vers num="1.8.6.87"/>
        <vers num="1.8.6.88"/>
        <vers num="1.8.6.89"/>
        <vers num="1.8.6.90"/>
        <vers num="1.8.6.91"/>
        <vers num="1.8.6.92"/>
        <vers num="1.8.6.93"/>
        <vers num="1.8.6.94"/>
        <vers num="1.8.6.95"/>
        <vers num="1.8.6.96"/>
        <vers num="1.8.6.97"/>
        <vers num="1.8.6.98"/>
        <vers num="1.8.6.99"/>
        <vers num="1.8.6.100"/>
        <vers num="1.8.6.101"/>
        <vers num="1.8.6.102"/>
        <vers num="1.8.6.103"/>
        <vers num="1.8.6.104"/>
        <vers num="1.8.6.105"/>
        <vers num="1.8.6.106"/>
        <vers num="1.8.6.107"/>
        <vers num="1.8.6.109"/>
        <vers num="1.8.6.110"/>
        <vers num="1.8.6.111"/>
        <vers num="1.8.6.112"/>
        <vers num="1.8.6.113"/>
        <vers num="1.8.6.114"/>
        <vers num="1.8.6.115"/>
        <vers num="1.8.6.121"/>
        <vers num="1.8.6.122"/>
        <vers num="1.8.6.123"/>
        <vers num="1.8.6.124"/>
        <vers num="1.8.6.125"/>
        <vers num="1.8.6.126"/>
        <vers num="1.8.6.127"/>
        <vers num="1.8.6.128"/>
        <vers num="1.8.6.129"/>
        <vers num="1.8.6.130"/>
        <vers num="1.8.6.131"/>
        <vers num="1.8.6.132"/>
        <vers num="1.8.6.133"/>
        <vers num="1.8.6.134"/>
        <vers num="1.8.6.135"/>
        <vers num="1.8.6.136"/>
        <vers num="1.8.6.137"/>
        <vers num="1.8.6.138"/>
        <vers num="1.8.6.139"/>
        <vers num="1.8.6.140"/>
        <vers num="1.8.6.141"/>
        <vers num="1.8.6.144"/>
        <vers num="1.8.6.145"/>
        <vers num="1.8.6.146"/>
        <vers num="1.8.6.147"/>
        <vers num="1.8.6.148"/>
        <vers num="1.8.6.149"/>
        <vers num="1.8.6.150"/>
        <vers num="1.8.6.151"/>
        <vers num="1.8.6.153"/>
        <vers num="1.8.6.154"/>
        <vers num="1.8.6.155"/>
        <vers num="1.8.6.156"/>
        <vers num="1.8.6.157"/>
        <vers num="1.8.6.158"/>
        <vers num="1.8.6.159"/>
        <vers num="1.8.6.160"/>
        <vers num="1.8.6.161"/>
        <vers num="1.8.6.162"/>
        <vers num="1.8.6.163"/>
        <vers num="1.8.6.164"/>
        <vers num="1.8.6.165"/>
        <vers num="1.8.6.166"/>
        <vers num="1.8.6.167"/>
        <vers num="1.8.6.168"/>
        <vers num="1.8.6.169"/>
        <vers num="1.8.6.170"/>
        <vers num="1.8.6.171"/>
        <vers num="1.8.6.172"/>
        <vers num="1.8.6.173"/>
        <vers num="1.8.6.174"/>
        <vers num="1.8.6.175"/>
        <vers num="1.8.6.176"/>
        <vers num="1.8.6.177"/>
        <vers num="1.8.6.178"/>
        <vers num="1.8.6.179"/>
        <vers num="1.8.6.180"/>
        <vers num="1.8.6.181"/>
        <vers num="1.8.6.182"/>
        <vers num="1.8.6.183"/>
        <vers num="1.8.6.184"/>
        <vers num="1.8.6.185"/>
        <vers num="1.8.6.186"/>
        <vers num="1.8.6.187"/>
        <vers num="1.8.6.188"/>
        <vers num="1.8.6.189"/>
        <vers num="1.8.6.190"/>
        <vers num="1.8.6.191"/>
        <vers num="1.8.6.192"/>
        <vers num="1.8.6.193"/>
        <vers num="1.8.6.194"/>
        <vers num="1.8.6.195"/>
        <vers num="1.8.6.196"/>
        <vers num="1.8.6.197"/>
        <vers num="1.8.6.198"/>
        <vers num="1.8.6.199"/>
        <vers num="1.8.6.200"/>
        <vers num="1.8.6.201"/>
        <vers num="1.8.6.202"/>
        <vers num="1.8.6.203"/>
        <vers num="1.8.6.204"/>
        <vers num="1.8.6.205"/>
        <vers num="1.8.6.206"/>
        <vers num="1.8.6.207"/>
        <vers num="1.8.6.208"/>
        <vers num="1.8.6.209"/>
        <vers num="1.8.6.210"/>
        <vers num="1.8.6.211"/>
        <vers num="1.8.6.212"/>
        <vers num="1.8.6.213"/>
        <vers num="1.8.6.214"/>
        <vers num="1.8.6.215"/>
        <vers num="1.8.6.216"/>
        <vers num="1.8.6.217"/>
        <vers num="1.8.6.218"/>
        <vers num="1.8.6.219"/>
        <vers num="1.8.6.220"/>
        <vers num="1.8.6.221"/>
        <vers num="1.8.6.222"/>
        <vers num="1.8.6.223"/>
        <vers num="1.8.6.224"/>
        <vers num="1.8.6.225"/>
        <vers num="1.8.6.226"/>
        <vers num="1.8.6.227"/>
        <vers num="1.8.6.228"/>
        <vers num="1.8.6.229"/>
        <vers num="1.8.7" edition="p160"/>
        <vers num="1.8.7" edition="p17"/>
        <vers num="1.8.7" edition="p173"/>
        <vers num="1.8.7" edition="p174"/>
        <vers num="1.8.7" edition="p22"/>
        <vers num="1.8.7" edition="p248"/>
        <vers num="1.8.7" edition="p249"/>
        <vers num="1.8.7" edition="p299"/>
        <vers num="1.8.7" edition="p301"/>
        <vers num="1.8.7" edition="p302"/>
        <vers num="1.8.7" edition="p330"/>
        <vers num="1.8.7" edition="p334"/>
        <vers num="1.8.7" edition="p352"/>
        <vers num="1.8.7" edition="p357"/>
        <vers num="1.8.7" edition="p358"/>
        <vers num="1.8.7" edition="p370"/>
        <vers num="1.8.7" edition="p371"/>
        <vers num="1.8.7" edition="p373"/>
        <vers num="1.8.7" edition="p374"/>
        <vers num="1.8.7" edition="p71"/>
        <vers num="1.8.7" edition="p72"/>
        <vers num="1.8.7" edition="preview1"/>
        <vers num="1.8.7" edition="preview2"/>
        <vers num="1.8.7" edition="preview3"/>
        <vers num="1.8.7" edition="preview4"/>
        <vers num="1.8.7.7"/>
        <vers num="1.8.7.17"/>
        <vers num="1.8.7.20"/>
        <vers num="1.8.7.21"/>
        <vers num="1.9.0"/>
        <vers num="1.9.0.0"/>
        <vers num="1.9.0.1"/>
      </prod>
      <prod name="ubuntu_linux" vendor="canonical">
        <vers num="6.06" edition=":~~lts~~~"/>
        <vers num="7.04"/>
        <vers num="7.10"/>
        <vers num="8.04" edition=":~~lts~~~"/>
      </prod>
      <prod name="debian_linux" vendor="debian">
        <vers num="4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2663" seq="2008-2663" published="2008-06-24" modified="2018-11-01" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple integer overflows in the rb_ary_store function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, and 1.8.7 before 1.8.7-p22 allow context-dependent attackers to execute arbitrary code or cause a denial of service via unknown vectors, a different issue than CVE-2008-2662, CVE-2008-2664, and CVE-2008-2725. NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://blog.phusion.nl/2008/06/23/ruby-186-p230187-broke-your-app-ruby-enterprise-edition-to-the-rescue/" adv="1">http://blog.phusion.nl/2008/06/23/ruby-186-p230187-broke-your-app-ruby-enterprise-edition-to-the-rescue/</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html" adv="1">APPLE-SA-2008-06-30</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html" adv="1">SUSE-SR:2008:017</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200812-17.xml" adv="1">GLSA-200812-17</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.429562" adv="1">SSA:2008-179-01</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT2163" adv="1">http://support.apple.com/kb/HT2163</ref>
      <ref source="MISC" url="http://weblog.rubyonrails.org/2008/6/21/multiple-ruby-security-vulnerabilities" adv="1">http://weblog.rubyonrails.org/2008/6/21/multiple-ruby-security-vulnerabilities</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0206">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0206</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1612" adv="1">DSA-1612</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1618" adv="1">DSA-1618</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:140" adv="1">MDVSA-2008:140</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:141" adv="1">MDVSA-2008:141</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:142" adv="1">MDVSA-2008:142</ref>
      <ref source="MISC" url="http://www.matasano.com/log/1070/updates-on-drew-yaos-terrible-ruby-vulnerabilities/" adv="1">http://www.matasano.com/log/1070/updates-on-drew-yaos-terrible-ruby-vulnerabilities/</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0561.html" adv="1">RHSA-2008:0561</ref>
      <ref source="MISC" url="http://www.ruby-forum.com/topic/157034" adv="1">http://www.ruby-forum.com/topic/157034</ref>
      <ref source="MISC" url="http://www.rubyinside.com/june-2008-ruby-security-vulnerabilities-927.html" adv="1">http://www.rubyinside.com/june-2008-ruby-security-vulnerabilities-927.html</ref>
      <ref source="CONFIRM" url="http://www.ruby-lang.org/en/news/2008/06/20/arbitrary-code-execution-vulnerabilities/" adv="1" patch="1">http://www.ruby-lang.org/en/news/2008/06/20/arbitrary-code-execution-vulnerabilities/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493688/100/0/threaded" adv="1">20080626 rPSA-2008-0206-1 ruby</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29903" adv="1">29903</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020347" adv="1">1020347</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-621-1" adv="1">USN-621-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1907/references" adv="1">ADV-2008-1907</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1981/references" adv="1">ADV-2008-1981</ref>
      <ref source="MISC" url="http://www.zedshaw.com/rants/the_big_ruby_vulnerabilities.html">http://www.zedshaw.com/rants/the_big_ruby_vulnerabilities.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43346" adv="1">ruby-rbarystore-code-execution(43346)</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2626">https://issues.rpath.com/browse/RPL-2626</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10524" adv="1">oval:org.mitre.oval:def:10524</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00937.html" adv="1">FEDORA-2008-5649</ref>
    </refs>
    <vuln_soft>
      <prod name="ruby" vendor="ruby-lang">
        <vers num="1.8.4" prev="1"/>
        <vers num="1.8.5.1"/>
        <vers num="1.8.5.2"/>
        <vers num="1.8.5.3"/>
        <vers num="1.8.5.4"/>
        <vers num="1.8.5.5"/>
        <vers num="1.8.5.6"/>
        <vers num="1.8.5.7"/>
        <vers num="1.8.5.8"/>
        <vers num="1.8.5.9"/>
        <vers num="1.8.5.10"/>
        <vers num="1.8.5.11"/>
        <vers num="1.8.5.12"/>
        <vers num="1.8.5.13"/>
        <vers num="1.8.5.14"/>
        <vers num="1.8.5.15"/>
        <vers num="1.8.5.16"/>
        <vers num="1.8.5.17"/>
        <vers num="1.8.5.18"/>
        <vers num="1.8.5.19"/>
        <vers num="1.8.5.20"/>
        <vers num="1.8.5.21"/>
        <vers num="1.8.5.22"/>
        <vers num="1.8.5.23"/>
        <vers num="1.8.5.24"/>
        <vers num="1.8.5.25"/>
        <vers num="1.8.5.26"/>
        <vers num="1.8.5.27"/>
        <vers num="1.8.5.28"/>
        <vers num="1.8.5.29"/>
        <vers num="1.8.5.30"/>
        <vers num="1.8.5.31"/>
        <vers num="1.8.5.32"/>
        <vers num="1.8.5.33"/>
        <vers num="1.8.5.34"/>
        <vers num="1.8.5.35"/>
        <vers num="1.8.5.36"/>
        <vers num="1.8.5.37"/>
        <vers num="1.8.5.39"/>
        <vers num="1.8.5.40"/>
        <vers num="1.8.5.41"/>
        <vers num="1.8.5.42"/>
        <vers num="1.8.5.43"/>
        <vers num="1.8.5.44"/>
        <vers num="1.8.5.45"/>
        <vers num="1.8.5.46"/>
        <vers num="1.8.5.47"/>
        <vers num="1.8.5.48"/>
        <vers num="1.8.5.49"/>
        <vers num="1.8.5.51"/>
        <vers num="1.8.5.52"/>
        <vers num="1.8.5.53"/>
        <vers num="1.8.5.54"/>
        <vers num="1.8.5.55"/>
        <vers num="1.8.5.56"/>
        <vers num="1.8.5.57"/>
        <vers num="1.8.5.58"/>
        <vers num="1.8.5.59"/>
        <vers num="1.8.5.60"/>
        <vers num="1.8.5.61"/>
        <vers num="1.8.5.62"/>
        <vers num="1.8.5.63"/>
        <vers num="1.8.5.64"/>
        <vers num="1.8.5.65"/>
        <vers num="1.8.5.66"/>
        <vers num="1.8.5.67"/>
        <vers num="1.8.5.68"/>
        <vers num="1.8.5.69"/>
        <vers num="1.8.5.70"/>
        <vers num="1.8.5.71"/>
        <vers num="1.8.5.72"/>
        <vers num="1.8.5.73"/>
        <vers num="1.8.5.74"/>
        <vers num="1.8.5.75"/>
        <vers num="1.8.5.76"/>
        <vers num="1.8.5.77"/>
        <vers num="1.8.5.78"/>
        <vers num="1.8.5.79"/>
        <vers num="1.8.5.80"/>
        <vers num="1.8.5.81"/>
        <vers num="1.8.5.82"/>
        <vers num="1.8.5.83"/>
        <vers num="1.8.5.84"/>
        <vers num="1.8.5.85"/>
        <vers num="1.8.5.86"/>
        <vers num="1.8.5.87"/>
        <vers num="1.8.5.88"/>
        <vers num="1.8.5.89"/>
        <vers num="1.8.5.90"/>
        <vers num="1.8.5.91"/>
        <vers num="1.8.5.92"/>
        <vers num="1.8.5.93"/>
        <vers num="1.8.5.94"/>
        <vers num="1.8.5.95"/>
        <vers num="1.8.5.96"/>
        <vers num="1.8.5.97"/>
        <vers num="1.8.5.98"/>
        <vers num="1.8.5.99"/>
        <vers num="1.8.5.100"/>
        <vers num="1.8.5.101"/>
        <vers num="1.8.5.102"/>
        <vers num="1.8.5.103"/>
        <vers num="1.8.5.104"/>
        <vers num="1.8.5.105"/>
        <vers num="1.8.5.106"/>
        <vers num="1.8.5.107"/>
        <vers num="1.8.5.108"/>
        <vers num="1.8.5.109"/>
        <vers num="1.8.5.110"/>
        <vers num="1.8.5.111"/>
        <vers num="1.8.5.113"/>
        <vers num="1.8.5.114"/>
        <vers num="1.8.5.115"/>
        <vers num="1.8.5.116"/>
        <vers num="1.8.5.122"/>
        <vers num="1.8.5.123"/>
        <vers num="1.8.5.124"/>
        <vers num="1.8.5.125"/>
        <vers num="1.8.5.126"/>
        <vers num="1.8.5.127"/>
        <vers num="1.8.5.128"/>
        <vers num="1.8.5.129"/>
        <vers num="1.8.5.130"/>
        <vers num="1.8.5.131"/>
        <vers num="1.8.5.132"/>
        <vers num="1.8.5.133"/>
        <vers num="1.8.5.134"/>
        <vers num="1.8.5.135"/>
        <vers num="1.8.5.136"/>
        <vers num="1.8.5.137"/>
        <vers num="1.8.5.138"/>
        <vers num="1.8.5.139"/>
        <vers num="1.8.5.140"/>
        <vers num="1.8.5.141"/>
        <vers num="1.8.5.142"/>
        <vers num="1.8.5.145"/>
        <vers num="1.8.5.146"/>
        <vers num="1.8.5.147"/>
        <vers num="1.8.5.148"/>
        <vers num="1.8.5.149"/>
        <vers num="1.8.5.150"/>
        <vers num="1.8.5.151"/>
        <vers num="1.8.5.153"/>
        <vers num="1.8.5.154"/>
        <vers num="1.8.5.155"/>
        <vers num="1.8.5.156"/>
        <vers num="1.8.5.157"/>
        <vers num="1.8.5.158"/>
        <vers num="1.8.5.159"/>
        <vers num="1.8.5.160"/>
        <vers num="1.8.5.161"/>
        <vers num="1.8.5.162"/>
        <vers num="1.8.5.163"/>
        <vers num="1.8.5.164"/>
        <vers num="1.8.5.165"/>
        <vers num="1.8.5.166"/>
        <vers num="1.8.5.167"/>
        <vers num="1.8.5.168"/>
        <vers num="1.8.5.169"/>
        <vers num="1.8.5.170"/>
        <vers num="1.8.5.171"/>
        <vers num="1.8.5.172"/>
        <vers num="1.8.5.173"/>
        <vers num="1.8.5.174"/>
        <vers num="1.8.5.175"/>
        <vers num="1.8.5.176"/>
        <vers num="1.8.5.177"/>
        <vers num="1.8.5.178"/>
        <vers num="1.8.5.179"/>
        <vers num="1.8.5.180"/>
        <vers num="1.8.5.181"/>
        <vers num="1.8.5.182"/>
        <vers num="1.8.5.183"/>
        <vers num="1.8.5.184"/>
        <vers num="1.8.5.185"/>
        <vers num="1.8.5.186"/>
        <vers num="1.8.5.187"/>
        <vers num="1.8.5.188"/>
        <vers num="1.8.5.189"/>
        <vers num="1.8.5.190"/>
        <vers num="1.8.5.191"/>
        <vers num="1.8.5.192"/>
        <vers num="1.8.5.193"/>
        <vers num="1.8.5.194"/>
        <vers num="1.8.5.195"/>
        <vers num="1.8.5.196"/>
        <vers num="1.8.5.197"/>
        <vers num="1.8.5.198"/>
        <vers num="1.8.5.199"/>
        <vers num="1.8.5.200"/>
        <vers num="1.8.5.201"/>
        <vers num="1.8.5.202"/>
        <vers num="1.8.5.203"/>
        <vers num="1.8.5.204"/>
        <vers num="1.8.5.205"/>
        <vers num="1.8.5.206"/>
        <vers num="1.8.5.207"/>
        <vers num="1.8.5.208"/>
        <vers num="1.8.5.209"/>
        <vers num="1.8.5.210"/>
        <vers num="1.8.5.211"/>
        <vers num="1.8.5.212"/>
        <vers num="1.8.5.213"/>
        <vers num="1.8.5.214"/>
        <vers num="1.8.5.215"/>
        <vers num="1.8.5.216"/>
        <vers num="1.8.5.217"/>
        <vers num="1.8.5.218"/>
        <vers num="1.8.5.219"/>
        <vers num="1.8.5.220"/>
        <vers num="1.8.5.221"/>
        <vers num="1.8.5.222"/>
        <vers num="1.8.5.223"/>
        <vers num="1.8.5.224"/>
        <vers num="1.8.5.225"/>
        <vers num="1.8.5.226"/>
        <vers num="1.8.5.227"/>
        <vers num="1.8.5.228"/>
        <vers num="1.8.5.229"/>
        <vers num="1.8.5.230"/>
        <vers num="1.8.6" edition="preview1"/>
        <vers num="1.8.6" edition="preview2"/>
        <vers num="1.8.6" edition="preview3"/>
        <vers num="1.8.6-26"/>
        <vers num="1.8.6.1"/>
        <vers num="1.8.6.2"/>
        <vers num="1.8.6.4"/>
        <vers num="1.8.6.5"/>
        <vers num="1.8.6.6"/>
        <vers num="1.8.6.7"/>
        <vers num="1.8.6.8"/>
        <vers num="1.8.6.9"/>
        <vers num="1.8.6.10"/>
        <vers num="1.8.6.12"/>
        <vers num="1.8.6.13"/>
        <vers num="1.8.6.14"/>
        <vers num="1.8.6.15"/>
        <vers num="1.8.6.16"/>
        <vers num="1.8.6.17"/>
        <vers num="1.8.6.18"/>
        <vers num="1.8.6.19"/>
        <vers num="1.8.6.20"/>
        <vers num="1.8.6.21"/>
        <vers num="1.8.6.22"/>
        <vers num="1.8.6.23"/>
        <vers num="1.8.6.24"/>
        <vers num="1.8.6.25"/>
        <vers num="1.8.6.26"/>
        <vers num="1.8.6.27"/>
        <vers num="1.8.6.30"/>
        <vers num="1.8.6.31"/>
        <vers num="1.8.6.32"/>
        <vers num="1.8.6.33"/>
        <vers num="1.8.6.34"/>
        <vers num="1.8.6.35"/>
        <vers num="1.8.6.36"/>
        <vers num="1.8.6.37"/>
        <vers num="1.8.6.38"/>
        <vers num="1.8.6.39"/>
        <vers num="1.8.6.40"/>
        <vers num="1.8.6.41"/>
        <vers num="1.8.6.42"/>
        <vers num="1.8.6.43"/>
        <vers num="1.8.6.44"/>
        <vers num="1.8.6.45"/>
        <vers num="1.8.6.46"/>
        <vers num="1.8.6.47"/>
        <vers num="1.8.6.48"/>
        <vers num="1.8.6.49"/>
        <vers num="1.8.6.50"/>
        <vers num="1.8.6.51"/>
        <vers num="1.8.6.52"/>
        <vers num="1.8.6.53"/>
        <vers num="1.8.6.54"/>
        <vers num="1.8.6.55"/>
        <vers num="1.8.6.56"/>
        <vers num="1.8.6.57"/>
        <vers num="1.8.6.58"/>
        <vers num="1.8.6.59"/>
        <vers num="1.8.6.60"/>
        <vers num="1.8.6.63"/>
        <vers num="1.8.6.64"/>
        <vers num="1.8.6.65"/>
        <vers num="1.8.6.66"/>
        <vers num="1.8.6.67"/>
        <vers num="1.8.6.68"/>
        <vers num="1.8.6.69"/>
        <vers num="1.8.6.70"/>
        <vers num="1.8.6.72"/>
        <vers num="1.8.6.73"/>
        <vers num="1.8.6.74"/>
        <vers num="1.8.6.75"/>
        <vers num="1.8.6.76"/>
        <vers num="1.8.6.77"/>
        <vers num="1.8.6.78"/>
        <vers num="1.8.6.79"/>
        <vers num="1.8.6.80"/>
        <vers num="1.8.6.81"/>
        <vers num="1.8.6.82"/>
        <vers num="1.8.6.83"/>
        <vers num="1.8.6.84"/>
        <vers num="1.8.6.85"/>
        <vers num="1.8.6.86"/>
        <vers num="1.8.6.87"/>
        <vers num="1.8.6.88"/>
        <vers num="1.8.6.89"/>
        <vers num="1.8.6.90"/>
        <vers num="1.8.6.91"/>
        <vers num="1.8.6.92"/>
        <vers num="1.8.6.93"/>
        <vers num="1.8.6.94"/>
        <vers num="1.8.6.95"/>
        <vers num="1.8.6.96"/>
        <vers num="1.8.6.97"/>
        <vers num="1.8.6.98"/>
        <vers num="1.8.6.99"/>
        <vers num="1.8.6.100"/>
        <vers num="1.8.6.101"/>
        <vers num="1.8.6.102"/>
        <vers num="1.8.6.103"/>
        <vers num="1.8.6.104"/>
        <vers num="1.8.6.105"/>
        <vers num="1.8.6.106"/>
        <vers num="1.8.6.107"/>
        <vers num="1.8.6.109"/>
        <vers num="1.8.6.110"/>
        <vers num="1.8.6.111"/>
        <vers num="1.8.6.112"/>
        <vers num="1.8.6.113"/>
        <vers num="1.8.6.114"/>
        <vers num="1.8.6.115"/>
        <vers num="1.8.6.121"/>
        <vers num="1.8.6.122"/>
        <vers num="1.8.6.123"/>
        <vers num="1.8.6.124"/>
        <vers num="1.8.6.125"/>
        <vers num="1.8.6.126"/>
        <vers num="1.8.6.127"/>
        <vers num="1.8.6.128"/>
        <vers num="1.8.6.129"/>
        <vers num="1.8.6.130"/>
        <vers num="1.8.6.131"/>
        <vers num="1.8.6.132"/>
        <vers num="1.8.6.133"/>
        <vers num="1.8.6.134"/>
        <vers num="1.8.6.135"/>
        <vers num="1.8.6.136"/>
        <vers num="1.8.6.137"/>
        <vers num="1.8.6.138"/>
        <vers num="1.8.6.139"/>
        <vers num="1.8.6.140"/>
        <vers num="1.8.6.141"/>
        <vers num="1.8.6.144"/>
        <vers num="1.8.6.145"/>
        <vers num="1.8.6.146"/>
        <vers num="1.8.6.147"/>
        <vers num="1.8.6.148"/>
        <vers num="1.8.6.149"/>
        <vers num="1.8.6.150"/>
        <vers num="1.8.6.151"/>
        <vers num="1.8.6.153"/>
        <vers num="1.8.6.154"/>
        <vers num="1.8.6.155"/>
        <vers num="1.8.6.156"/>
        <vers num="1.8.6.157"/>
        <vers num="1.8.6.158"/>
        <vers num="1.8.6.159"/>
        <vers num="1.8.6.160"/>
        <vers num="1.8.6.161"/>
        <vers num="1.8.6.162"/>
        <vers num="1.8.6.163"/>
        <vers num="1.8.6.164"/>
        <vers num="1.8.6.165"/>
        <vers num="1.8.6.166"/>
        <vers num="1.8.6.167"/>
        <vers num="1.8.6.168"/>
        <vers num="1.8.6.169"/>
        <vers num="1.8.6.170"/>
        <vers num="1.8.6.171"/>
        <vers num="1.8.6.172"/>
        <vers num="1.8.6.173"/>
        <vers num="1.8.6.174"/>
        <vers num="1.8.6.175"/>
        <vers num="1.8.6.176"/>
        <vers num="1.8.6.177"/>
        <vers num="1.8.6.178"/>
        <vers num="1.8.6.179"/>
        <vers num="1.8.6.180"/>
        <vers num="1.8.6.181"/>
        <vers num="1.8.6.182"/>
        <vers num="1.8.6.183"/>
        <vers num="1.8.6.184"/>
        <vers num="1.8.6.185"/>
        <vers num="1.8.6.186"/>
        <vers num="1.8.6.187"/>
        <vers num="1.8.6.188"/>
        <vers num="1.8.6.189"/>
        <vers num="1.8.6.190"/>
        <vers num="1.8.6.191"/>
        <vers num="1.8.6.192"/>
        <vers num="1.8.6.193"/>
        <vers num="1.8.6.194"/>
        <vers num="1.8.6.195"/>
        <vers num="1.8.6.196"/>
        <vers num="1.8.6.197"/>
        <vers num="1.8.6.198"/>
        <vers num="1.8.6.199"/>
        <vers num="1.8.6.200"/>
        <vers num="1.8.6.201"/>
        <vers num="1.8.6.202"/>
        <vers num="1.8.6.203"/>
        <vers num="1.8.6.204"/>
        <vers num="1.8.6.205"/>
        <vers num="1.8.6.206"/>
        <vers num="1.8.6.207"/>
        <vers num="1.8.6.208"/>
        <vers num="1.8.6.209"/>
        <vers num="1.8.6.210"/>
        <vers num="1.8.6.211"/>
        <vers num="1.8.6.212"/>
        <vers num="1.8.6.213"/>
        <vers num="1.8.6.214"/>
        <vers num="1.8.6.215"/>
        <vers num="1.8.6.216"/>
        <vers num="1.8.6.217"/>
        <vers num="1.8.6.218"/>
        <vers num="1.8.6.219"/>
        <vers num="1.8.6.220"/>
        <vers num="1.8.6.221"/>
        <vers num="1.8.6.222"/>
        <vers num="1.8.6.223"/>
        <vers num="1.8.6.224"/>
        <vers num="1.8.6.225"/>
        <vers num="1.8.6.226"/>
        <vers num="1.8.6.227"/>
        <vers num="1.8.6.228"/>
        <vers num="1.8.6.229"/>
        <vers num="1.8.7" edition="p160"/>
        <vers num="1.8.7" edition="p17"/>
        <vers num="1.8.7" edition="p173"/>
        <vers num="1.8.7" edition="p174"/>
        <vers num="1.8.7" edition="p22"/>
        <vers num="1.8.7" edition="p248"/>
        <vers num="1.8.7" edition="p249"/>
        <vers num="1.8.7" edition="p299"/>
        <vers num="1.8.7" edition="p301"/>
        <vers num="1.8.7" edition="p302"/>
        <vers num="1.8.7" edition="p330"/>
        <vers num="1.8.7" edition="p334"/>
        <vers num="1.8.7" edition="p352"/>
        <vers num="1.8.7" edition="p357"/>
        <vers num="1.8.7" edition="p358"/>
        <vers num="1.8.7" edition="p370"/>
        <vers num="1.8.7" edition="p371"/>
        <vers num="1.8.7" edition="p373"/>
        <vers num="1.8.7" edition="p374"/>
        <vers num="1.8.7" edition="p71"/>
        <vers num="1.8.7" edition="p72"/>
        <vers num="1.8.7" edition="preview1"/>
        <vers num="1.8.7" edition="preview2"/>
        <vers num="1.8.7" edition="preview3"/>
        <vers num="1.8.7" edition="preview4"/>
        <vers num="1.8.7.7"/>
        <vers num="1.8.7.17"/>
        <vers num="1.8.7.20"/>
        <vers num="1.8.7.21"/>
      </prod>
      <prod name="ubuntu_linux" vendor="canonical">
        <vers num="6.06" edition=":~~lts~~~"/>
        <vers num="7.04"/>
        <vers num="7.10"/>
        <vers num="8.04" edition=":~~lts~~~"/>
      </prod>
      <prod name="debian_linux" vendor="debian">
        <vers num="4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2664" seq="2008-2664" published="2008-06-24" modified="2018-11-01" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">The rb_str_format function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2 allows context-dependent attackers to trigger memory corruption via unspecified vectors related to alloca, a different issue than CVE-2008-2662, CVE-2008-2663, and CVE-2008-2725.  NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://blog.phusion.nl/2008/06/23/ruby-186-p230187-broke-your-app-ruby-enterprise-edition-to-the-rescue/" adv="1">http://blog.phusion.nl/2008/06/23/ruby-186-p230187-broke-your-app-ruby-enterprise-edition-to-the-rescue/</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html" adv="1">APPLE-SA-2008-06-30</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html" adv="1">SUSE-SR:2008:017</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200812-17.xml" adv="1">GLSA-200812-17</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.429562" adv="1">SSA:2008-179-01</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT2163" adv="1">http://support.apple.com/kb/HT2163</ref>
      <ref source="MISC" url="http://weblog.rubyonrails.org/2008/6/21/multiple-ruby-security-vulnerabilities" adv="1">http://weblog.rubyonrails.org/2008/6/21/multiple-ruby-security-vulnerabilities</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0206">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0206</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1612" adv="1">DSA-1612</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1618" adv="1">DSA-1618</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:140" adv="1">MDVSA-2008:140</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:141" adv="1">MDVSA-2008:141</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:142" adv="1">MDVSA-2008:142</ref>
      <ref source="MISC" url="http://www.matasano.com/log/1070/updates-on-drew-yaos-terrible-ruby-vulnerabilities/" adv="1">http://www.matasano.com/log/1070/updates-on-drew-yaos-terrible-ruby-vulnerabilities/</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0561.html" adv="1">RHSA-2008:0561</ref>
      <ref source="MISC" url="http://www.ruby-forum.com/topic/157034" adv="1">http://www.ruby-forum.com/topic/157034</ref>
      <ref source="MISC" url="http://www.rubyinside.com/june-2008-ruby-security-vulnerabilities-927.html" adv="1">http://www.rubyinside.com/june-2008-ruby-security-vulnerabilities-927.html</ref>
      <ref source="CONFIRM" url="http://www.ruby-lang.org/en/news/2008/06/20/arbitrary-code-execution-vulnerabilities/" adv="1" patch="1">http://www.ruby-lang.org/en/news/2008/06/20/arbitrary-code-execution-vulnerabilities/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493688/100/0/threaded" adv="1">20080626 rPSA-2008-0206-1 ruby</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29903" adv="1">29903</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020347" adv="1">1020347</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-621-1" adv="1">USN-621-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1907/references" adv="1">ADV-2008-1907</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1981/references" adv="1">ADV-2008-1981</ref>
      <ref source="MISC" url="http://www.zedshaw.com/rants/the_big_ruby_vulnerabilities.html">http://www.zedshaw.com/rants/the_big_ruby_vulnerabilities.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43348" adv="1">ruby-rbstrformat-code-execution(43348)</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2626">https://issues.rpath.com/browse/RPL-2626</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9646" adv="1">oval:org.mitre.oval:def:9646</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00937.html" adv="1">FEDORA-2008-5649</ref>
    </refs>
    <vuln_soft>
      <prod name="ruby" vendor="ruby-lang">
        <vers num="1.8.4" prev="1"/>
        <vers num="1.8.5.1"/>
        <vers num="1.8.5.2"/>
        <vers num="1.8.5.3"/>
        <vers num="1.8.5.4"/>
        <vers num="1.8.5.5"/>
        <vers num="1.8.5.6"/>
        <vers num="1.8.5.7"/>
        <vers num="1.8.5.8"/>
        <vers num="1.8.5.9"/>
        <vers num="1.8.5.10"/>
        <vers num="1.8.5.11"/>
        <vers num="1.8.5.12"/>
        <vers num="1.8.5.13"/>
        <vers num="1.8.5.14"/>
        <vers num="1.8.5.15"/>
        <vers num="1.8.5.16"/>
        <vers num="1.8.5.17"/>
        <vers num="1.8.5.18"/>
        <vers num="1.8.5.19"/>
        <vers num="1.8.5.20"/>
        <vers num="1.8.5.21"/>
        <vers num="1.8.5.22"/>
        <vers num="1.8.5.23"/>
        <vers num="1.8.5.24"/>
        <vers num="1.8.5.25"/>
        <vers num="1.8.5.26"/>
        <vers num="1.8.5.27"/>
        <vers num="1.8.5.28"/>
        <vers num="1.8.5.29"/>
        <vers num="1.8.5.30"/>
        <vers num="1.8.5.31"/>
        <vers num="1.8.5.32"/>
        <vers num="1.8.5.33"/>
        <vers num="1.8.5.34"/>
        <vers num="1.8.5.35"/>
        <vers num="1.8.5.36"/>
        <vers num="1.8.5.37"/>
        <vers num="1.8.5.39"/>
        <vers num="1.8.5.40"/>
        <vers num="1.8.5.41"/>
        <vers num="1.8.5.42"/>
        <vers num="1.8.5.43"/>
        <vers num="1.8.5.44"/>
        <vers num="1.8.5.45"/>
        <vers num="1.8.5.46"/>
        <vers num="1.8.5.47"/>
        <vers num="1.8.5.48"/>
        <vers num="1.8.5.49"/>
        <vers num="1.8.5.51"/>
        <vers num="1.8.5.52"/>
        <vers num="1.8.5.53"/>
        <vers num="1.8.5.54"/>
        <vers num="1.8.5.55"/>
        <vers num="1.8.5.56"/>
        <vers num="1.8.5.57"/>
        <vers num="1.8.5.58"/>
        <vers num="1.8.5.59"/>
        <vers num="1.8.5.60"/>
        <vers num="1.8.5.61"/>
        <vers num="1.8.5.62"/>
        <vers num="1.8.5.63"/>
        <vers num="1.8.5.64"/>
        <vers num="1.8.5.65"/>
        <vers num="1.8.5.66"/>
        <vers num="1.8.5.67"/>
        <vers num="1.8.5.68"/>
        <vers num="1.8.5.69"/>
        <vers num="1.8.5.70"/>
        <vers num="1.8.5.71"/>
        <vers num="1.8.5.72"/>
        <vers num="1.8.5.73"/>
        <vers num="1.8.5.74"/>
        <vers num="1.8.5.75"/>
        <vers num="1.8.5.76"/>
        <vers num="1.8.5.77"/>
        <vers num="1.8.5.78"/>
        <vers num="1.8.5.79"/>
        <vers num="1.8.5.80"/>
        <vers num="1.8.5.81"/>
        <vers num="1.8.5.82"/>
        <vers num="1.8.5.83"/>
        <vers num="1.8.5.84"/>
        <vers num="1.8.5.85"/>
        <vers num="1.8.5.86"/>
        <vers num="1.8.5.87"/>
        <vers num="1.8.5.88"/>
        <vers num="1.8.5.89"/>
        <vers num="1.8.5.90"/>
        <vers num="1.8.5.91"/>
        <vers num="1.8.5.92"/>
        <vers num="1.8.5.93"/>
        <vers num="1.8.5.94"/>
        <vers num="1.8.5.95"/>
        <vers num="1.8.5.96"/>
        <vers num="1.8.5.97"/>
        <vers num="1.8.5.98"/>
        <vers num="1.8.5.99"/>
        <vers num="1.8.5.100"/>
        <vers num="1.8.5.101"/>
        <vers num="1.8.5.102"/>
        <vers num="1.8.5.103"/>
        <vers num="1.8.5.104"/>
        <vers num="1.8.5.105"/>
        <vers num="1.8.5.106"/>
        <vers num="1.8.5.107"/>
        <vers num="1.8.5.108"/>
        <vers num="1.8.5.109"/>
        <vers num="1.8.5.110"/>
        <vers num="1.8.5.111"/>
        <vers num="1.8.5.113"/>
        <vers num="1.8.5.114"/>
        <vers num="1.8.5.115"/>
        <vers num="1.8.5.116"/>
        <vers num="1.8.5.122"/>
        <vers num="1.8.5.123"/>
        <vers num="1.8.5.124"/>
        <vers num="1.8.5.125"/>
        <vers num="1.8.5.126"/>
        <vers num="1.8.5.127"/>
        <vers num="1.8.5.128"/>
        <vers num="1.8.5.129"/>
        <vers num="1.8.5.130"/>
        <vers num="1.8.5.131"/>
        <vers num="1.8.5.132"/>
        <vers num="1.8.5.133"/>
        <vers num="1.8.5.134"/>
        <vers num="1.8.5.135"/>
        <vers num="1.8.5.136"/>
        <vers num="1.8.5.137"/>
        <vers num="1.8.5.138"/>
        <vers num="1.8.5.139"/>
        <vers num="1.8.5.140"/>
        <vers num="1.8.5.141"/>
        <vers num="1.8.5.142"/>
        <vers num="1.8.5.145"/>
        <vers num="1.8.5.146"/>
        <vers num="1.8.5.147"/>
        <vers num="1.8.5.148"/>
        <vers num="1.8.5.149"/>
        <vers num="1.8.5.150"/>
        <vers num="1.8.5.151"/>
        <vers num="1.8.5.153"/>
        <vers num="1.8.5.154"/>
        <vers num="1.8.5.155"/>
        <vers num="1.8.5.156"/>
        <vers num="1.8.5.157"/>
        <vers num="1.8.5.158"/>
        <vers num="1.8.5.159"/>
        <vers num="1.8.5.160"/>
        <vers num="1.8.5.161"/>
        <vers num="1.8.5.162"/>
        <vers num="1.8.5.163"/>
        <vers num="1.8.5.164"/>
        <vers num="1.8.5.165"/>
        <vers num="1.8.5.166"/>
        <vers num="1.8.5.167"/>
        <vers num="1.8.5.168"/>
        <vers num="1.8.5.169"/>
        <vers num="1.8.5.170"/>
        <vers num="1.8.5.171"/>
        <vers num="1.8.5.172"/>
        <vers num="1.8.5.173"/>
        <vers num="1.8.5.174"/>
        <vers num="1.8.5.175"/>
        <vers num="1.8.5.176"/>
        <vers num="1.8.5.177"/>
        <vers num="1.8.5.178"/>
        <vers num="1.8.5.179"/>
        <vers num="1.8.5.180"/>
        <vers num="1.8.5.181"/>
        <vers num="1.8.5.182"/>
        <vers num="1.8.5.183"/>
        <vers num="1.8.5.184"/>
        <vers num="1.8.5.185"/>
        <vers num="1.8.5.186"/>
        <vers num="1.8.5.187"/>
        <vers num="1.8.5.188"/>
        <vers num="1.8.5.189"/>
        <vers num="1.8.5.190"/>
        <vers num="1.8.5.191"/>
        <vers num="1.8.5.192"/>
        <vers num="1.8.5.193"/>
        <vers num="1.8.5.194"/>
        <vers num="1.8.5.195"/>
        <vers num="1.8.5.196"/>
        <vers num="1.8.5.197"/>
        <vers num="1.8.5.198"/>
        <vers num="1.8.5.199"/>
        <vers num="1.8.5.200"/>
        <vers num="1.8.5.201"/>
        <vers num="1.8.5.202"/>
        <vers num="1.8.5.203"/>
        <vers num="1.8.5.204"/>
        <vers num="1.8.5.205"/>
        <vers num="1.8.5.206"/>
        <vers num="1.8.5.207"/>
        <vers num="1.8.5.208"/>
        <vers num="1.8.5.209"/>
        <vers num="1.8.5.210"/>
        <vers num="1.8.5.211"/>
        <vers num="1.8.5.212"/>
        <vers num="1.8.5.213"/>
        <vers num="1.8.5.214"/>
        <vers num="1.8.5.215"/>
        <vers num="1.8.5.216"/>
        <vers num="1.8.5.217"/>
        <vers num="1.8.5.218"/>
        <vers num="1.8.5.219"/>
        <vers num="1.8.5.220"/>
        <vers num="1.8.5.221"/>
        <vers num="1.8.5.222"/>
        <vers num="1.8.5.223"/>
        <vers num="1.8.5.224"/>
        <vers num="1.8.5.225"/>
        <vers num="1.8.5.226"/>
        <vers num="1.8.5.227"/>
        <vers num="1.8.5.228"/>
        <vers num="1.8.5.229"/>
        <vers num="1.8.5.230"/>
        <vers num="1.8.6" edition="preview1"/>
        <vers num="1.8.6" edition="preview2"/>
        <vers num="1.8.6" edition="preview3"/>
        <vers num="1.8.6-26"/>
        <vers num="1.8.6.1"/>
        <vers num="1.8.6.2"/>
        <vers num="1.8.6.4"/>
        <vers num="1.8.6.5"/>
        <vers num="1.8.6.6"/>
        <vers num="1.8.6.7"/>
        <vers num="1.8.6.8"/>
        <vers num="1.8.6.9"/>
        <vers num="1.8.6.10"/>
        <vers num="1.8.6.12"/>
        <vers num="1.8.6.13"/>
        <vers num="1.8.6.14"/>
        <vers num="1.8.6.15"/>
        <vers num="1.8.6.16"/>
        <vers num="1.8.6.17"/>
        <vers num="1.8.6.18"/>
        <vers num="1.8.6.19"/>
        <vers num="1.8.6.20"/>
        <vers num="1.8.6.21"/>
        <vers num="1.8.6.22"/>
        <vers num="1.8.6.23"/>
        <vers num="1.8.6.24"/>
        <vers num="1.8.6.25"/>
        <vers num="1.8.6.26"/>
        <vers num="1.8.6.27"/>
        <vers num="1.8.6.30"/>
        <vers num="1.8.6.31"/>
        <vers num="1.8.6.32"/>
        <vers num="1.8.6.33"/>
        <vers num="1.8.6.34"/>
        <vers num="1.8.6.35"/>
        <vers num="1.8.6.36"/>
        <vers num="1.8.6.37"/>
        <vers num="1.8.6.38"/>
        <vers num="1.8.6.39"/>
        <vers num="1.8.6.40"/>
        <vers num="1.8.6.41"/>
        <vers num="1.8.6.42"/>
        <vers num="1.8.6.43"/>
        <vers num="1.8.6.44"/>
        <vers num="1.8.6.45"/>
        <vers num="1.8.6.46"/>
        <vers num="1.8.6.47"/>
        <vers num="1.8.6.48"/>
        <vers num="1.8.6.49"/>
        <vers num="1.8.6.50"/>
        <vers num="1.8.6.51"/>
        <vers num="1.8.6.52"/>
        <vers num="1.8.6.53"/>
        <vers num="1.8.6.54"/>
        <vers num="1.8.6.55"/>
        <vers num="1.8.6.56"/>
        <vers num="1.8.6.57"/>
        <vers num="1.8.6.58"/>
        <vers num="1.8.6.59"/>
        <vers num="1.8.6.60"/>
        <vers num="1.8.6.63"/>
        <vers num="1.8.6.64"/>
        <vers num="1.8.6.65"/>
        <vers num="1.8.6.66"/>
        <vers num="1.8.6.67"/>
        <vers num="1.8.6.68"/>
        <vers num="1.8.6.69"/>
        <vers num="1.8.6.70"/>
        <vers num="1.8.6.72"/>
        <vers num="1.8.6.73"/>
        <vers num="1.8.6.74"/>
        <vers num="1.8.6.75"/>
        <vers num="1.8.6.76"/>
        <vers num="1.8.6.77"/>
        <vers num="1.8.6.78"/>
        <vers num="1.8.6.79"/>
        <vers num="1.8.6.80"/>
        <vers num="1.8.6.81"/>
        <vers num="1.8.6.82"/>
        <vers num="1.8.6.83"/>
        <vers num="1.8.6.84"/>
        <vers num="1.8.6.85"/>
        <vers num="1.8.6.86"/>
        <vers num="1.8.6.87"/>
        <vers num="1.8.6.88"/>
        <vers num="1.8.6.89"/>
        <vers num="1.8.6.90"/>
        <vers num="1.8.6.91"/>
        <vers num="1.8.6.92"/>
        <vers num="1.8.6.93"/>
        <vers num="1.8.6.94"/>
        <vers num="1.8.6.95"/>
        <vers num="1.8.6.96"/>
        <vers num="1.8.6.97"/>
        <vers num="1.8.6.98"/>
        <vers num="1.8.6.99"/>
        <vers num="1.8.6.100"/>
        <vers num="1.8.6.101"/>
        <vers num="1.8.6.102"/>
        <vers num="1.8.6.103"/>
        <vers num="1.8.6.104"/>
        <vers num="1.8.6.105"/>
        <vers num="1.8.6.106"/>
        <vers num="1.8.6.107"/>
        <vers num="1.8.6.109"/>
        <vers num="1.8.6.110"/>
        <vers num="1.8.6.111"/>
        <vers num="1.8.6.112"/>
        <vers num="1.8.6.113"/>
        <vers num="1.8.6.114"/>
        <vers num="1.8.6.115"/>
        <vers num="1.8.6.121"/>
        <vers num="1.8.6.122"/>
        <vers num="1.8.6.123"/>
        <vers num="1.8.6.124"/>
        <vers num="1.8.6.125"/>
        <vers num="1.8.6.126"/>
        <vers num="1.8.6.127"/>
        <vers num="1.8.6.128"/>
        <vers num="1.8.6.129"/>
        <vers num="1.8.6.130"/>
        <vers num="1.8.6.131"/>
        <vers num="1.8.6.132"/>
        <vers num="1.8.6.133"/>
        <vers num="1.8.6.134"/>
        <vers num="1.8.6.135"/>
        <vers num="1.8.6.136"/>
        <vers num="1.8.6.137"/>
        <vers num="1.8.6.138"/>
        <vers num="1.8.6.139"/>
        <vers num="1.8.6.140"/>
        <vers num="1.8.6.141"/>
        <vers num="1.8.6.144"/>
        <vers num="1.8.6.145"/>
        <vers num="1.8.6.146"/>
        <vers num="1.8.6.147"/>
        <vers num="1.8.6.148"/>
        <vers num="1.8.6.149"/>
        <vers num="1.8.6.150"/>
        <vers num="1.8.6.151"/>
        <vers num="1.8.6.153"/>
        <vers num="1.8.6.154"/>
        <vers num="1.8.6.155"/>
        <vers num="1.8.6.156"/>
        <vers num="1.8.6.157"/>
        <vers num="1.8.6.158"/>
        <vers num="1.8.6.159"/>
        <vers num="1.8.6.160"/>
        <vers num="1.8.6.161"/>
        <vers num="1.8.6.162"/>
        <vers num="1.8.6.163"/>
        <vers num="1.8.6.164"/>
        <vers num="1.8.6.165"/>
        <vers num="1.8.6.166"/>
        <vers num="1.8.6.167"/>
        <vers num="1.8.6.168"/>
        <vers num="1.8.6.169"/>
        <vers num="1.8.6.170"/>
        <vers num="1.8.6.171"/>
        <vers num="1.8.6.172"/>
        <vers num="1.8.6.173"/>
        <vers num="1.8.6.174"/>
        <vers num="1.8.6.175"/>
        <vers num="1.8.6.176"/>
        <vers num="1.8.6.177"/>
        <vers num="1.8.6.178"/>
        <vers num="1.8.6.179"/>
        <vers num="1.8.6.180"/>
        <vers num="1.8.6.181"/>
        <vers num="1.8.6.182"/>
        <vers num="1.8.6.183"/>
        <vers num="1.8.6.184"/>
        <vers num="1.8.6.185"/>
        <vers num="1.8.6.186"/>
        <vers num="1.8.6.187"/>
        <vers num="1.8.6.188"/>
        <vers num="1.8.6.189"/>
        <vers num="1.8.6.190"/>
        <vers num="1.8.6.191"/>
        <vers num="1.8.6.192"/>
        <vers num="1.8.6.193"/>
        <vers num="1.8.6.194"/>
        <vers num="1.8.6.195"/>
        <vers num="1.8.6.196"/>
        <vers num="1.8.6.197"/>
        <vers num="1.8.6.198"/>
        <vers num="1.8.6.199"/>
        <vers num="1.8.6.200"/>
        <vers num="1.8.6.201"/>
        <vers num="1.8.6.202"/>
        <vers num="1.8.6.203"/>
        <vers num="1.8.6.204"/>
        <vers num="1.8.6.205"/>
        <vers num="1.8.6.206"/>
        <vers num="1.8.6.207"/>
        <vers num="1.8.6.208"/>
        <vers num="1.8.6.209"/>
        <vers num="1.8.6.210"/>
        <vers num="1.8.6.211"/>
        <vers num="1.8.6.212"/>
        <vers num="1.8.6.213"/>
        <vers num="1.8.6.214"/>
        <vers num="1.8.6.215"/>
        <vers num="1.8.6.216"/>
        <vers num="1.8.6.217"/>
        <vers num="1.8.6.218"/>
        <vers num="1.8.6.219"/>
        <vers num="1.8.6.220"/>
        <vers num="1.8.6.221"/>
        <vers num="1.8.6.222"/>
        <vers num="1.8.6.223"/>
        <vers num="1.8.6.224"/>
        <vers num="1.8.6.225"/>
        <vers num="1.8.6.226"/>
        <vers num="1.8.6.227"/>
        <vers num="1.8.6.228"/>
        <vers num="1.8.6.229"/>
        <vers num="1.8.7" edition="p160"/>
        <vers num="1.8.7" edition="p17"/>
        <vers num="1.8.7" edition="p173"/>
        <vers num="1.8.7" edition="p174"/>
        <vers num="1.8.7" edition="p22"/>
        <vers num="1.8.7" edition="p248"/>
        <vers num="1.8.7" edition="p249"/>
        <vers num="1.8.7" edition="p299"/>
        <vers num="1.8.7" edition="p301"/>
        <vers num="1.8.7" edition="p302"/>
        <vers num="1.8.7" edition="p330"/>
        <vers num="1.8.7" edition="p334"/>
        <vers num="1.8.7" edition="p352"/>
        <vers num="1.8.7" edition="p357"/>
        <vers num="1.8.7" edition="p358"/>
        <vers num="1.8.7" edition="p370"/>
        <vers num="1.8.7" edition="p371"/>
        <vers num="1.8.7" edition="p373"/>
        <vers num="1.8.7" edition="p374"/>
        <vers num="1.8.7" edition="p71"/>
        <vers num="1.8.7" edition="p72"/>
        <vers num="1.8.7" edition="preview1"/>
        <vers num="1.8.7" edition="preview2"/>
        <vers num="1.8.7" edition="preview3"/>
        <vers num="1.8.7" edition="preview4"/>
        <vers num="1.8.7.7"/>
        <vers num="1.8.7.17"/>
        <vers num="1.8.7.20"/>
        <vers num="1.8.7.21"/>
        <vers num="1.9.0"/>
        <vers num="1.9.0.0"/>
        <vers num="1.9.0.1"/>
      </prod>
      <prod name="ubuntu_linux" vendor="canonical">
        <vers num="6.06" edition=":~~lts~~~"/>
        <vers num="7.04"/>
        <vers num="7.10"/>
        <vers num="8.04" edition=":~~lts~~~"/>
      </prod>
      <prod name="debian_linux" vendor="debian">
        <vers num="4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2665" seq="2008-2665" published="2008-06-19" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in the posix_access function in PHP 5.2.6 and earlier allows remote attackers to bypass safe_mode restrictions via a .. (dot dot) in an http URL, which results in the URL being canonicalized to a local filename after the safe_mode check has successfully run.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2009/May/msg00002.html">APPLE-SA-2009-05-12</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=124654546101607&amp;w=2">SSRT090085</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=125631037611762&amp;w=2">HPSBUX02465</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200811-05.xml">GLSA-200811-05</ref>
      <ref source="SREASONRES" url="http://securityreason.com/achievement_securityalert/54">20080617 PHP 5.2.6 posix_access() (posix ext) safe_mode bypass</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3941">3941</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3549">http://support.apple.com/kb/HT3549</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2009-0035">http://wiki.rpath.com/Advisories:rPSA-2009-0035</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/501376/100/0/threaded">20090302 rPSA-2009-0035-1 php php-cgi php-imap php-mcrypt php-mysql php-mysqli php-pgsql php-soap php-xsl php5 php5-cgi php5-imap php5-mcrypt php5-mysql php5-mysqli php5-pear php5-pgsql php5-soap php5-xsl</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29797">29797</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020327">1020327</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA09-133A.html">TA09-133A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/1297">ADV-2009-1297</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43196">php-posixaccess-security-bypass(43196)</ref>
    </refs>
    <vuln_soft>
      <prod name="php" vendor="php">
        <vers num="5.2.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2666" seq="2008-2666" published="2008-06-19" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Multiple directory traversal vulnerabilities in PHP 5.2.6 and earlier allow context-dependent attackers to bypass safe_mode restrictions by creating a subdirectory named http: and then placing ../ (dot dot slash) sequences in an http URL argument to the (1) chdir or (2) ftok function.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2009/May/msg00002.html">APPLE-SA-2009-05-12</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=124654546101607&amp;w=2">SSRT090085</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=125631037611762&amp;w=2">HPSBUX02465</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200811-05.xml">GLSA-200811-05</ref>
      <ref source="SREASONRES" url="http://securityreason.com/achievement_securityalert/55">20080617 PHP 5.2.6 chdir(),ftok() (standard ext) safe_mode bypass</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3942">3942</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3549">http://support.apple.com/kb/HT3549</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2009-0035">http://wiki.rpath.com/Advisories:rPSA-2009-0035</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/501376/100/0/threaded">20090302 rPSA-2009-0035-1 php php-cgi php-imap php-mcrypt php-mysql php-mysqli php-pgsql php-soap php-xsl php5 php5-cgi php5-imap php5-mcrypt php5-mysql php5-mysqli php5-pear php5-pgsql php5-soap php5-xsl</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29796">29796</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020328">1020328</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA09-133A.html">TA09-133A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/1297">ADV-2009-1297</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43198">php-chdir-ftoc-security-bypass(43198)</ref>
    </refs>
    <vuln_soft>
      <prod name="php" vendor="php">
        <vers num="5.0" edition="rc1"/>
        <vers num="5.0" edition="rc2"/>
        <vers num="5.0" edition="rc3"/>
        <vers num="5.0.0"/>
        <vers num="5.0.1"/>
        <vers num="5.0.2"/>
        <vers num="5.0.3"/>
        <vers num="5.0.4"/>
        <vers num="5.0.5"/>
        <vers num="5.1.0"/>
        <vers num="5.1.1"/>
        <vers num="5.1.2"/>
        <vers num="5.1.3"/>
        <vers num="5.1.4"/>
        <vers num="5.1.5"/>
        <vers num="5.1.6"/>
        <vers num="5.2.0"/>
        <vers num="5.2.1"/>
        <vers num="5.2.2"/>
        <vers num="5.2.3"/>
        <vers num="5.2.4"/>
        <vers num="5.2.5"/>
        <vers num="5.2.6" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2667" seq="2008-2667" published="2008-07-07" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.1" CVSS_base_score="5.1" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the Courier Authentication Library (aka courier-authlib) before 0.60.6 on SUSE openSUSE 10.3 and 11.0, and other platforms, when MySQL and a non-Latin character set are used, allows remote attackers to execute arbitrary SQL commands via the username and unspecified other vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.gentoo.org/show_bug.cgi?id=225407">http://bugs.gentoo.org/show_bug.cgi?id=225407</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html" adv="1">SUSE-SR:2008:014</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200809-05.xml">GLSA-200809-05</ref>
      <ref source="CONFIRM" url="http://www.courier-mta.org/authlib/changelog.html">http://www.courier-mta.org/authlib/changelog.html</ref>
      <ref source="MLIST" url="http://www.mail-archive.com/courier-users@lists.sourceforge.net/msg31362.html">[courier-users] 20080314 Re: [courier-users] [Fwd: Re: authmysql vs apostrophe]</ref>
      <ref source="MLIST" url="http://www.nabble.com/courier-authlib-0.60.6-released-td17720739.html">[courier-announce] 20080608 courier-authlib 0.60.6 released</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43628">opensuse-unspecified-sql-injection(43628)</ref>
    </refs>
    <vuln_soft>
      <prod name="courtier-authlib" vendor="courier-mta">
        <vers num="0.52"/>
        <vers num="0.53"/>
        <vers num="0.54"/>
        <vers num="0.55"/>
        <vers num="0.56"/>
        <vers num="0.57"/>
        <vers num="0.58"/>
        <vers num="0.59"/>
        <vers num="0.59.1"/>
        <vers num="0.59.2"/>
        <vers num="0.59.3"/>
        <vers num="0.60"/>
        <vers num="0.60.1"/>
        <vers num="0.60.2"/>
        <vers num="0.60.3"/>
        <vers num="0.60.4"/>
        <vers num="0.60.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2668" seq="2008-2668" published="2008-06-11" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in yBlog 0.2.2.2 allow remote attackers to inject arbitrary web script or HTML via (1) the q parameter to search.php, or the n parameter to (2) user.php or (3) uss.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://chroot.org/exploits/chroot_uu_009">http://chroot.org/exploits/chroot_uu_009</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3935">3935</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493222/100/0/threaded">20080610 [web-app] yBlog 0.2.2.2 Multiple Remote Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29629">29629</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42958">yblog-searchuseruss-xss(42958)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5773">5773</ref>
    </refs>
    <vuln_soft>
      <prod name="yblog" vendor="y-blog">
        <vers num="0.2.2.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2669" seq="2008-2669" published="2008-06-11" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in yBlog 0.2.2.2 allow remote attackers to execute arbitrary SQL commands via (1) the q parameter to search.php, or the n parameter to (2) user.php or (3) uss.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://chroot.org/exploits/chroot_uu_009">http://chroot.org/exploits/chroot_uu_009</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3935">3935</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493222/100/0/threaded">20080610 [web-app] yBlog 0.2.2.2 Multiple Remote Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29629">29629</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42959">yblog-searchuseruss-sql-injection(42959)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5773">5773</ref>
    </refs>
    <vuln_soft>
      <prod name="yblog" vendor="y-blog">
        <vers num="0.2.2.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2670" seq="2008-2670" published="2008-06-11" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in index.php in Insanely Simple Blog 0.5 allow remote attackers to execute arbitrary SQL commands via (1) the id parameter, or (2) the term parameter in a search action. NOTE: the current_subsection parameter is already covered by CVE-2007-3889.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://chroot.org/exploits/chroot_uu_010">http://chroot.org/exploits/chroot_uu_010</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3938">3938</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493224/100/0/threaded">20080610 [web-app] Insanely Simple Blog 0.5 (index) Remote SQL Injection Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29630">29630</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5774">5774</ref>
    </refs>
    <vuln_soft>
      <prod name="isblog" vendor="insanelysimple2">
        <vers num="0.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2671" seq="2008-2671" published="2008-06-11" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in comments.php in DCFM Blog 0.9.4 allows remote attackers to execute arbitrary SQL commands via the id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://chroot.org/exploits/chroot_uu_008">http://chroot.org/exploits/chroot_uu_008</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3939">3939</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493220/100/0/threaded">20080610 [web-app] DCFM Blog 0.9.4 (comments) Remote SQL Injection Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29627">29627</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42976">dcfmblog-comments-sql-injection(42976)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5772">5772</ref>
    </refs>
    <vuln_soft>
      <prod name="dcfm_blog" vendor="dcfm_blog">
        <vers num="0.9.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2672" seq="2008-2672" published="2008-06-11" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple directory traversal vulnerabilities in ErfurtWiki R1.02b and earlier, when register_globals is enabled, allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the (1) ewiki_id and (2) ewiki_action parameters to fragments/css.php, and possibly the (3) id parameter to the default URI.  NOTE: the default URI is site-specific but often performs an include_once of ewiki.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://chroot.org/exploits/chroot_uu_007">http://chroot.org/exploits/chroot_uu_007</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3936">3936</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493219/100/0/threaded">20080610 [web-app] ErfurtWiki &lt;= R1.02b (css) Local File Inclusion Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29628">29628</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42981">erfurtwiki-css-file-include(42981)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5771">5771</ref>
    </refs>
    <vuln_soft>
      <prod name="erfurtwiki" vendor="erfurtwiki">
        <vers num="r1.02b" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2673" seq="2008-2673" published="2008-06-12" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in Powie pNews 2.08 and 2.10, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the shownews parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29617">29617</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42951">pnews-shownews-sql-injection(42951)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5768">5768</ref>
    </refs>
    <vuln_soft>
      <prod name="pnews" vendor="powie">
        <vers num="2.08"/>
        <vers num="2.10"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2674" seq="2008-2674" published="2008-06-12" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Interstage Management Console, as used in Fujitsu Interstage Application Server 6.0 through 9.0.0A, Apworks Modelers-J 6.0 through 7.0, and Studio 8.0.1 and 9.0.0, allows remote attackers to read or delete arbitrary files via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.fujitsu.com/global/support/software/security/products-f/interstage-200805e.html">http://www.fujitsu.com/global/support/software/security/products-f/interstage-200805e.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29624">29624</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020235">1020235</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1771/references">ADV-2008-1771</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42949">fujitsu-console-unspecified-security-bypass(42949)</ref>
    </refs>
    <vuln_soft>
      <prod name="interstage_application_server_enterprise" vendor="fujitsu">
        <vers num="6.0"/>
        <vers num="7.0"/>
        <vers num="7.0.1"/>
        <vers num="8.0.0"/>
        <vers num="8.0.1"/>
        <vers num="8.0.2"/>
        <vers num="9.0.0"/>
        <vers num="v6.0"/>
        <vers num="v7.0"/>
        <vers num="v7.0.0"/>
        <vers num="v7.0.1"/>
        <vers num="v9.0.0"/>
        <vers num="v9.0.0a"/>
      </prod>
      <prod name="interstage_application_server_plus" vendor="fujitsu">
        <vers num="7.0"/>
        <vers num="7.0.1"/>
        <vers num="v6.0"/>
        <vers num="v7.0"/>
        <vers num="v7.0.0"/>
        <vers num="v7.0.1"/>
      </prod>
      <prod name="interstage_application_server_plus_developer" vendor="fujitsu">
        <vers num="v6.0"/>
        <vers num="v7.0"/>
      </prod>
      <prod name="interstage_application_server_standard_j" vendor="fujitsu">
        <vers num="8.0.0"/>
        <vers num="8.0.2"/>
        <vers num="9.0.0"/>
        <vers num="v9.0.0"/>
        <vers num="v9.0.0a"/>
      </prod>
      <prod name="interstage_apworks_modelers_j" vendor="fujitsu">
        <vers num="v6.0"/>
        <vers num="v6.0a"/>
        <vers num="v7.0"/>
      </prod>
      <prod name="interstage_business_application_server_enterprise" vendor="fujitsu">
        <vers num="v8.0.0"/>
      </prod>
      <prod name="interstage_studio_enterprise" vendor="fujitsu">
        <vers num="8.0.1"/>
        <vers num="v9.0.0"/>
      </prod>
      <prod name="interstage_studio_standard_j" vendor="fujitsu">
        <vers num="8.0.1"/>
        <vers num="v9.0.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2675" seq="2008-2675" published="2008-06-12" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php in PHP Image Gallery allows remote attackers to inject arbitrary web script or HTML via the action parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29643">29643</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42955">phpimagegallery-index-xss(42955)</ref>
    </refs>
    <vuln_soft>
      <prod name="php_image_gallery" vendor="softcomplex">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2676" seq="2008-2676" published="2008-06-12" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the iJoomla News Portal (com_news_portal) component 1.0 and earlier for Joomla! allows remote attackers to execute arbitrary SQL commands via the Itemid parameter to index.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42936">newsportal-index-sql-injection(42936)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5761">5761</ref>
    </refs>
    <vuln_soft>
      <prod name="com_news_portal" vendor="joomla">
        <vers num="1.0" prev="1"/>
      </prod>
      <prod name="joomla" vendor="joomla">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2677" seq="2008-2677" published="2008-06-12" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in edit1.php in Telephone Directory 2008 allows remote attackers to inject arbitrary web script or HTML via the action parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29614">29614</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42972">telephonedirectory2008-edit1-xss(42972)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5764">5764</ref>
    </refs>
    <vuln_soft>
      <prod name="telephone_directory_2008" vendor="telephone">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2678" seq="2008-2678" published="2008-06-12" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in Telephone Directory 2008, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary SQL commands via the (1) code parameter in a confirm_data action to edit1.php and the (2) id parameter to view_more.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29614">29614</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42971">telephonedirectory2008-code-id-sql-injection(42971)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5764">5764</ref>
    </refs>
    <vuln_soft>
      <prod name="telephone_directory_2008" vendor="telephone">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2679" seq="2008-2679" published="2008-06-12" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the KeyWordsList function in _includes/inc_routines.asp in Realm CMS 2.3 and earlier allows remote attackers to execute arbitrary SQL commands via the kwrd parameter in a kwl action to the default URI.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugreport.ir/index.php?/40">http://bugreport.ir/index.php?/40</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29616">29616</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42952">realm-kwrd-sql-injection(42952)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5766">5766</ref>
    </refs>
    <vuln_soft>
      <prod name="realm_cms" vendor="realm_project">
        <vers num="2.3" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2680" seq="2008-2680" published="2008-06-12" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in _db/compact.asp in Realm CMS 2.3 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) CmpctedDB and (2) Boyut parameters.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugreport.ir/index.php?/40">http://bugreport.ir/index.php?/40</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29616">29616</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42953">realm-compact-xss(42953)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5766">5766</ref>
    </refs>
    <vuln_soft>
      <prod name="realm_cms" vendor="realm_project">
        <vers num="2.3" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2681" seq="2008-2681" published="2008-06-12" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Realm CMS 2.3 and earlier allows remote attackers to obtain sensitive information via a direct request to _db/compact.asp, which reveals the database path in an error message.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugreport.ir/index.php?/40">http://bugreport.ir/index.php?/40</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42956">realm-compact-information-disclosure(42956)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5766">5766</ref>
    </refs>
    <vuln_soft>
      <prod name="realm_cms" vendor="realm_project">
        <vers num="2.3" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2682" seq="2008-2682" published="2008-06-12" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">_RealmAdmin/login.asp in Realm CMS 2.3 and earlier allows remote attackers to bypass authentication and access admin pages via certain modified cookies, probably including (1) cUserRole, (2) cUserName, and (3) cUserID.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugreport.ir/index.php?/40">http://bugreport.ir/index.php?/40</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29616">29616</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42960">realm-login-authentication-bypass(42960)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5766">5766</ref>
    </refs>
    <vuln_soft>
      <prod name="realm_cms" vendor="realm_project">
        <vers num="2.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2683" seq="2008-2683" published="2008-06-12" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The BIDIB.BIDIBCtrl.1 ActiveX control in BIDIB.ocx 10.9.3.0 in Black Ice Barcode SDK 5.01 allows remote attackers to force the download and storage of arbitrary files by specifying the origin URL in the first argument to the DownloadImageFileURL method, and the local filename in the second argument.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/8276">8276</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/8277">8277</ref>
      <ref source="EXPLOIT-DB" url="http://www.exploit-db.com/exploits/17415">17415</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1768/references">ADV-2008-1768</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42891">barcode-bidib-file-overwrite(42891)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5750">5750</ref>
    </refs>
    <vuln_soft>
      <prod name="barcode_sdk" vendor="black_ice">
        <vers num="5.01"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2684" seq="2008-2684" published="2008-06-12" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The BIDIB.BIDIBCtrl.1 ActiveX control in BIDIB.ocx 10.9.3.0 in Black Ice Barcode SDK 5.01 allows remote attackers to execute arbitrary code via long strings in the two arguments to the DownloadImageFileURL method, which trigger memory corruption.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29579">29579</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1768/references">ADV-2008-1768</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42896">barcode-bidib-code-execution(42896)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5750">5750</ref>
    </refs>
    <vuln_soft>
      <prod name="black_ice_barcode_sdk" vendor="blackice">
        <vers num="5.01"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2685" seq="2008-2685" published="2008-06-12" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in article.asp in Battle Blog 1.25 Build 4 and earlier allows remote attackers to execute arbitrary SQL commands via the entry parameter, a different vector than CVE-2008-2626.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.davethewebguy.com/battleblog/article.asp?entry=24">http://www.davethewebguy.com/battleblog/article.asp?entry=24</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1737">ADV-2008-1737</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43018">battleblog-article-sql-injection(43018)</ref>
    </refs>
    <vuln_soft>
      <prod name="battleblog" vendor="battleblog">
        <vers num="1.25" prev="1" edition="build_4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2686" seq="2008-2686" published="2008-06-13" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">webinc/bxe/scripts/loadsave.php in Flux CMS 1.5.0 and earlier allows remote attackers to execute arbitrary code by overwriting a PHP file in webinc/bxe/scripts/ via a filename in the XML parameter and PHP sequences in the request body, then making a direct request for this filename.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29618">29618</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42961">fluxcms-loadsave-file-overwrite(42961)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5767">5767</ref>
    </refs>
    <vuln_soft>
      <prod name="flux_cms" vendor="flux_cms">
        <vers num="1.2"/>
        <vers num="1.3"/>
        <vers num="1.4"/>
        <vers num="1.31"/>
        <vers num="1.50" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2687" seq="2008-2687" published="2008-06-13" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in inc/config.php in ProManager 0.73 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the language parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29613">29613</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42962">promanager-language-file-include(42962)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5762">5762</ref>
    </refs>
    <vuln_soft>
      <prod name="promanager" vendor="promanager">
        <vers num="0.73"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2688" seq="2008-2688" published="2008-06-13" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in pilot.asp in ASPilot Pilot Cart 7.3 allows remote attackers to execute arbitrary SQL commands via the article parameter in a kb action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29615">29615</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42946">pilotcart-article-sql-injection(42946)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5765">5765</ref>
    </refs>
    <vuln_soft>
      <prod name="pilot_cart" vendor="pilotcart">
        <vers num="7.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2689" seq="2008-2689" published="2008-06-13" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in pub/clients.php in BrowserCRM 5.002.00 allows remote attackers to execute arbitrary PHP code via a URL in the bcrm_pub_root parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29598">29598</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42922">browsercrm-bcrmpubroot-file-include(42922)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5757">5757</ref>
    </refs>
    <vuln_soft>
      <prod name="browsercrm" vendor="browsercrm">
        <vers num="5.002.00"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2690" seq="2008-2690" published="2008-06-13" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple PHP remote file inclusion vulnerabilities in BrowserCRM 5.002.00, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the bcrm_pub_root parameter to (1) kb.php, (2) login.php, (3) index.php, (4) contact_view.php, and (5) contact.php in pub/, different vectors than CVE-2008-2689.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42922">browsercrm-bcrmpubroot-file-include(42922)</ref>
    </refs>
    <vuln_soft>
      <prod name="browsercrm" vendor="browsercrm">
        <vers num="5.002.00"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2691" seq="2008-2691" published="2008-06-13" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in read.asp in JiRo's FAQ Manager eXperience 1.0 allows remote attackers to execute arbitrary SQL commands via the fID parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29594">29594</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42919">jiro-read-sql-injection(42919)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5753">5753</ref>
    </refs>
    <vuln_soft>
      <prod name="faq_manager_experience" vendor="jiro">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2692" seq="2008-2692" published="2008-06-13" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the yvComment (com_yvcomment) component 1.16.0 and earlier for Joomla! allows remote attackers to execute arbitrary SQL commands via the ArticleID parameter in a comment action to index.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29596">29596</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42920">yvcomment-index-sql-injection(42920)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5755">5755</ref>
    </refs>
    <vuln_soft>
      <prod name="com_yvcomment" vendor="joomla">
        <vers num="1.1"/>
        <vers num="1.2"/>
        <vers num="1.3"/>
        <vers num="1.4"/>
        <vers num="1.5"/>
        <vers num="1.6"/>
        <vers num="1.7"/>
        <vers num="1.8"/>
        <vers num="1.9"/>
        <vers num="1.10"/>
        <vers num="1.11"/>
        <vers num="1.12"/>
        <vers num="1.13"/>
        <vers num="1.14"/>
        <vers num="1.15"/>
        <vers num="1.16"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2693" seq="2008-2693" published="2008-06-13" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the BITIFF.BITiffCtrl.1 ActiveX control in BITiff.ocx 10.9.3.0 in Black Ice Barcode SDK 5.01 allows remote attackers to execute arbitrary code via a long first argument to the SetByteOrder method.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42897">barcode-bitiff-bo(42897)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5746">5746</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5747">5747</ref>
    </refs>
    <vuln_soft>
      <prod name="barcode_sdk" vendor="black_ice">
        <vers num="5.01"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2694" seq="2008-2694" published="2008-06-13" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in search.php in phpInv 0.8.0 allows remote attackers to inject arbitrary web script or HTML via the keyword parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29597">29597</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42928">phpinv-search-xss(42928)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5754">5754</ref>
    </refs>
    <vuln_soft>
      <prod name="phpinv" vendor="phpinv">
        <vers num="0.8.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2695" seq="2008-2695" published="2008-06-13" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in entry.php in phpInv 0.8.0 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the action parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29597">29597</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42926">phpinv-entry-file-include(42926)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5754">5754</ref>
    </refs>
    <vuln_soft>
      <prod name="phpinv" vendor="phpinv">
        <vers num="0.8.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2696" seq="2008-2696" published="2008-06-13" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Exiv2 0.16 allows user-assisted remote attackers to cause a denial of service (divide-by-zero and application crash) via a zero value in Nikon lens information in the metadata of an image, related to "pretty printing" and the RationalValue::toLong function.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugzilla.gnome.org/show_bug.cgi?id=524715">http://bugzilla.gnome.org/show_bug.cgi?id=524715</ref>
      <ref source="MISC" url="http://dev.robotbattle.com/bugs/view.php?id=0000546">http://dev.robotbattle.com/bugs/view.php?id=0000546</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00012.html">SUSE-SR:2008:023</ref>
      <ref source="CONFIRM" url="http://www.exiv2.org/changelog.html">http://www.exiv2.org/changelog.html</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:119">MDVSA-2008:119</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29586">29586</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-655-1">USN-655-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1766/references">ADV-2008-1766</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42885">exiv2-printing-dos(42885)</ref>
    </refs>
    <vuln_soft>
      <prod name="exiv2" vendor="exiv2">
        <vers num="0.16"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2697" seq="2008-2697" published="2008-06-13" modified="2017-10-18" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the Rapid Recipe (com_rapidrecipe) component 1.6.6 and 1.6.7 for Joomla! allows remote attackers to execute arbitrary SQL commands via the recipe_id parameter in a viewrecipe action to index.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29593">29593</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42924">rapidrecipe-recipeid-sql-injection(42924)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5759">5759</ref>
    </refs>
    <vuln_soft>
      <prod name="com_rapidrecipe" vendor="joomla">
        <vers num="1.6.6"/>
        <vers num="1.6.7"/>
      </prod>
      <prod name="rapid_recipe" vendor="rapid-source">
        <vers num="1.6.6"/>
        <vers num="1.6.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2698" seq="2008-2698" published="2008-06-13" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in photo_add-c.php (aka the "add comment" section) in WEBalbum 2.0 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) comment, (2) id, or (3) category parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3940">3940</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493143/100/0/threaded">20080605 WEBAlbum &lt;= 2.0 Remote Stored Cross Site Scripting Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29580">29580</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42893">webalbum-photoaddc-xss(42893)</ref>
    </refs>
    <vuln_soft>
      <prod name="webalbum" vendor="web-album">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2699" seq="2008-2699" published="2008-06-13" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple directory traversal vulnerabilities in Galatolo WebManager (GWM) 1.0 allow remote attackers to include and execute arbitrary local files via directory traversal sequences in (1) the plugin parameter to admin/plugins.php or (2) the com parameter to index.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29595">29595</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42923">galatolo-index-file-include(42923)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5758">5758</ref>
    </refs>
    <vuln_soft>
      <prod name="galatolo_webmanager" vendor="gwm">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2700" seq="2008-2700" published="2008-06-13" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in view.php in Galatolo WebManager 1.0 and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42934">galatolo-view-sql-injection(42934)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5760">5760</ref>
    </refs>
    <vuln_soft>
      <prod name="galatolo_webmanager" vendor="gwm">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2701" seq="2008-2701" published="2008-06-13" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the GameQ (com_gameq) component 4.0 and earlier for Joomla! allows remote attackers to execute arbitrary SQL commands via the category_id parameter in a page action to index.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://packetstormsecurity.org/0806-exploits/joomlagameq-sql.txt">http://packetstormsecurity.org/0806-exploits/joomlagameq-sql.txt</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/498903/100/0/threaded">20081204 Joomla Component GameQ</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/498923/100/0/threaded">20081204 Re: Joomla Component GameQ</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29592">29592</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/32633">32633</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42929">gameq-index-sql-injection(42929)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5752">5752</ref>
    </refs>
    <vuln_soft>
      <prod name="com_gameq" vendor="joomla">
        <vers num="4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2702" seq="2008-2702" published="2008-06-13" modified="2017-11-22" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in the FTP client in ALTools ESTsoft ALFTP 4.1 beta 2 and 5.0 allows remote FTP servers to create or overwrite arbitrary files via a .. (dot dot) in a response to a LIST command, a related issue to CVE-2002-1345.  NOTE: this can be leveraged for code execution by writing to a Startup folder.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://vuln.sg/alftp41b2-en.html" adv="1">http://vuln.sg/alftp41b2-en.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29585" adv="1">29585</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1763/references" adv="1">ADV-2008-1763</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42900" adv="1">alftpftp-list-directory-traversal(42900)</ref>
    </refs>
    <vuln_soft>
      <prod name="alftp" vendor="estsoft">
        <vers num="4.1" edition="beta2::en"/>
        <vers num="5.0" edition="::ko"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2703" seq="2008-2703" published="2008-06-13" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple stack-based buffer overflows in Novell GroupWise Messenger (GWIM) Client before 2.0.3 HP1 for Windows allow remote attackers to execute arbitrary code via "spoofed server responses" that contain a long string after the NM_A_SZ_TRANSACTION_ID field name.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5026700.html" patch="1">http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5026700.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493964/100/0/threaded">20080704 Novell GroupWise Messenger Client (GWIM) Remote Stack Overflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29602">29602</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020209">1020209</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1764/references" adv="1">ADV-2008-1764</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42917">groupwise-messenger-client-bo(42917)</ref>
    </refs>
    <vuln_soft>
      <prod name="groupwise_messenger" vendor="novell">
        <vers num="2.0"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2704" seq="2008-2704" published="2008-06-13" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Novell GroupWise Messenger (GWIM) before 2.0.3 Hot Patch 1 allows remote attackers to cause a denial of service (crash) via a long user ID, possibly involving a popup alert.  NOTE: it is not clear whether this issue crosses privilege boundaries.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5026700.html">http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5026700.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493964/100/0/threaded">20080704 Novell GroupWise Messenger Client (GWIM) Remote Stack Overflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29602">29602</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020209">1020209</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1764/references" adv="1">ADV-2008-1764</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42918">groupwise-messenger-client-dos(42918)</ref>
    </refs>
    <vuln_soft>
      <prod name="groupwise_messenger" vendor="novell">
        <vers num="1.0.6"/>
        <vers num="2.0"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2705" seq="2008-2705" published="2008-06-16" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Sun Java System Access Manager (AM) 7.1, when used with certain versions and configurations of Sun Directory Server Enterprise Edition (DSEE), allows remote attackers to bypass authentication via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-238416-1">238416</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29676">29676</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020273">1020273</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1806">ADV-2008-1806</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43004">sun-jsam-unspecified-security-bypass(43004)</ref>
    </refs>
    <vuln_soft>
      <prod name="java_system_access_manager" vendor="sun">
        <vers num="7.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2706" seq="2008-2706" published="2008-06-16" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.9" CVSS_base_score="4.9" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the event port implementation in Sun Solaris 10 allows local users to cause a denial of service (panic) by submitting and retrieving user-defined events, probably related to a NULL dereference.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-235122-1">235122</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29680">29680</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020274">1020274</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1807">ADV-2008-1807</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43005">solaris-eventport-dos(43005)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5762">oval:org.mitre.oval:def:5762</ref>
    </refs>
    <vuln_soft>
      <prod name="solaris" vendor="sun">
        <vers num="10" edition=":sparc"/>
        <vers num="10" edition=":x86"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2707" seq="2008-2707" published="2008-06-16" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the e1000g driver in Sun Solaris 10 and OpenSolaris before snv_93 allows remote attackers to cause a denial of service (network connectivity loss) via unknown vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020290">1020290</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-238250-1">238250</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29730">29730</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1835">ADV-2008-1835</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43096">solaris-e1000ggigabit-dos(43096)</ref>
    </refs>
    <vuln_soft>
      <prod name="network_interface_controller" vendor="intel">
        <vers num="82571"/>
        <vers num="82572"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2708" seq="2008-2708" published="2008-06-16" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="4.9" CVSS_base_score="4.9" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Sun (1) UltraSPARC T2 and (2) UltraSPARC T2+ kernel modules in Sun Solaris 10, and OpenSolaris before snv_93, allows local users to cause a denial of service (panic) via unspecified vectors, probably related to core files.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-238688-1">238688</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29678">29678</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020275">1020275</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1805">ADV-2008-1805</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43003">solaris-ultrasparc-dos(43003)</ref>
    </refs>
    <vuln_soft>
      <prod name="opensolaris" vendor="sun">
        <vers num="build_snv_64"/>
        <vers num="build_snv_92" prev="1"/>
      </prod>
      <prod name="sunos" vendor="sun">
        <vers num="5.10"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2709" seq="2008-2709" published="2008-06-16" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.7" CVSS_base_score="4.7" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the BrSmRcvAndCheck function in the RCHMGR module on IBM OS/400 V5R4M0, V5R4M5, and V6R1M0 allows local users to cause a denial of service (task halt and main storage dump) via unspecified vectors involving the running of diagnostics on a modem port.  NOTE: there might be limited attack scenarios.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29660">29660</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1799">ADV-2008-1799</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/docview.wss?uid=nas21f21bcbaa63f55268625745e003c6f64">MA36741</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42984">os400-brsmrcvandcheck-bo(42984)</ref>
    </refs>
    <vuln_soft>
      <prod name="os_400" vendor="ibm">
        <vers num="v5r4m0"/>
        <vers num="v5r4m5"/>
        <vers num="v6r1m0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2710" seq="2008-2710" published="2008-06-16" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Integer signedness error in the ip_set_srcfilter function in the IP Multicast Filter in uts/common/inet/ip/ip_multi.c in the kernel in Sun Solaris 10 and OpenSolaris before snv_92 allows local users to execute arbitrary code in other Solaris Zones via an SIOCSIPMSFILTER IOCTL request with a large value of the imsf->imsf_numsrc field, which triggers an out-of-bounds write of kernel memory.  NOTE: this was reported as an integer overflow, but the root cause involves the bypass of a signed comparison.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-237965-1">237965</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29699">29699</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020283">1020283</ref>
      <ref source="MISC" url="http://www.trapkit.de/advisories/TKADV2008-003.txt">http://www.trapkit.de/advisories/TKADV2008-003.txt</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1832/references">ADV-2008-1832</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43068">sun-solaris-ipsetsrcfilter-code-execution(43068)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5731">oval:org.mitre.oval:def:5731</ref>
    </refs>
    <vuln_soft>
      <prod name="opensolaris" vendor="sun">
        <vers num="10"/>
      </prod>
      <prod name="solaris" vendor="sun">
        <vers num="10" prev="1" edition=":sparc"/>
      </prod>
      <prod name="sunos" vendor="sun">
        <vers num="-" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2711" seq="2008-2711" published="2008-06-16" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">fetchmail 6.3.8 and earlier, when running in -v -v (aka verbose) mode, allows remote attackers to cause a denial of service (crash and persistent mail failure) via a malformed mail message with long headers, which triggers an erroneous dereference when using vsnprintf to format log messages.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html">APPLE-SA-2009-02-12</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.495740">SSA:2008-210-01</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3438">http://support.apple.com/kb/HT3438</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0235">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0235</ref>
      <ref source="CONFIRM" url="http://www.fetchmail.info/fetchmail-SA-2008-01.txt">http://www.fetchmail.info/fetchmail-SA-2008-01.txt</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:117">MDVSA-2008:117</ref>
      <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/06/13/1">[oss-security] 20080613 CVE Id Request: fetchmail &lt;= 6.3.8 DoS when logging long headers in -v -v mode</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493391/100/0/threaded">20080617 fetchmail security announcement fetchmail-SA-2008-01 (CVE-2008-2711)</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/494865/100/0/threaded">20080729 rPSA-2008-0235-1 fetchmail fetchmailconf</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29705">29705</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020298">1020298</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1860/references">ADV-2008-1860</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/0422">ADV-2009-0422</ref>
      <ref source="MISC" url="https://bugzilla.novell.com/show_bug.cgi?id=354291">https://bugzilla.novell.com/show_bug.cgi?id=354291</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43121">fetchmail-logmessage-dos(43121)</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2623">https://issues.rpath.com/browse/RPL-2623</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10950">oval:org.mitre.oval:def:10950</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01091.html">FEDORA-2008-5789</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01095.html">FEDORA-2008-5800</ref>
    </refs>
    <vuln_soft>
      <prod name="fetchmail" vendor="fetchmail">
        <vers num="4.5.1"/>
        <vers num="4.5.2"/>
        <vers num="4.5.3"/>
        <vers num="4.5.4"/>
        <vers num="4.5.5"/>
        <vers num="4.5.6"/>
        <vers num="4.5.7"/>
        <vers num="4.5.8"/>
        <vers num="4.6.0"/>
        <vers num="4.6.1"/>
        <vers num="4.6.2"/>
        <vers num="4.6.3"/>
        <vers num="4.6.4"/>
        <vers num="4.6.5"/>
        <vers num="4.6.6"/>
        <vers num="4.6.7"/>
        <vers num="4.6.8"/>
        <vers num="4.6.9"/>
        <vers num="4.7.0"/>
        <vers num="4.7.1"/>
        <vers num="4.7.2"/>
        <vers num="4.7.3"/>
        <vers num="4.7.4"/>
        <vers num="4.7.5"/>
        <vers num="4.7.6"/>
        <vers num="4.7.7"/>
        <vers num="5.0.0"/>
        <vers num="5.0.1"/>
        <vers num="5.0.2"/>
        <vers num="5.0.3"/>
        <vers num="5.0.4"/>
        <vers num="5.0.5"/>
        <vers num="5.0.6"/>
        <vers num="5.0.7"/>
        <vers num="5.0.8"/>
        <vers num="5.1.0"/>
        <vers num="5.1.4"/>
        <vers num="5.2.0"/>
        <vers num="5.2.1"/>
        <vers num="5.2.3"/>
        <vers num="5.2.4"/>
        <vers num="5.2.7"/>
        <vers num="5.2.8"/>
        <vers num="5.3.0"/>
        <vers num="5.3.1"/>
        <vers num="5.3.3"/>
        <vers num="5.3.8"/>
        <vers num="5.4.0"/>
        <vers num="5.4.3"/>
        <vers num="5.4.4"/>
        <vers num="5.4.5"/>
        <vers num="5.5.0"/>
        <vers num="5.5.2"/>
        <vers num="5.5.3"/>
        <vers num="5.5.5"/>
        <vers num="5.5.6"/>
        <vers num="5.6.0"/>
        <vers num="5.7.0"/>
        <vers num="5.7.2"/>
        <vers num="5.7.4"/>
        <vers num="5.8"/>
        <vers num="5.8.1"/>
        <vers num="5.8.2"/>
        <vers num="5.8.3"/>
        <vers num="5.8.4"/>
        <vers num="5.8.5"/>
        <vers num="5.8.6"/>
        <vers num="5.8.11"/>
        <vers num="5.8.13"/>
        <vers num="5.8.14"/>
        <vers num="5.8.17"/>
        <vers num="5.9.0"/>
        <vers num="5.9.4"/>
        <vers num="5.9.5"/>
        <vers num="5.9.8"/>
        <vers num="5.9.10"/>
        <vers num="5.9.11"/>
        <vers num="5.9.13"/>
        <vers num="6.0.0"/>
        <vers num="6.1.0"/>
        <vers num="6.1.3"/>
        <vers num="6.2.0"/>
        <vers num="6.2.1"/>
        <vers num="6.2.2"/>
        <vers num="6.2.3"/>
        <vers num="6.2.4"/>
        <vers num="6.2.5"/>
        <vers num="6.2.5.1"/>
        <vers num="6.2.5.2"/>
        <vers num="6.2.5.4"/>
        <vers num="6.2.6" edition="pre4"/>
        <vers num="6.2.6" edition="pre8"/>
        <vers num="6.2.6" edition="pre9"/>
        <vers num="6.2.9" edition="rc10"/>
        <vers num="6.2.9" edition="rc3"/>
        <vers num="6.2.9" edition="rc4"/>
        <vers num="6.2.9" edition="rc5"/>
        <vers num="6.2.9" edition="rc7"/>
        <vers num="6.2.9" edition="rc8"/>
        <vers num="6.2.9" edition="rc9"/>
        <vers num="6.3.0"/>
        <vers num="6.3.1"/>
        <vers num="6.3.2"/>
        <vers num="6.3.3"/>
        <vers num="6.3.4"/>
        <vers num="6.3.5"/>
        <vers num="6.3.6" edition="rc1"/>
        <vers num="6.3.6" edition="rc2"/>
        <vers num="6.3.6" edition="rc3"/>
        <vers num="6.3.6" edition="rc4"/>
        <vers num="6.3.6" edition="rc5"/>
        <vers num="6.3.7"/>
        <vers num="6.3.8" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2712" seq="2008-2712" published="2008-06-16" modified="2018-11-01" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Vim 7.1.314, 6.4, and other versions allows user-assisted remote attackers to execute arbitrary commands via Vim scripts that do not properly sanitize inputs before invoking the execute or system functions, as demonstrated using (1) filetype.vim, (3) xpm.vim, (4) gzip_vim, and (5) netrw.  NOTE: the originally reported version was 7.1.314, but the researcher actually found this set of issues in 7.1.298.  NOTE: the zipplugin issue (originally vector 2 in this identifier) has been subsumed by CVE-2008-3075.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html" adv="1">APPLE-SA-2008-10-09</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html" adv="1">APPLE-SA-2010-03-29-1</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html" adv="1">SUSE-SR:2009:007</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=121494431426308&amp;w=2" adv="1">20080701 Re: Collection of Vulnerabilities in Fully Patched Vim 7.1</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3951" adv="1">3951</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3216" adv="1">http://support.apple.com/kb/HT3216</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT4077" adv="1">http://support.apple.com/kb/HT4077</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2008-457.htm" adv="1">http://support.avaya.com/elmodocs2/security/ASA-2008-457.htm</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2009-001.htm" adv="1">http://support.avaya.com/elmodocs2/security/ASA-2009-001.htm</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0247" adv="1">http://wiki.rpath.com/Advisories:rPSA-2008-0247</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:236" adv="1">MDVSA-2008:236</ref>
      <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/06/16/2" adv="1">[oss-security] 20080616 CVE Id request: vim</ref>
      <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/10/15/1" adv="1">[oss-security] 20081015 Vim CVE issues cleanup (plugins tar.vim, zip.vim) - CVE-2008-3074 and CVE-2008-3075</ref>
      <ref source="MISC" url="http://www.rdancer.org/vulnerablevim.html">http://www.rdancer.org/vulnerablevim.html</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0580.html" adv="1">RHSA-2008:0580</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0617.html" adv="1">RHSA-2008:0617</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0618.html" adv="1">RHSA-2008:0618</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493352/100/0/threaded" adv="1">20080613 Collection of Vulnerabilities in Fully Patched Vim 7.1</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493353/100/0/threaded" adv="1">20080614 Re: Collection of Vulnerabilities in Fully Patched Vim 7.1</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/495319/100/0/threaded" adv="1">20080811 rPSA-2008-0247-1 gvim vim vim-minimal</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/502322/100/0/threaded" adv="1">20090401 VMSA-2009-0004 ESX Service Console updates for openssl, bind, and vim</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29715" adv="1">29715</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/31681" adv="1">31681</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020293" adv="1">1020293</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/USN-712-1" adv="1">USN-712-1</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/security/advisories/VMSA-2009-0004.html" adv="1">http://www.vmware.com/security/advisories/VMSA-2009-0004.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1851/references" adv="1">ADV-2008-1851</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2780" adv="1">ADV-2008-2780</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/0033" adv="1">ADV-2009-0033</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/0904" adv="1">ADV-2009-0904</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43083" adv="1">vim-scripts-command-execution(43083)</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2622">https://issues.rpath.com/browse/RPL-2622</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11109" adv="1">oval:org.mitre.oval:def:11109</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6238" adv="1">oval:org.mitre.oval:def:6238</ref>
    </refs>
    <vuln_soft>
      <prod name="vim" vendor="vim">
        <vers num="6.4" prev="1"/>
        <vers num="7.0"/>
        <vers num="7.0.001"/>
        <vers num="7.0.002"/>
        <vers num="7.0.003"/>
        <vers num="7.0.004"/>
        <vers num="7.0.005"/>
        <vers num="7.0.006"/>
        <vers num="7.0.007"/>
        <vers num="7.0.008"/>
        <vers num="7.0.009"/>
        <vers num="7.0.010"/>
        <vers num="7.0.011"/>
        <vers num="7.0.012"/>
        <vers num="7.0.013"/>
        <vers num="7.0.014"/>
        <vers num="7.0.015"/>
        <vers num="7.0.016"/>
        <vers num="7.0.017"/>
        <vers num="7.0.018"/>
        <vers num="7.0.019"/>
        <vers num="7.0.020"/>
        <vers num="7.0.021"/>
        <vers num="7.0.022"/>
        <vers num="7.0.023"/>
        <vers num="7.0.024"/>
        <vers num="7.0.025"/>
        <vers num="7.0.026"/>
        <vers num="7.0.027"/>
        <vers num="7.0.028"/>
        <vers num="7.0.029"/>
        <vers num="7.0.030"/>
        <vers num="7.0.031"/>
        <vers num="7.0.032"/>
        <vers num="7.0.033"/>
        <vers num="7.0.034"/>
        <vers num="7.0.035"/>
        <vers num="7.0.036"/>
        <vers num="7.0.037"/>
        <vers num="7.0.038"/>
        <vers num="7.0.039"/>
        <vers num="7.0.040"/>
        <vers num="7.0.041"/>
        <vers num="7.0.042"/>
        <vers num="7.0.043"/>
        <vers num="7.0.044"/>
        <vers num="7.0.045"/>
        <vers num="7.0.046"/>
        <vers num="7.0.047"/>
        <vers num="7.0.048"/>
        <vers num="7.0.049"/>
        <vers num="7.0.050"/>
        <vers num="7.0.051"/>
        <vers num="7.0.052"/>
        <vers num="7.0.053"/>
        <vers num="7.0.054"/>
        <vers num="7.0.055"/>
        <vers num="7.0.056"/>
        <vers num="7.0.057"/>
        <vers num="7.0.058"/>
        <vers num="7.0.059"/>
        <vers num="7.0.060"/>
        <vers num="7.0.061"/>
        <vers num="7.0.062"/>
        <vers num="7.0.063"/>
        <vers num="7.0.064"/>
        <vers num="7.0.065"/>
        <vers num="7.0.066"/>
        <vers num="7.0.067"/>
        <vers num="7.0.068"/>
        <vers num="7.0.069"/>
        <vers num="7.0.070"/>
        <vers num="7.0.071"/>
        <vers num="7.0.072"/>
        <vers num="7.0.073"/>
        <vers num="7.0.074"/>
        <vers num="7.0.075"/>
        <vers num="7.0.076"/>
        <vers num="7.0.077"/>
        <vers num="7.0.078"/>
        <vers num="7.0.079"/>
        <vers num="7.0.080"/>
        <vers num="7.0.081"/>
        <vers num="7.0.082"/>
        <vers num="7.0.083"/>
        <vers num="7.0.084"/>
        <vers num="7.0.085"/>
        <vers num="7.0.086"/>
        <vers num="7.0.087"/>
        <vers num="7.0.088"/>
        <vers num="7.0.089"/>
        <vers num="7.0.090"/>
        <vers num="7.0.091"/>
        <vers num="7.0.092"/>
        <vers num="7.0.093"/>
        <vers num="7.0.094"/>
        <vers num="7.0.095"/>
        <vers num="7.0.096"/>
        <vers num="7.0.097"/>
        <vers num="7.0.098"/>
        <vers num="7.0.099"/>
        <vers num="7.0.100"/>
        <vers num="7.0.101"/>
        <vers num="7.0.102"/>
        <vers num="7.0.103"/>
        <vers num="7.0.104"/>
        <vers num="7.0.105"/>
        <vers num="7.0.106"/>
        <vers num="7.0.107"/>
        <vers num="7.0.108"/>
        <vers num="7.0.109"/>
        <vers num="7.0.110"/>
        <vers num="7.0.111"/>
        <vers num="7.0.112"/>
        <vers num="7.0.113"/>
        <vers num="7.0.114"/>
        <vers num="7.0.115"/>
        <vers num="7.0.116"/>
        <vers num="7.0.117"/>
        <vers num="7.0.118"/>
        <vers num="7.0.119"/>
        <vers num="7.0.120"/>
        <vers num="7.0.121"/>
        <vers num="7.0.122"/>
        <vers num="7.0.123"/>
        <vers num="7.0.124"/>
        <vers num="7.0.125"/>
        <vers num="7.0.126"/>
        <vers num="7.0.127"/>
        <vers num="7.0.128"/>
        <vers num="7.0.129"/>
        <vers num="7.0.130"/>
        <vers num="7.0.131"/>
        <vers num="7.0.132"/>
        <vers num="7.0.133"/>
        <vers num="7.0.134"/>
        <vers num="7.0.135"/>
        <vers num="7.0.136"/>
        <vers num="7.0.137"/>
        <vers num="7.0.138"/>
        <vers num="7.0.139"/>
        <vers num="7.0.140"/>
        <vers num="7.0.141"/>
        <vers num="7.0.142"/>
        <vers num="7.0.143"/>
        <vers num="7.0.144"/>
        <vers num="7.0.145"/>
        <vers num="7.0.146"/>
        <vers num="7.0.147"/>
        <vers num="7.0.148"/>
        <vers num="7.0.149"/>
        <vers num="7.0.150"/>
        <vers num="7.0.151"/>
        <vers num="7.0.152"/>
        <vers num="7.0.153"/>
        <vers num="7.0.154"/>
        <vers num="7.0.155"/>
        <vers num="7.0.156"/>
        <vers num="7.0.157"/>
        <vers num="7.0.158"/>
        <vers num="7.0.159"/>
        <vers num="7.0.160"/>
        <vers num="7.0.161"/>
        <vers num="7.0.162"/>
        <vers num="7.0.163"/>
        <vers num="7.0.164"/>
        <vers num="7.0.165"/>
        <vers num="7.0.166"/>
        <vers num="7.0.167"/>
        <vers num="7.0.168"/>
        <vers num="7.0.169"/>
        <vers num="7.0.170"/>
        <vers num="7.0.171"/>
        <vers num="7.0.172"/>
        <vers num="7.0.173"/>
        <vers num="7.0.174"/>
        <vers num="7.0.175"/>
        <vers num="7.0.176"/>
        <vers num="7.0.177"/>
        <vers num="7.0.178"/>
        <vers num="7.0.179"/>
        <vers num="7.0.180"/>
        <vers num="7.0.181"/>
        <vers num="7.0.182"/>
        <vers num="7.0.183"/>
        <vers num="7.0.184"/>
        <vers num="7.0.185"/>
        <vers num="7.0.186"/>
        <vers num="7.0.187"/>
        <vers num="7.0.188"/>
        <vers num="7.0.189"/>
        <vers num="7.0.190"/>
        <vers num="7.0.191"/>
        <vers num="7.0.192"/>
        <vers num="7.0.193"/>
        <vers num="7.0.194"/>
        <vers num="7.0.195"/>
        <vers num="7.0.196"/>
        <vers num="7.0.197"/>
        <vers num="7.0.198"/>
        <vers num="7.0.199"/>
        <vers num="7.0.200"/>
        <vers num="7.0.201"/>
        <vers num="7.0.202"/>
        <vers num="7.0.203"/>
        <vers num="7.0.204"/>
        <vers num="7.0.205"/>
        <vers num="7.0.206"/>
        <vers num="7.0.207"/>
        <vers num="7.0.208"/>
        <vers num="7.0.209"/>
        <vers num="7.0.210"/>
        <vers num="7.0.211"/>
        <vers num="7.0.212"/>
        <vers num="7.0.213"/>
        <vers num="7.0.214"/>
        <vers num="7.0.215"/>
        <vers num="7.0.216"/>
        <vers num="7.0.217"/>
        <vers num="7.0.218"/>
        <vers num="7.0.219"/>
        <vers num="7.0.220"/>
        <vers num="7.0.221"/>
        <vers num="7.0.222"/>
        <vers num="7.0.223"/>
        <vers num="7.0.224"/>
        <vers num="7.0.225"/>
        <vers num="7.0.226"/>
        <vers num="7.0.227"/>
        <vers num="7.0.228"/>
        <vers num="7.0.229"/>
        <vers num="7.0.230"/>
        <vers num="7.0.231"/>
        <vers num="7.0.232"/>
        <vers num="7.0.233"/>
        <vers num="7.0.234"/>
        <vers num="7.0.235"/>
        <vers num="7.0.236"/>
        <vers num="7.0.237"/>
        <vers num="7.0.238"/>
        <vers num="7.0.239"/>
        <vers num="7.0.240"/>
        <vers num="7.0.241"/>
        <vers num="7.0.242"/>
        <vers num="7.0.243"/>
        <vers num="7.0b"/>
        <vers num="7.0b01"/>
        <vers num="7.0b02"/>
        <vers num="7.0c"/>
        <vers num="7.0c01"/>
        <vers num="7.0c02"/>
        <vers num="7.0c03"/>
        <vers num="7.0c10"/>
        <vers num="7.0c11"/>
        <vers num="7.0c12"/>
        <vers num="7.0c13"/>
        <vers num="7.0d"/>
        <vers num="7.0d01"/>
        <vers num="7.0d02"/>
        <vers num="7.0d03"/>
        <vers num="7.0d04"/>
        <vers num="7.0d05"/>
        <vers num="7.0e"/>
        <vers num="7.00e+01"/>
        <vers num="7.00e+02"/>
        <vers num="7.00e+03"/>
        <vers num="7.00e+04"/>
        <vers num="7.00e+05"/>
        <vers num="7.00e+06"/>
        <vers num="7.00e+07"/>
        <vers num="7.0f"/>
        <vers num="7.0f01"/>
        <vers num="7.0f02"/>
        <vers num="7.0f03"/>
        <vers num="7.0f04"/>
        <vers num="7.0f05"/>
        <vers num="7.0g"/>
        <vers num="7.0g01"/>
        <vers num="7.0g02"/>
        <vers num="7.0g03"/>
        <vers num="7.0g04"/>
        <vers num="7.0g05"/>
        <vers num="7.01"/>
        <vers num="7.1.001"/>
        <vers num="7.1.002"/>
        <vers num="7.1.003"/>
        <vers num="7.1.004"/>
        <vers num="7.1.005"/>
        <vers num="7.1.006"/>
        <vers num="7.1.007"/>
        <vers num="7.1.008"/>
        <vers num="7.1.009"/>
        <vers num="7.1.010"/>
        <vers num="7.1.011"/>
        <vers num="7.1.012"/>
        <vers num="7.1.013"/>
        <vers num="7.1.014"/>
        <vers num="7.1.015"/>
        <vers num="7.1.016"/>
        <vers num="7.1.017"/>
        <vers num="7.1.018"/>
        <vers num="7.1.019"/>
        <vers num="7.1.020"/>
        <vers num="7.1.021"/>
        <vers num="7.1.022"/>
        <vers num="7.1.023"/>
        <vers num="7.1.024"/>
        <vers num="7.1.025"/>
        <vers num="7.1.026"/>
        <vers num="7.1.027"/>
        <vers num="7.1.028"/>
        <vers num="7.1.029"/>
        <vers num="7.1.030"/>
        <vers num="7.1.031"/>
        <vers num="7.1.032"/>
        <vers num="7.1.033"/>
        <vers num="7.1.034"/>
        <vers num="7.1.035"/>
        <vers num="7.1.036"/>
        <vers num="7.1.037"/>
        <vers num="7.1.038"/>
        <vers num="7.1.039"/>
        <vers num="7.1.040"/>
        <vers num="7.1.041"/>
        <vers num="7.1.042"/>
        <vers num="7.1.043"/>
        <vers num="7.1.044"/>
        <vers num="7.1.045"/>
        <vers num="7.1.046"/>
        <vers num="7.1.047"/>
        <vers num="7.1.048"/>
        <vers num="7.1.049"/>
        <vers num="7.1.050"/>
        <vers num="7.1.051"/>
        <vers num="7.1.052"/>
        <vers num="7.1.053"/>
        <vers num="7.1.054"/>
        <vers num="7.1.055"/>
        <vers num="7.1.056"/>
        <vers num="7.1.057"/>
        <vers num="7.1.058"/>
        <vers num="7.1.059"/>
        <vers num="7.1.060"/>
        <vers num="7.1.061"/>
        <vers num="7.1.062"/>
        <vers num="7.1.063"/>
        <vers num="7.1.064"/>
        <vers num="7.1.065"/>
        <vers num="7.1.066"/>
        <vers num="7.1.067"/>
        <vers num="7.1.068"/>
        <vers num="7.1.069"/>
        <vers num="7.1.070"/>
        <vers num="7.1.071"/>
        <vers num="7.1.072"/>
        <vers num="7.1.073"/>
        <vers num="7.1.074"/>
        <vers num="7.1.075"/>
        <vers num="7.1.076"/>
        <vers num="7.1.077"/>
        <vers num="7.1.078"/>
        <vers num="7.1.079"/>
        <vers num="7.1.080"/>
        <vers num="7.1.081"/>
        <vers num="7.1.082"/>
        <vers num="7.1.084"/>
        <vers num="7.1.085"/>
        <vers num="7.1.086"/>
        <vers num="7.1.087"/>
        <vers num="7.1.088"/>
        <vers num="7.1.089"/>
        <vers num="7.1.090"/>
        <vers num="7.1.091"/>
        <vers num="7.1.092"/>
        <vers num="7.1.093"/>
        <vers num="7.1.094"/>
        <vers num="7.1.095"/>
        <vers num="7.1.096"/>
        <vers num="7.1.097"/>
        <vers num="7.1.098"/>
        <vers num="7.1.099"/>
        <vers num="7.1.100"/>
        <vers num="7.1.101"/>
        <vers num="7.1.102"/>
        <vers num="7.1.103"/>
        <vers num="7.1.104"/>
        <vers num="7.1.105"/>
        <vers num="7.1.106"/>
        <vers num="7.1.107"/>
        <vers num="7.1.108"/>
        <vers num="7.1.109"/>
        <vers num="7.1.110"/>
        <vers num="7.1.111"/>
        <vers num="7.1.112"/>
        <vers num="7.1.113"/>
        <vers num="7.1.114"/>
        <vers num="7.1.115"/>
        <vers num="7.1.116"/>
        <vers num="7.1.117"/>
        <vers num="7.1.118"/>
        <vers num="7.1.119"/>
        <vers num="7.1.120"/>
        <vers num="7.1.121"/>
        <vers num="7.1.122"/>
        <vers num="7.1.123"/>
        <vers num="7.1.124"/>
        <vers num="7.1.125"/>
        <vers num="7.1.126"/>
        <vers num="7.1.127"/>
        <vers num="7.1.128"/>
        <vers num="7.1.129"/>
        <vers num="7.1.130"/>
        <vers num="7.1.131"/>
        <vers num="7.1.132"/>
        <vers num="7.1.133"/>
        <vers num="7.1.134"/>
        <vers num="7.1.135"/>
        <vers num="7.1.136"/>
        <vers num="7.1.137"/>
        <vers num="7.1.138"/>
        <vers num="7.1.139"/>
        <vers num="7.1.140"/>
        <vers num="7.1.141"/>
        <vers num="7.1.142"/>
        <vers num="7.1.143"/>
        <vers num="7.1.144"/>
        <vers num="7.1.145"/>
        <vers num="7.1.146"/>
        <vers num="7.1.147"/>
        <vers num="7.1.148"/>
        <vers num="7.1.149"/>
        <vers num="7.1.150"/>
        <vers num="7.1.151"/>
        <vers num="7.1.152"/>
        <vers num="7.1.153"/>
        <vers num="7.1.154"/>
        <vers num="7.1.155"/>
        <vers num="7.1.156"/>
        <vers num="7.1.157"/>
        <vers num="7.1.158"/>
        <vers num="7.1.159"/>
        <vers num="7.1.160"/>
        <vers num="7.1.161"/>
        <vers num="7.1.162"/>
        <vers num="7.1.163"/>
        <vers num="7.1.164"/>
        <vers num="7.1.165"/>
        <vers num="7.1.166"/>
        <vers num="7.1.167"/>
        <vers num="7.1.168"/>
        <vers num="7.1.169"/>
        <vers num="7.1.170"/>
        <vers num="7.1.171"/>
        <vers num="7.1.172"/>
        <vers num="7.1.173"/>
        <vers num="7.1.174"/>
        <vers num="7.1.175"/>
        <vers num="7.1.176"/>
        <vers num="7.1.177"/>
        <vers num="7.1.178"/>
        <vers num="7.1.179"/>
        <vers num="7.1.180"/>
        <vers num="7.1.181"/>
        <vers num="7.1.182"/>
        <vers num="7.1.183"/>
        <vers num="7.1.184"/>
        <vers num="7.1.185"/>
        <vers num="7.1.186"/>
        <vers num="7.1.187"/>
        <vers num="7.1.188"/>
        <vers num="7.1.189"/>
        <vers num="7.1.190"/>
        <vers num="7.1.191"/>
        <vers num="7.1.192"/>
        <vers num="7.1.193"/>
        <vers num="7.1.194"/>
        <vers num="7.1.195"/>
        <vers num="7.1.196"/>
        <vers num="7.1.197"/>
        <vers num="7.1.198"/>
        <vers num="7.1.199"/>
        <vers num="7.1.200"/>
        <vers num="7.1.201"/>
        <vers num="7.1.202"/>
        <vers num="7.1.203"/>
        <vers num="7.1.204"/>
        <vers num="7.1.205"/>
        <vers num="7.1.206"/>
        <vers num="7.1.207"/>
        <vers num="7.1.208"/>
        <vers num="7.1.209"/>
        <vers num="7.1.210"/>
        <vers num="7.1.211"/>
        <vers num="7.1.212"/>
        <vers num="7.1.213"/>
        <vers num="7.1.214"/>
        <vers num="7.1.215"/>
        <vers num="7.1.216"/>
        <vers num="7.1.217"/>
        <vers num="7.1.218"/>
        <vers num="7.1.219"/>
        <vers num="7.1.220"/>
        <vers num="7.1.221"/>
        <vers num="7.1.222"/>
        <vers num="7.1.223"/>
        <vers num="7.1.224"/>
        <vers num="7.1.225"/>
        <vers num="7.1.226"/>
        <vers num="7.1.227"/>
        <vers num="7.1.228"/>
        <vers num="7.1.229"/>
        <vers num="7.1.230"/>
        <vers num="7.1.231"/>
        <vers num="7.1.232"/>
        <vers num="7.1.233"/>
        <vers num="7.1.234"/>
        <vers num="7.1.235"/>
        <vers num="7.1.236"/>
        <vers num="7.1.237"/>
        <vers num="7.1.238"/>
        <vers num="7.1.239"/>
        <vers num="7.1.240"/>
        <vers num="7.1.241"/>
        <vers num="7.1.242"/>
        <vers num="7.1.243"/>
        <vers num="7.1.244"/>
        <vers num="7.1.245"/>
        <vers num="7.1.246"/>
        <vers num="7.1.247"/>
        <vers num="7.1.248"/>
        <vers num="7.1.249"/>
        <vers num="7.1.250"/>
        <vers num="7.1.251"/>
        <vers num="7.1.252"/>
        <vers num="7.1.253"/>
        <vers num="7.1.254"/>
        <vers num="7.1.255"/>
        <vers num="7.1.256"/>
        <vers num="7.1.257"/>
        <vers num="7.1.258"/>
        <vers num="7.1.259"/>
        <vers num="7.1.260"/>
        <vers num="7.1.261"/>
        <vers num="7.1.262"/>
        <vers num="7.1.263"/>
        <vers num="7.1.264"/>
        <vers num="7.1.265"/>
        <vers num="7.1.266"/>
        <vers num="7.1.267"/>
        <vers num="7.1.268"/>
        <vers num="7.1.269"/>
        <vers num="7.1.270"/>
        <vers num="7.1.271"/>
        <vers num="7.1.272"/>
        <vers num="7.1.273"/>
        <vers num="7.1.274"/>
        <vers num="7.1.275"/>
        <vers num="7.1.276"/>
        <vers num="7.1.277"/>
        <vers num="7.1.278"/>
        <vers num="7.1.279"/>
        <vers num="7.1.280"/>
        <vers num="7.1.281"/>
        <vers num="7.1.282"/>
        <vers num="7.1.283"/>
        <vers num="7.1.284"/>
        <vers num="7.1.285"/>
        <vers num="7.1.286"/>
        <vers num="7.1.287"/>
        <vers num="7.1.288"/>
        <vers num="7.1.289"/>
        <vers num="7.1.290"/>
        <vers num="7.1.291"/>
        <vers num="7.1.292"/>
        <vers num="7.1.293"/>
        <vers num="7.1.294"/>
        <vers num="7.1.295"/>
        <vers num="7.1.296"/>
        <vers num="7.1.297"/>
        <vers num="7.1.298"/>
        <vers num="7.1.299"/>
        <vers num="7.1.300"/>
        <vers num="7.1.301"/>
        <vers num="7.1.302"/>
        <vers num="7.1.303"/>
        <vers num="7.1.304"/>
        <vers num="7.1.305"/>
        <vers num="7.1.306"/>
        <vers num="7.1.307"/>
        <vers num="7.1.308"/>
        <vers num="7.1.309"/>
        <vers num="7.1.310"/>
        <vers num="7.1.311"/>
        <vers num="7.1.312"/>
        <vers num="7.1.313"/>
        <vers num="7.1.314"/>
      </prod>
      <prod name="ubuntu_linux" vendor="canonical">
        <vers num="6.06" edition=":~~lts~~~"/>
        <vers num="7.10"/>
        <vers num="8.04" edition=":~~lts~~~"/>
        <vers num="8.10"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2713" seq="2008-2713" published="2008-06-16" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">libclamav/petite.c in ClamAV before 0.93.1 allows remote attackers to cause a denial of service via a crafted Petite file that triggers an out-of-bounds read.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://kolab.org/security/kolab-vendor-notice-21.txt">http://kolab.org/security/kolab-vendor-notice-21.txt</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html">APPLE-SA-2008-09-15</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html">SUSE-SR:2008:014</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00006.html">SUSE-SR:2008:015</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200808-07.xml">GLSA-200808-07</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=605577&amp;group_id=86638">http://sourceforge.net/project/shownotes.php?release_id=605577&amp;group_id=86638</ref>
      <ref source="CONFIRM" url="http://svn.clamav.net/websvn/diff.php?repname=clamav-devel&amp;path=/branches/0.93/libclamav/petite.c&amp;rev=3886">http://svn.clamav.net/websvn/diff.php?repname=clamav-devel&amp;path=/branches/0.93/libclamav/petite.c&amp;rev=3886</ref>
      <ref source="CONFIRM" url="http://up2date.astaro.com/2008/08/up2date_asg_v7300_ga_released.html">http://up2date.astaro.com/2008/08/up2date_asg_v7300_ga_released.html</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1616">DSA-1616</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:122">MDVSA-2008:122</ref>
      <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/06/15/2">[oss-security] 20080615 CVE id request: Clamav</ref>
      <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/06/17/8">[oss-security] 20080617 Re: CVE id request: Clamav</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29750">29750</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020305">1020305</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA08-260A.html">TA08-260A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1855/references">ADV-2008-1855</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2584">ADV-2008-2584</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43133">clamav-petite-dos(43133)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00617.html">FEDORA-2008-6422</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00763.html">FEDORA-2008-5476</ref>
      <ref source="CONFIRM" url="https://wwws.clamav.net/bugzilla/show_bug.cgi?id=1000">https://wwws.clamav.net/bugzilla/show_bug.cgi?id=1000</ref>
    </refs>
    <vuln_soft>
      <prod name="clamav" vendor="clam_anti-virus">
        <vers num="0.15"/>
        <vers num="0.20"/>
        <vers num="0.21"/>
        <vers num="0.22"/>
        <vers num="0.23"/>
        <vers num="0.24"/>
        <vers num="0.51"/>
        <vers num="0.52"/>
        <vers num="0.53"/>
        <vers num="0.54"/>
        <vers num="0.60"/>
        <vers num="0.60p"/>
        <vers num="0.65"/>
        <vers num="0.67"/>
        <vers num="0.68"/>
        <vers num="0.68.1"/>
        <vers num="0.70"/>
        <vers num="0.71"/>
        <vers num="0.72"/>
        <vers num="0.73"/>
        <vers num="0.74"/>
        <vers num="0.75"/>
        <vers num="0.75.1"/>
        <vers num="0.80"/>
        <vers num="0.80_rc1"/>
        <vers num="0.80_rc2"/>
        <vers num="0.80_rc3"/>
        <vers num="0.80_rc4"/>
        <vers num="0.81"/>
        <vers num="0.81_rc1"/>
        <vers num="0.82"/>
        <vers num="0.83"/>
        <vers num="0.84"/>
        <vers num="0.84_rc1"/>
        <vers num="0.84_rc2"/>
        <vers num="0.85"/>
        <vers num="0.85.1"/>
        <vers num="0.86"/>
        <vers num="0.86.1"/>
        <vers num="0.86.2"/>
        <vers num="0.86_rc1"/>
        <vers num="0.87"/>
        <vers num="0.87.1"/>
        <vers num="0.88"/>
        <vers num="0.88.1"/>
        <vers num="0.88.3"/>
        <vers num="0.88.4"/>
        <vers num="0.88.5"/>
        <vers num="0.88.6"/>
        <vers num="0.88.7"/>
        <vers num="0.90"/>
        <vers num="0.90.1"/>
        <vers num="0.90.2"/>
        <vers num="0.90_rc1.1"/>
        <vers num="0.90_rc2"/>
        <vers num="0.90_rc3"/>
        <vers num="0.90rc1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2714" seq="2008-2714" published="2008-06-16" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Opera before 9.26 allows remote attackers to misrepresent web page addresses using "certain characters" that "cause the page address text to be misplaced."</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00005.html">SUSE-SA:2008:029</ref>
      <ref source="CONFIRM" url="http://www.opera.com/docs/changelogs/linux/950/#security">http://www.opera.com/docs/changelogs/linux/950/#security</ref>
      <ref source="CONFIRM" url="http://www.opera.com/docs/changelogs/windows/950/#security">http://www.opera.com/docs/changelogs/windows/950/#security</ref>
      <ref source="CONFIRM" url="http://www.opera.com/support/search/view/878/">http://www.opera.com/support/search/view/878/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29684" patch="1">29684</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1812">ADV-2008-1812</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43035">opera-pageaddress-spoofing(43035)</ref>
    </refs>
    <vuln_soft>
      <prod name="opera_browser" vendor="opera">
        <vers num="1.00"/>
        <vers num="2.00"/>
        <vers num="2.10" edition="beta1"/>
        <vers num="2.10" edition="beta2"/>
        <vers num="2.10" edition="beta3"/>
        <vers num="2.12"/>
        <vers num="3.00" edition="beta"/>
        <vers num="3.10"/>
        <vers num="3.21"/>
        <vers num="3.50"/>
        <vers num="3.51"/>
        <vers num="3.60"/>
        <vers num="3.61"/>
        <vers num="3.62" edition="beta"/>
        <vers num="4.00" edition="beta2"/>
        <vers num="4.00" edition="beta3"/>
        <vers num="4.00" edition="beta4"/>
        <vers num="4.00" edition="beta5"/>
        <vers num="4.00" edition="beta6"/>
        <vers num="4.01"/>
        <vers num="4.02"/>
        <vers num="5.0" edition="beta2"/>
        <vers num="5.0" edition="beta3"/>
        <vers num="5.0" edition="beta4"/>
        <vers num="5.0" edition="beta5"/>
        <vers num="5.0" edition="beta6"/>
        <vers num="5.0" edition="beta7"/>
        <vers num="5.0" edition="beta8"/>
        <vers num="5.02"/>
        <vers num="5.10"/>
        <vers num="5.11"/>
        <vers num="5.12"/>
        <vers num="6.0" edition="beta1"/>
        <vers num="6.0" edition="beta2"/>
        <vers num="6.0" edition="tp1"/>
        <vers num="6.0" edition="tp2"/>
        <vers num="6.0" edition="tp3"/>
        <vers num="6.01"/>
        <vers num="6.1" edition="beta1"/>
        <vers num="6.02"/>
        <vers num="6.03"/>
        <vers num="6.04"/>
        <vers num="6.05"/>
        <vers num="6.06"/>
        <vers num="6.11"/>
        <vers num="6.12"/>
        <vers num="7.0" edition="beta1"/>
        <vers num="7.0" edition="beta1_v2"/>
        <vers num="7.0" edition="beta2"/>
        <vers num="7.01"/>
        <vers num="7.02"/>
        <vers num="7.03"/>
        <vers num="7.10" edition="beta1"/>
        <vers num="7.11" edition="beta2"/>
        <vers num="7.20" edition="beta7"/>
        <vers num="7.21"/>
        <vers num="7.22"/>
        <vers num="7.23"/>
        <vers num="7.50" edition="beta1"/>
        <vers num="7.51"/>
        <vers num="7.52"/>
        <vers num="7.53"/>
        <vers num="7.54" edition="update1"/>
        <vers num="7.54" edition="update2"/>
        <vers num="7.60"/>
        <vers num="8.0" edition="beta1"/>
        <vers num="8.0" edition="beta2"/>
        <vers num="8.0" edition="beta3"/>
        <vers num="8.01"/>
        <vers num="8.02"/>
        <vers num="8.50"/>
        <vers num="8.51"/>
        <vers num="8.52"/>
        <vers num="8.53"/>
        <vers num="8.54"/>
        <vers num="9.0" edition="beta1"/>
        <vers num="9.0" edition="beta2"/>
        <vers num="9.01"/>
        <vers num="9.02"/>
        <vers num="9.10"/>
        <vers num="9.12"/>
        <vers num="9.20" edition="beta1"/>
        <vers num="9.21"/>
        <vers num="9.22"/>
        <vers num="9.23"/>
        <vers num="9.24"/>
        <vers num="9.25" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2715" seq="2008-2715" published="2008-06-16" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Opera before 9.5 allows remote attackers to read cross-domain images via HTML CANVAS elements that use the images as patterns.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00005.html">SUSE-SA:2008:029</ref>
      <ref source="CONFIRM" url="http://www.opera.com/docs/changelogs/linux/950/#security">http://www.opera.com/docs/changelogs/linux/950/#security</ref>
      <ref source="CONFIRM" url="http://www.opera.com/docs/changelogs/windows/950/#security">http://www.opera.com/docs/changelogs/windows/950/#security</ref>
      <ref source="CONFIRM" url="http://www.opera.com/support/search/view/883/" patch="1">http://www.opera.com/support/search/view/883/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29684">29684</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020291">1020291</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1812">ADV-2008-1812</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43032">opera-html-canvas-info-disclosure(43032)</ref>
    </refs>
    <vuln_soft>
      <prod name="opera_browser" vendor="opera">
        <vers num="1.00"/>
        <vers num="2.00"/>
        <vers num="2.10" edition="beta1"/>
        <vers num="2.10" edition="beta2"/>
        <vers num="2.10" edition="beta3"/>
        <vers num="2.12"/>
        <vers num="3.00" edition="beta"/>
        <vers num="3.10"/>
        <vers num="3.21"/>
        <vers num="3.50"/>
        <vers num="3.51"/>
        <vers num="3.60"/>
        <vers num="3.61"/>
        <vers num="3.62" edition="beta"/>
        <vers num="4.00" edition="beta2"/>
        <vers num="4.00" edition="beta3"/>
        <vers num="4.00" edition="beta4"/>
        <vers num="4.00" edition="beta5"/>
        <vers num="4.00" edition="beta6"/>
        <vers num="4.01"/>
        <vers num="4.02"/>
        <vers num="5.0" edition="beta2"/>
        <vers num="5.0" edition="beta3"/>
        <vers num="5.0" edition="beta4"/>
        <vers num="5.0" edition="beta5"/>
        <vers num="5.0" edition="beta6"/>
        <vers num="5.0" edition="beta7"/>
        <vers num="5.0" edition="beta8"/>
        <vers num="5.02"/>
        <vers num="5.10"/>
        <vers num="5.11"/>
        <vers num="5.12"/>
        <vers num="6.0" edition="beta1"/>
        <vers num="6.0" edition="beta2"/>
        <vers num="6.0" edition="tp1"/>
        <vers num="6.0" edition="tp2"/>
        <vers num="6.0" edition="tp3"/>
        <vers num="6.1" edition="beta1"/>
        <vers num="6.02"/>
        <vers num="6.03"/>
        <vers num="6.04"/>
        <vers num="6.05"/>
        <vers num="6.06"/>
        <vers num="6.11"/>
        <vers num="6.12"/>
        <vers num="7.0" edition="beta1"/>
        <vers num="7.0" edition="beta1_v2"/>
        <vers num="7.0" edition="beta2"/>
        <vers num="7.01"/>
        <vers num="7.02"/>
        <vers num="7.03"/>
        <vers num="7.10" edition="beta1"/>
        <vers num="7.11" edition="beta2"/>
        <vers num="7.20" edition="beta7"/>
        <vers num="7.21"/>
        <vers num="7.22"/>
        <vers num="7.23"/>
        <vers num="7.50" edition="beta1"/>
        <vers num="7.51"/>
        <vers num="7.52"/>
        <vers num="7.53"/>
        <vers num="7.54" edition="update1"/>
        <vers num="7.54" edition="update2"/>
        <vers num="7.60"/>
        <vers num="8.0" edition="beta1"/>
        <vers num="8.0" edition="beta2"/>
        <vers num="8.0" edition="beta3"/>
        <vers num="8.01"/>
        <vers num="8.02"/>
        <vers num="8.50"/>
        <vers num="8.51"/>
        <vers num="8.52"/>
        <vers num="8.53"/>
        <vers num="8.54"/>
        <vers num="9.0" edition="beta1"/>
        <vers num="9.0" edition="beta2"/>
        <vers num="9.01"/>
        <vers num="9.02"/>
        <vers num="9.10"/>
        <vers num="9.12"/>
        <vers num="9.20" edition="beta1"/>
        <vers num="9.21"/>
        <vers num="9.22"/>
        <vers num="9.23"/>
        <vers num="9.24"/>
        <vers num="9.25"/>
        <vers num="9.26"/>
        <vers num="9.27"/>
        <vers num="9.50" prev="1" edition="beta1"/>
        <vers num="9.50" prev="1" edition="beta2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2716" seq="2008-2716" published="2008-06-16" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Opera before 9.5 allows remote attackers to spoof the contents of trusted frames on the same parent page by modifying the location, which can facilitate phishing attacks.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00005.html">SUSE-SA:2008:029</ref>
      <ref source="CONFIRM" url="http://www.opera.com/docs/changelogs/linux/950/#security">http://www.opera.com/docs/changelogs/linux/950/#security</ref>
      <ref source="CONFIRM" url="http://www.opera.com/docs/changelogs/windows/950/#security">http://www.opera.com/docs/changelogs/windows/950/#security</ref>
      <ref source="CONFIRM" url="http://www.opera.com/support/search/view/885/">http://www.opera.com/support/search/view/885/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29684" patch="1">29684</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020292">1020292</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1812">ADV-2008-1812</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43033">opera-parentpageframe-weak-security(43033)</ref>
    </refs>
    <vuln_soft>
      <prod name="opera" vendor="opera_software">
        <vers num="9.0" edition="beta_1"/>
        <vers num="9.0" edition="beta_2"/>
        <vers num="9.01" edition="beta_1"/>
        <vers num="9.02"/>
        <vers num="9.2" edition="beta_1"/>
        <vers num="9.10"/>
        <vers num="9.21"/>
        <vers num="9.22"/>
        <vers num="9.23"/>
        <vers num="9.24"/>
        <vers num="9.25"/>
        <vers num="9.26"/>
        <vers num="9.27"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2717" seq="2008-2717" published="2008-06-16" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">TYPO3 4.0.x before 4.0.9, 4.1.x before 4.1.7, and 4.2.x before 4.2.1, uses an insufficiently restrictive default fileDenyPattern for Apache, which allows remote attackers to bypass security restrictions and upload configuration files such as .htaccess, or conduct file upload attacks using multiple extensions.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://buzz.typo3.org/teams/security/article/advice-on-core-security-issue-regarding-filedenypattern/">http://buzz.typo3.org/teams/security/article/advice-on-core-security-issue-regarding-filedenypattern/</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3945">3945</ref>
      <ref source="CONFIRM" url="http://typo3.org/teams/security/security-bulletins/typo3-20080611-1/">http://typo3.org/teams/security/security-bulletins/typo3-20080611-1/</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1596">DSA-1596</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493270/100/0/threaded">20080611 TYPO3 Security Bulletin TYPO3-20080611-1: Multiple vulnerabilities in TYPO3 Core</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29657">29657</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1802">ADV-2008-1802</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42988">typo3-filename-file-upload(42988)</ref>
    </refs>
    <vuln_soft>
      <prod name="apache_webserver" vendor="apache">
        <vers num=""/>
      </prod>
      <prod name="typo3" vendor="typo3">
        <vers num="4.0"/>
        <vers num="4.0.1"/>
        <vers num="4.0.2"/>
        <vers num="4.0.3"/>
        <vers num="4.0.4"/>
        <vers num="4.0.5"/>
        <vers num="4.0.6"/>
        <vers num="4.0.7"/>
        <vers num="4.0.8"/>
        <vers num="4.1"/>
        <vers num="4.1.1"/>
        <vers num="4.1.2"/>
        <vers num="4.1.3"/>
        <vers num="4.1.4"/>
        <vers num="4.1.5"/>
        <vers num="4.1.6"/>
        <vers num="4.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2718" seq="2008-2718" published="2008-06-16" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in fe_adminlib.inc in TYPO3 4.0.x before 4.0.9, 4.1.x before 4.1.7, and 4.2.x before 4.2.1, as used in extensions such as (1) direct_mail_subscription, (2) feuser_admin, and (3) kb_md5fepw, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3945">3945</ref>
      <ref source="CONFIRM" url="http://typo3.org/teams/security/security-bulletins/typo3-20080611-1/">http://typo3.org/teams/security/security-bulletins/typo3-20080611-1/</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1596">DSA-1596</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493270/100/0/threaded">20080611 TYPO3 Security Bulletin TYPO3-20080611-1: Multiple vulnerabilities in TYPO3 Core</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29657">29657</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1802">ADV-2008-1802</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42986">typo3-feadminlibinc-xss(42986)</ref>
    </refs>
    <vuln_soft>
      <prod name="typo3" vendor="typo3">
        <vers num="4.0"/>
        <vers num="4.0.1"/>
        <vers num="4.0.2"/>
        <vers num="4.0.3"/>
        <vers num="4.0.4"/>
        <vers num="4.0.5"/>
        <vers num="4.0.6"/>
        <vers num="4.0.7"/>
        <vers num="4.0.8"/>
        <vers num="4.1"/>
        <vers num="4.1.1"/>
        <vers num="4.1.2"/>
        <vers num="4.1.3"/>
        <vers num="4.1.4"/>
        <vers num="4.1.5"/>
        <vers num="4.1.6"/>
        <vers num="4.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2719" seq="2008-2719" published="2008-06-16" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Off-by-one error in the ppscan function (preproc.c) in Netwide Assembler (NASM) 2.02 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted file that triggers a stack-based buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://repo.or.cz/w/nasm.git?a=commit;h=76ec8e73db16f4cf1453a142d03bcc74d528f72f">http://repo.or.cz/w/nasm.git?a=commit;h=76ec8e73db16f4cf1453a142d03bcc74d528f72f</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:120">MDVSA-2008:120</ref>
      <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/06/11/4">[oss-security] 20080611 CVE id request: nasm off-by-one</ref>
      <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/06/11/5">[oss-security] 20080611 Re: CVE id request: nasm off-by-one</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29656">29656</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020259">1020259</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-648-1">USN-648-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1811">ADV-2008-1811</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42995">nasm-ppscan-bo(42995)</ref>
      <ref source="CONFIRM" url="https://sourceforge.net/project/shownotes.php?group_id=6208&amp;release_id=606115">https://sourceforge.net/project/shownotes.php?group_id=6208&amp;release_id=606115</ref>
      <ref source="CONFIRM" url="https://sourceforge.net/tracker/?func=detail&amp;atid=106208&amp;aid=1942146&amp;group_id=6208">https://sourceforge.net/tracker/?func=detail&amp;atid=106208&amp;aid=1942146&amp;group_id=6208</ref>
    </refs>
    <vuln_soft>
      <prod name="netwide_assembler" vendor="nasm">
        <vers num="2.02"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2720" seq="2008-2720" published="2008-06-16" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Menalto Gallery before 2.2.5 allows remote attackers to inject arbitrary web script or HTML via the (1) host and (2) path components of a URL.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://gallery.menalto.com/gallery_2.2.5_released">http://gallery.menalto.com/gallery_2.2.5_released</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29681">29681</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43024">gallery-unspecified-scripts-xss(43024)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00766.html">FEDORA-2008-5479</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00836.html">FEDORA-2008-5576</ref>
    </refs>
    <vuln_soft>
      <prod name="gallery" vendor="menalto">
        <vers num="2.1"/>
        <vers num="2.1.1"/>
        <vers num="2.1.2"/>
        <vers num="2.2.0"/>
        <vers num="2.2.1"/>
        <vers num="2.2.2"/>
        <vers num="2.2.3"/>
        <vers num="2.2.4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2721" seq="2008-2721" published="2008-06-16" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the album-select module in Menalto Gallery before 2.2.5 allows remote attackers to obtain titles of hidden albums by attempting to add a new album to a hidden album.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://gallery.menalto.com/gallery_2.2.5_released" patch="1">http://gallery.menalto.com/gallery_2.2.5_released</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29681">29681</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43025">gallery-albumselectmodule-info-disclosure(43025)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00766.html">FEDORA-2008-5479</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00836.html">FEDORA-2008-5576</ref>
    </refs>
    <vuln_soft>
      <prod name="gallery" vendor="menalto">
        <vers num="2.1"/>
        <vers num="2.1.1"/>
        <vers num="2.1.2"/>
        <vers num="2.2.0"/>
        <vers num="2.2.1"/>
        <vers num="2.2.2"/>
        <vers num="2.2.3"/>
        <vers num="2.2.4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2722" seq="2008-2722" published="2008-06-16" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Menalto Gallery before 2.2.5 allows remote attackers to bypass permissions for sub-albums via a ZIP archive.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://gallery.menalto.com/gallery_2.2.5_released">http://gallery.menalto.com/gallery_2.2.5_released</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29681">29681</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43027">gallery-zip-archives-security-bypass(43027)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00766.html">FEDORA-2008-5479</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00836.html">FEDORA-2008-5576</ref>
    </refs>
    <vuln_soft>
      <prod name="gallery" vendor="menalto">
        <vers num="2.1"/>
        <vers num="2.1.1"/>
        <vers num="2.1.2"/>
        <vers num="2.2.0"/>
        <vers num="2.2.1"/>
        <vers num="2.2.2"/>
        <vers num="2.2.3"/>
        <vers num="2.2.4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2723" seq="2008-2723" published="2008-06-16" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">embed.php in Menalto Gallery before 2.2.5 allows remote attackers to obtain the full path via unknown vectors related to "spoofing the remote address."</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://gallery.menalto.com/gallery_2.2.5_released">http://gallery.menalto.com/gallery_2.2.5_released</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29681">29681</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43028">gallery-embed-path-disclosure(43028)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00766.html">FEDORA-2008-5479</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00836.html">FEDORA-2008-5576</ref>
    </refs>
    <vuln_soft>
      <prod name="gallery" vendor="menalto">
        <vers num="2.1"/>
        <vers num="2.1.1"/>
        <vers num="2.1.2"/>
        <vers num="2.2.0"/>
        <vers num="2.2.1"/>
        <vers num="2.2.2"/>
        <vers num="2.2.3"/>
        <vers num="2.2.4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2724" seq="2008-2724" published="2008-06-16" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Menalto Gallery before 2.2.5 does not enforce permissions for non-album items that have been protected by a password, which might allow remote attackers to bypass intended access restrictions.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://gallery.menalto.com/gallery_2.2.5_released">http://gallery.menalto.com/gallery_2.2.5_released</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29681">29681</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43031">gallery-password-module-security-bypass(43031)</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00766.html">FEDORA-2008-5479</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00836.html">FEDORA-2008-5576</ref>
    </refs>
    <vuln_soft>
      <prod name="gallery" vendor="menalto">
        <vers num="2.1"/>
        <vers num="2.1.1"/>
        <vers num="2.1.2"/>
        <vers num="2.2.0"/>
        <vers num="2.2.1"/>
        <vers num="2.2.2"/>
        <vers num="2.2.3"/>
        <vers num="2.2.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2725" seq="2008-2725" published="2008-06-24" modified="2018-11-01" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Integer overflow in the (1) rb_ary_splice function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, and 1.8.7 before 1.8.7-p22; and (2) the rb_ary_replace function in 1.6.x allows context-dependent attackers to trigger memory corruption via unspecified vectors, aka the "REALLOC_N" variant, a different issue than CVE-2008-2662, CVE-2008-2663, and CVE-2008-2664.  NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://blog.phusion.nl/2008/06/23/ruby-186-p230187-broke-your-app-ruby-enterprise-edition-to-the-rescue/" adv="1">http://blog.phusion.nl/2008/06/23/ruby-186-p230187-broke-your-app-ruby-enterprise-edition-to-the-rescue/</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html" adv="1">APPLE-SA-2008-06-30</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html" adv="1">SUSE-SR:2008:017</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200812-17.xml" adv="1">GLSA-200812-17</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.429562" adv="1">SSA:2008-179-01</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT2163" adv="1">http://support.apple.com/kb/HT2163</ref>
      <ref source="MISC" url="http://weblog.rubyonrails.org/2008/6/21/multiple-ruby-security-vulnerabilities" adv="1">http://weblog.rubyonrails.org/2008/6/21/multiple-ruby-security-vulnerabilities</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0206">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0206</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1612" adv="1">DSA-1612</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1618" adv="1">DSA-1618</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:140" adv="1">MDVSA-2008:140</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:141" adv="1">MDVSA-2008:141</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:142" adv="1">MDVSA-2008:142</ref>
      <ref source="MISC" url="http://www.matasano.com/log/1070/updates-on-drew-yaos-terrible-ruby-vulnerabilities/" adv="1">http://www.matasano.com/log/1070/updates-on-drew-yaos-terrible-ruby-vulnerabilities/</ref>
      <ref source="MLIST" url="http://www.redhat.com/archives/fedora-security-commits/2008-June/msg00005.html" adv="1">[fedora-security-commits] 20080620 fedora-security/audit f10, 1.7, 1.8 f8, 1.225, 1.226 f9, 1.215, 1.216</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0561.html" adv="1">RHSA-2008:0561</ref>
      <ref source="MISC" url="http://www.ruby-forum.com/topic/157034" adv="1">http://www.ruby-forum.com/topic/157034</ref>
      <ref source="MISC" url="http://www.rubyinside.com/june-2008-ruby-security-vulnerabilities-927.html" adv="1">http://www.rubyinside.com/june-2008-ruby-security-vulnerabilities-927.html</ref>
      <ref source="CONFIRM" url="http://www.ruby-lang.org/en/news/2008/06/20/arbitrary-code-execution-vulnerabilities/" adv="1" patch="1">http://www.ruby-lang.org/en/news/2008/06/20/arbitrary-code-execution-vulnerabilities/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493688/100/0/threaded" adv="1">20080626 rPSA-2008-0206-1 ruby</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29903" adv="1">29903</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020347" adv="1">1020347</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-621-1" adv="1">USN-621-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1907/references" adv="1">ADV-2008-1907</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1981/references" adv="1">ADV-2008-1981</ref>
      <ref source="MISC" url="http://www.zedshaw.com/rants/the_big_ruby_vulnerabilities.html">http://www.zedshaw.com/rants/the_big_ruby_vulnerabilities.html</ref>
      <ref source="CONFIRM" url="https://bugs.launchpad.net/ubuntu/+source/ruby1.8/+bug/241657" adv="1">https://bugs.launchpad.net/ubuntu/+source/ruby1.8/+bug/241657</ref>
      <ref source="MISC" url="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2008-2727" adv="1">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2008-2727</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43350" adv="1">ruby-rbarysplice-code-execution(43350)</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2626">https://issues.rpath.com/browse/RPL-2626</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9606" adv="1">oval:org.mitre.oval:def:9606</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00937.html" adv="1">FEDORA-2008-5649</ref>
    </refs>
    <vuln_soft>
      <prod name="ruby" vendor="ruby-lang">
        <vers num="1.8.4" prev="1"/>
        <vers num="1.8.5" edition="preview1"/>
        <vers num="1.8.5" edition="preview2"/>
        <vers num="1.8.5" edition="preview3"/>
        <vers num="1.8.5" edition="preview4"/>
        <vers num="1.8.5" edition="preview5"/>
        <vers num="1.8.5.1"/>
        <vers num="1.8.5.2"/>
        <vers num="1.8.5.3"/>
        <vers num="1.8.5.4"/>
        <vers num="1.8.5.5"/>
        <vers num="1.8.5.6"/>
        <vers num="1.8.5.7"/>
        <vers num="1.8.5.8"/>
        <vers num="1.8.5.9"/>
        <vers num="1.8.5.10"/>
        <vers num="1.8.5.11"/>
        <vers num="1.8.5.12"/>
        <vers num="1.8.5.13"/>
        <vers num="1.8.5.14"/>
        <vers num="1.8.5.15"/>
        <vers num="1.8.5.16"/>
        <vers num="1.8.5.17"/>
        <vers num="1.8.5.18"/>
        <vers num="1.8.5.19"/>
        <vers num="1.8.5.20"/>
        <vers num="1.8.5.21"/>
        <vers num="1.8.5.22"/>
        <vers num="1.8.5.23"/>
        <vers num="1.8.5.24"/>
        <vers num="1.8.5.25"/>
        <vers num="1.8.5.26"/>
        <vers num="1.8.5.27"/>
        <vers num="1.8.5.28"/>
        <vers num="1.8.5.29"/>
        <vers num="1.8.5.30"/>
        <vers num="1.8.5.31"/>
        <vers num="1.8.5.32"/>
        <vers num="1.8.5.33"/>
        <vers num="1.8.5.34"/>
        <vers num="1.8.5.35"/>
        <vers num="1.8.5.36"/>
        <vers num="1.8.5.37"/>
        <vers num="1.8.5.39"/>
        <vers num="1.8.5.40"/>
        <vers num="1.8.5.41"/>
        <vers num="1.8.5.42"/>
        <vers num="1.8.5.43"/>
        <vers num="1.8.5.44"/>
        <vers num="1.8.5.45"/>
        <vers num="1.8.5.46"/>
        <vers num="1.8.5.47"/>
        <vers num="1.8.5.48"/>
        <vers num="1.8.5.49"/>
        <vers num="1.8.5.51"/>
        <vers num="1.8.5.52"/>
        <vers num="1.8.5.53"/>
        <vers num="1.8.5.54"/>
        <vers num="1.8.5.55"/>
        <vers num="1.8.5.56"/>
        <vers num="1.8.5.57"/>
        <vers num="1.8.5.58"/>
        <vers num="1.8.5.59"/>
        <vers num="1.8.5.60"/>
        <vers num="1.8.5.61"/>
        <vers num="1.8.5.62"/>
        <vers num="1.8.5.63"/>
        <vers num="1.8.5.64"/>
        <vers num="1.8.5.65"/>
        <vers num="1.8.5.66"/>
        <vers num="1.8.5.67"/>
        <vers num="1.8.5.68"/>
        <vers num="1.8.5.69"/>
        <vers num="1.8.5.70"/>
        <vers num="1.8.5.71"/>
        <vers num="1.8.5.72"/>
        <vers num="1.8.5.73"/>
        <vers num="1.8.5.74"/>
        <vers num="1.8.5.75"/>
        <vers num="1.8.5.76"/>
        <vers num="1.8.5.77"/>
        <vers num="1.8.5.78"/>
        <vers num="1.8.5.79"/>
        <vers num="1.8.5.80"/>
        <vers num="1.8.5.81"/>
        <vers num="1.8.5.82"/>
        <vers num="1.8.5.83"/>
        <vers num="1.8.5.84"/>
        <vers num="1.8.5.85"/>
        <vers num="1.8.5.86"/>
        <vers num="1.8.5.87"/>
        <vers num="1.8.5.88"/>
        <vers num="1.8.5.89"/>
        <vers num="1.8.5.90"/>
        <vers num="1.8.5.91"/>
        <vers num="1.8.5.92"/>
        <vers num="1.8.5.93"/>
        <vers num="1.8.5.94"/>
        <vers num="1.8.5.95"/>
        <vers num="1.8.5.96"/>
        <vers num="1.8.5.97"/>
        <vers num="1.8.5.98"/>
        <vers num="1.8.5.99"/>
        <vers num="1.8.5.100"/>
        <vers num="1.8.5.101"/>
        <vers num="1.8.5.102"/>
        <vers num="1.8.5.103"/>
        <vers num="1.8.5.104"/>
        <vers num="1.8.5.105"/>
        <vers num="1.8.5.106"/>
        <vers num="1.8.5.107"/>
        <vers num="1.8.5.108"/>
        <vers num="1.8.5.109"/>
        <vers num="1.8.5.110"/>
        <vers num="1.8.5.111"/>
        <vers num="1.8.5.113"/>
        <vers num="1.8.5.114"/>
        <vers num="1.8.5.115"/>
        <vers num="1.8.5.116"/>
        <vers num="1.8.5.122"/>
        <vers num="1.8.5.123"/>
        <vers num="1.8.5.124"/>
        <vers num="1.8.5.125"/>
        <vers num="1.8.5.126"/>
        <vers num="1.8.5.127"/>
        <vers num="1.8.5.128"/>
        <vers num="1.8.5.129"/>
        <vers num="1.8.5.130"/>
        <vers num="1.8.5.131"/>
        <vers num="1.8.5.132"/>
        <vers num="1.8.5.133"/>
        <vers num="1.8.5.134"/>
        <vers num="1.8.5.135"/>
        <vers num="1.8.5.136"/>
        <vers num="1.8.5.137"/>
        <vers num="1.8.5.138"/>
        <vers num="1.8.5.139"/>
        <vers num="1.8.5.140"/>
        <vers num="1.8.5.141"/>
        <vers num="1.8.5.142"/>
        <vers num="1.8.5.145"/>
        <vers num="1.8.5.146"/>
        <vers num="1.8.5.147"/>
        <vers num="1.8.5.148"/>
        <vers num="1.8.5.149"/>
        <vers num="1.8.5.150"/>
        <vers num="1.8.5.151"/>
        <vers num="1.8.5.153"/>
        <vers num="1.8.5.154"/>
        <vers num="1.8.5.155"/>
        <vers num="1.8.5.156"/>
        <vers num="1.8.5.157"/>
        <vers num="1.8.5.158"/>
        <vers num="1.8.5.159"/>
        <vers num="1.8.5.160"/>
        <vers num="1.8.5.161"/>
        <vers num="1.8.5.162"/>
        <vers num="1.8.5.163"/>
        <vers num="1.8.5.164"/>
        <vers num="1.8.5.165"/>
        <vers num="1.8.5.166"/>
        <vers num="1.8.5.167"/>
        <vers num="1.8.5.168"/>
        <vers num="1.8.5.169"/>
        <vers num="1.8.5.170"/>
        <vers num="1.8.5.171"/>
        <vers num="1.8.5.172"/>
        <vers num="1.8.5.173"/>
        <vers num="1.8.5.174"/>
        <vers num="1.8.5.175"/>
        <vers num="1.8.5.176"/>
        <vers num="1.8.5.177"/>
        <vers num="1.8.5.178"/>
        <vers num="1.8.5.179"/>
        <vers num="1.8.5.180"/>
        <vers num="1.8.5.181"/>
        <vers num="1.8.5.182"/>
        <vers num="1.8.5.183"/>
        <vers num="1.8.5.184"/>
        <vers num="1.8.5.185"/>
        <vers num="1.8.5.186"/>
        <vers num="1.8.5.187"/>
        <vers num="1.8.5.188"/>
        <vers num="1.8.5.189"/>
        <vers num="1.8.5.190"/>
        <vers num="1.8.5.191"/>
        <vers num="1.8.5.192"/>
        <vers num="1.8.5.193"/>
        <vers num="1.8.5.194"/>
        <vers num="1.8.5.195"/>
        <vers num="1.8.5.196"/>
        <vers num="1.8.5.197"/>
        <vers num="1.8.5.198"/>
        <vers num="1.8.5.199"/>
        <vers num="1.8.5.200"/>
        <vers num="1.8.5.201"/>
        <vers num="1.8.5.202"/>
        <vers num="1.8.5.203"/>
        <vers num="1.8.5.204"/>
        <vers num="1.8.5.205"/>
        <vers num="1.8.5.206"/>
        <vers num="1.8.5.207"/>
        <vers num="1.8.5.208"/>
        <vers num="1.8.5.209"/>
        <vers num="1.8.5.210"/>
        <vers num="1.8.5.211"/>
        <vers num="1.8.5.212"/>
        <vers num="1.8.5.213"/>
        <vers num="1.8.5.214"/>
        <vers num="1.8.5.215"/>
        <vers num="1.8.5.216"/>
        <vers num="1.8.5.217"/>
        <vers num="1.8.5.218"/>
        <vers num="1.8.5.219"/>
        <vers num="1.8.5.220"/>
        <vers num="1.8.5.221"/>
        <vers num="1.8.5.222"/>
        <vers num="1.8.5.223"/>
        <vers num="1.8.5.224"/>
        <vers num="1.8.5.225"/>
        <vers num="1.8.5.226"/>
        <vers num="1.8.5.227"/>
        <vers num="1.8.5.228"/>
        <vers num="1.8.5.229"/>
        <vers num="1.8.5.230"/>
        <vers num="1.8.6" edition="preview1"/>
        <vers num="1.8.6" edition="preview2"/>
        <vers num="1.8.6" edition="preview3"/>
        <vers num="1.8.6-26"/>
        <vers num="1.8.6.1"/>
        <vers num="1.8.6.2"/>
        <vers num="1.8.6.4"/>
        <vers num="1.8.6.5"/>
        <vers num="1.8.6.6"/>
        <vers num="1.8.6.7"/>
        <vers num="1.8.6.8"/>
        <vers num="1.8.6.9"/>
        <vers num="1.8.6.10"/>
        <vers num="1.8.6.12"/>
        <vers num="1.8.6.13"/>
        <vers num="1.8.6.14"/>
        <vers num="1.8.6.15"/>
        <vers num="1.8.6.16"/>
        <vers num="1.8.6.17"/>
        <vers num="1.8.6.18"/>
        <vers num="1.8.6.19"/>
        <vers num="1.8.6.20"/>
        <vers num="1.8.6.21"/>
        <vers num="1.8.6.22"/>
        <vers num="1.8.6.23"/>
        <vers num="1.8.6.24"/>
        <vers num="1.8.6.25"/>
        <vers num="1.8.6.26"/>
        <vers num="1.8.6.27"/>
        <vers num="1.8.6.30"/>
        <vers num="1.8.6.31"/>
        <vers num="1.8.6.32"/>
        <vers num="1.8.6.33"/>
        <vers num="1.8.6.34"/>
        <vers num="1.8.6.35"/>
        <vers num="1.8.6.36"/>
        <vers num="1.8.6.37"/>
        <vers num="1.8.6.38"/>
        <vers num="1.8.6.39"/>
        <vers num="1.8.6.40"/>
        <vers num="1.8.6.41"/>
        <vers num="1.8.6.42"/>
        <vers num="1.8.6.43"/>
        <vers num="1.8.6.44"/>
        <vers num="1.8.6.45"/>
        <vers num="1.8.6.46"/>
        <vers num="1.8.6.47"/>
        <vers num="1.8.6.48"/>
        <vers num="1.8.6.49"/>
        <vers num="1.8.6.50"/>
        <vers num="1.8.6.51"/>
        <vers num="1.8.6.52"/>
        <vers num="1.8.6.53"/>
        <vers num="1.8.6.54"/>
        <vers num="1.8.6.55"/>
        <vers num="1.8.6.56"/>
        <vers num="1.8.6.57"/>
        <vers num="1.8.6.58"/>
        <vers num="1.8.6.59"/>
        <vers num="1.8.6.60"/>
        <vers num="1.8.6.63"/>
        <vers num="1.8.6.64"/>
        <vers num="1.8.6.65"/>
        <vers num="1.8.6.66"/>
        <vers num="1.8.6.67"/>
        <vers num="1.8.6.68"/>
        <vers num="1.8.6.69"/>
        <vers num="1.8.6.70"/>
        <vers num="1.8.6.72"/>
        <vers num="1.8.6.73"/>
        <vers num="1.8.6.74"/>
        <vers num="1.8.6.75"/>
        <vers num="1.8.6.76"/>
        <vers num="1.8.6.77"/>
        <vers num="1.8.6.78"/>
        <vers num="1.8.6.79"/>
        <vers num="1.8.6.80"/>
        <vers num="1.8.6.81"/>
        <vers num="1.8.6.82"/>
        <vers num="1.8.6.83"/>
        <vers num="1.8.6.84"/>
        <vers num="1.8.6.85"/>
        <vers num="1.8.6.86"/>
        <vers num="1.8.6.87"/>
        <vers num="1.8.6.88"/>
        <vers num="1.8.6.89"/>
        <vers num="1.8.6.90"/>
        <vers num="1.8.6.91"/>
        <vers num="1.8.6.92"/>
        <vers num="1.8.6.93"/>
        <vers num="1.8.6.94"/>
        <vers num="1.8.6.95"/>
        <vers num="1.8.6.96"/>
        <vers num="1.8.6.97"/>
        <vers num="1.8.6.98"/>
        <vers num="1.8.6.99"/>
        <vers num="1.8.6.100"/>
        <vers num="1.8.6.101"/>
        <vers num="1.8.6.102"/>
        <vers num="1.8.6.103"/>
        <vers num="1.8.6.104"/>
        <vers num="1.8.6.105"/>
        <vers num="1.8.6.106"/>
        <vers num="1.8.6.107"/>
        <vers num="1.8.6.109"/>
        <vers num="1.8.6.110"/>
        <vers num="1.8.6.111"/>
        <vers num="1.8.6.112"/>
        <vers num="1.8.6.113"/>
        <vers num="1.8.6.114"/>
        <vers num="1.8.6.115"/>
        <vers num="1.8.6.121"/>
        <vers num="1.8.6.122"/>
        <vers num="1.8.6.123"/>
        <vers num="1.8.6.124"/>
        <vers num="1.8.6.125"/>
        <vers num="1.8.6.126"/>
        <vers num="1.8.6.127"/>
        <vers num="1.8.6.128"/>
        <vers num="1.8.6.129"/>
        <vers num="1.8.6.130"/>
        <vers num="1.8.6.131"/>
        <vers num="1.8.6.132"/>
        <vers num="1.8.6.133"/>
        <vers num="1.8.6.134"/>
        <vers num="1.8.6.135"/>
        <vers num="1.8.6.136"/>
        <vers num="1.8.6.137"/>
        <vers num="1.8.6.138"/>
        <vers num="1.8.6.139"/>
        <vers num="1.8.6.140"/>
        <vers num="1.8.6.141"/>
        <vers num="1.8.6.144"/>
        <vers num="1.8.6.145"/>
        <vers num="1.8.6.146"/>
        <vers num="1.8.6.147"/>
        <vers num="1.8.6.148"/>
        <vers num="1.8.6.149"/>
        <vers num="1.8.6.150"/>
        <vers num="1.8.6.151"/>
        <vers num="1.8.6.153"/>
        <vers num="1.8.6.154"/>
        <vers num="1.8.6.155"/>
        <vers num="1.8.6.156"/>
        <vers num="1.8.6.157"/>
        <vers num="1.8.6.158"/>
        <vers num="1.8.6.159"/>
        <vers num="1.8.6.160"/>
        <vers num="1.8.6.161"/>
        <vers num="1.8.6.162"/>
        <vers num="1.8.6.163"/>
        <vers num="1.8.6.164"/>
        <vers num="1.8.6.165"/>
        <vers num="1.8.6.166"/>
        <vers num="1.8.6.167"/>
        <vers num="1.8.6.168"/>
        <vers num="1.8.6.169"/>
        <vers num="1.8.6.170"/>
        <vers num="1.8.6.171"/>
        <vers num="1.8.6.172"/>
        <vers num="1.8.6.173"/>
        <vers num="1.8.6.174"/>
        <vers num="1.8.6.175"/>
        <vers num="1.8.6.176"/>
        <vers num="1.8.6.177"/>
        <vers num="1.8.6.178"/>
        <vers num="1.8.6.179"/>
        <vers num="1.8.6.180"/>
        <vers num="1.8.6.181"/>
        <vers num="1.8.6.182"/>
        <vers num="1.8.6.183"/>
        <vers num="1.8.6.184"/>
        <vers num="1.8.6.185"/>
        <vers num="1.8.6.186"/>
        <vers num="1.8.6.187"/>
        <vers num="1.8.6.188"/>
        <vers num="1.8.6.189"/>
        <vers num="1.8.6.190"/>
        <vers num="1.8.6.191"/>
        <vers num="1.8.6.192"/>
        <vers num="1.8.6.193"/>
        <vers num="1.8.6.194"/>
        <vers num="1.8.6.195"/>
        <vers num="1.8.6.196"/>
        <vers num="1.8.6.197"/>
        <vers num="1.8.6.198"/>
        <vers num="1.8.6.199"/>
        <vers num="1.8.6.200"/>
        <vers num="1.8.6.201"/>
        <vers num="1.8.6.202"/>
        <vers num="1.8.6.203"/>
        <vers num="1.8.6.204"/>
        <vers num="1.8.6.205"/>
        <vers num="1.8.6.206"/>
        <vers num="1.8.6.207"/>
        <vers num="1.8.6.208"/>
        <vers num="1.8.6.209"/>
        <vers num="1.8.6.210"/>
        <vers num="1.8.6.211"/>
        <vers num="1.8.6.212"/>
        <vers num="1.8.6.213"/>
        <vers num="1.8.6.214"/>
        <vers num="1.8.6.215"/>
        <vers num="1.8.6.216"/>
        <vers num="1.8.6.217"/>
        <vers num="1.8.6.218"/>
        <vers num="1.8.6.219"/>
        <vers num="1.8.6.220"/>
        <vers num="1.8.6.221"/>
        <vers num="1.8.6.222"/>
        <vers num="1.8.6.223"/>
        <vers num="1.8.6.224"/>
        <vers num="1.8.6.225"/>
        <vers num="1.8.6.226"/>
        <vers num="1.8.6.227"/>
        <vers num="1.8.6.228"/>
        <vers num="1.8.6.229"/>
        <vers num="1.8.7" edition="p160"/>
        <vers num="1.8.7" edition="p17"/>
        <vers num="1.8.7" edition="p173"/>
        <vers num="1.8.7" edition="p174"/>
        <vers num="1.8.7" edition="p22"/>
        <vers num="1.8.7" edition="p248"/>
        <vers num="1.8.7" edition="p249"/>
        <vers num="1.8.7" edition="p299"/>
        <vers num="1.8.7" edition="p301"/>
        <vers num="1.8.7" edition="p302"/>
        <vers num="1.8.7" edition="p330"/>
        <vers num="1.8.7" edition="p334"/>
        <vers num="1.8.7" edition="p352"/>
        <vers num="1.8.7" edition="p357"/>
        <vers num="1.8.7" edition="p358"/>
        <vers num="1.8.7" edition="p370"/>
        <vers num="1.8.7" edition="p371"/>
        <vers num="1.8.7" edition="p373"/>
        <vers num="1.8.7" edition="p374"/>
        <vers num="1.8.7" edition="p71"/>
        <vers num="1.8.7" edition="p72"/>
        <vers num="1.8.7" edition="preview1"/>
        <vers num="1.8.7" edition="preview2"/>
        <vers num="1.8.7" edition="preview3"/>
        <vers num="1.8.7" edition="preview4"/>
        <vers num="1.8.7.7"/>
        <vers num="1.8.7.17"/>
        <vers num="1.8.7.20"/>
        <vers num="1.8.7.21"/>
      </prod>
      <prod name="ubuntu_linux" vendor="canonical">
        <vers num="6.06" edition=":~~lts~~~"/>
        <vers num="7.04"/>
        <vers num="7.10"/>
        <vers num="8.04" edition=":~~lts~~~"/>
      </prod>
      <prod name="debian_linux" vendor="debian">
        <vers num="4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2726" seq="2008-2726" published="2008-06-24" modified="2018-11-01" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Integer overflow in the (1) rb_ary_splice function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2; and (2) the rb_ary_replace function in 1.6.x allows context-dependent attackers to trigger memory corruption, aka the "beg + rlen" issue.  NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://blog.phusion.nl/2008/06/23/ruby-186-p230187-broke-your-app-ruby-enterprise-edition-to-the-rescue/" adv="1">http://blog.phusion.nl/2008/06/23/ruby-186-p230187-broke-your-app-ruby-enterprise-edition-to-the-rescue/</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html" adv="1">APPLE-SA-2008-06-30</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html" adv="1">SUSE-SR:2008:017</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200812-17.xml" adv="1">GLSA-200812-17</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.429562" adv="1">SSA:2008-179-01</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT2163" adv="1">http://support.apple.com/kb/HT2163</ref>
      <ref source="CONFIRM" url="http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=rev&amp;revision=17460" adv="1">http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=rev&amp;revision=17460</ref>
      <ref source="MISC" url="http://weblog.rubyonrails.org/2008/6/21/multiple-ruby-security-vulnerabilities" adv="1">http://weblog.rubyonrails.org/2008/6/21/multiple-ruby-security-vulnerabilities</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0206">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0206</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1612" adv="1">DSA-1612</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1618" adv="1">DSA-1618</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:140" adv="1">MDVSA-2008:140</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:141" adv="1">MDVSA-2008:141</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:142" adv="1">MDVSA-2008:142</ref>
      <ref source="MISC" url="http://www.matasano.com/log/1070/updates-on-drew-yaos-terrible-ruby-vulnerabilities/" adv="1">http://www.matasano.com/log/1070/updates-on-drew-yaos-terrible-ruby-vulnerabilities/</ref>
      <ref source="MLIST" url="http://www.redhat.com/archives/fedora-security-commits/2008-June/msg00005.html" adv="1">[fedora-security-commits] 20080620 fedora-security/audit f10, 1.7, 1.8 f8, 1.225, 1.226 f9, 1.215, 1.216</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0561.html" adv="1">RHSA-2008:0561</ref>
      <ref source="MISC" url="http://www.ruby-forum.com/topic/157034" adv="1">http://www.ruby-forum.com/topic/157034</ref>
      <ref source="MISC" url="http://www.rubyinside.com/june-2008-ruby-security-vulnerabilities-927.html" adv="1">http://www.rubyinside.com/june-2008-ruby-security-vulnerabilities-927.html</ref>
      <ref source="CONFIRM" url="http://www.ruby-lang.org/en/news/2008/06/20/arbitrary-code-execution-vulnerabilities/" adv="1" patch="1">http://www.ruby-lang.org/en/news/2008/06/20/arbitrary-code-execution-vulnerabilities/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493688/100/0/threaded" adv="1">20080626 rPSA-2008-0206-1 ruby</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29903" adv="1">29903</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020347" adv="1">1020347</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-621-1" adv="1">USN-621-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1907/references" adv="1">ADV-2008-1907</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1981/references" adv="1">ADV-2008-1981</ref>
      <ref source="MISC" url="http://www.zedshaw.com/rants/the_big_ruby_vulnerabilities.html">http://www.zedshaw.com/rants/the_big_ruby_vulnerabilities.html</ref>
      <ref source="CONFIRM" url="https://bugs.launchpad.net/ubuntu/+source/ruby1.8/+bug/241657" adv="1">https://bugs.launchpad.net/ubuntu/+source/ruby1.8/+bug/241657</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43351" adv="1">ruby-rbarysplice-begrlen-code-execution(43351)</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2626">https://issues.rpath.com/browse/RPL-2626</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9959" adv="1">oval:org.mitre.oval:def:9959</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00937.html" adv="1">FEDORA-2008-5649</ref>
    </refs>
    <vuln_soft>
      <prod name="ruby" vendor="ruby-lang">
        <vers num="1.8.4" prev="1"/>
        <vers num="1.8.5" edition="preview1"/>
        <vers num="1.8.5" edition="preview2"/>
        <vers num="1.8.5" edition="preview3"/>
        <vers num="1.8.5" edition="preview4"/>
        <vers num="1.8.5" edition="preview5"/>
        <vers num="1.8.5.1"/>
        <vers num="1.8.5.2"/>
        <vers num="1.8.5.3"/>
        <vers num="1.8.5.4"/>
        <vers num="1.8.5.5"/>
        <vers num="1.8.5.6"/>
        <vers num="1.8.5.7"/>
        <vers num="1.8.5.8"/>
        <vers num="1.8.5.9"/>
        <vers num="1.8.5.10"/>
        <vers num="1.8.5.11"/>
        <vers num="1.8.5.12"/>
        <vers num="1.8.5.13"/>
        <vers num="1.8.5.14"/>
        <vers num="1.8.5.15"/>
        <vers num="1.8.5.16"/>
        <vers num="1.8.5.17"/>
        <vers num="1.8.5.18"/>
        <vers num="1.8.5.19"/>
        <vers num="1.8.5.20"/>
        <vers num="1.8.5.21"/>
        <vers num="1.8.5.22"/>
        <vers num="1.8.5.23"/>
        <vers num="1.8.5.24"/>
        <vers num="1.8.5.25"/>
        <vers num="1.8.5.26"/>
        <vers num="1.8.5.27"/>
        <vers num="1.8.5.28"/>
        <vers num="1.8.5.29"/>
        <vers num="1.8.5.30"/>
        <vers num="1.8.5.31"/>
        <vers num="1.8.5.32"/>
        <vers num="1.8.5.33"/>
        <vers num="1.8.5.34"/>
        <vers num="1.8.5.35"/>
        <vers num="1.8.5.36"/>
        <vers num="1.8.5.37"/>
        <vers num="1.8.5.39"/>
        <vers num="1.8.5.40"/>
        <vers num="1.8.5.41"/>
        <vers num="1.8.5.42"/>
        <vers num="1.8.5.43"/>
        <vers num="1.8.5.44"/>
        <vers num="1.8.5.45"/>
        <vers num="1.8.5.46"/>
        <vers num="1.8.5.47"/>
        <vers num="1.8.5.48"/>
        <vers num="1.8.5.49"/>
        <vers num="1.8.5.51"/>
        <vers num="1.8.5.52"/>
        <vers num="1.8.5.53"/>
        <vers num="1.8.5.54"/>
        <vers num="1.8.5.55"/>
        <vers num="1.8.5.56"/>
        <vers num="1.8.5.57"/>
        <vers num="1.8.5.58"/>
        <vers num="1.8.5.59"/>
        <vers num="1.8.5.60"/>
        <vers num="1.8.5.61"/>
        <vers num="1.8.5.62"/>
        <vers num="1.8.5.63"/>
        <vers num="1.8.5.64"/>
        <vers num="1.8.5.65"/>
        <vers num="1.8.5.66"/>
        <vers num="1.8.5.67"/>
        <vers num="1.8.5.68"/>
        <vers num="1.8.5.69"/>
        <vers num="1.8.5.70"/>
        <vers num="1.8.5.71"/>
        <vers num="1.8.5.72"/>
        <vers num="1.8.5.73"/>
        <vers num="1.8.5.74"/>
        <vers num="1.8.5.75"/>
        <vers num="1.8.5.76"/>
        <vers num="1.8.5.77"/>
        <vers num="1.8.5.78"/>
        <vers num="1.8.5.79"/>
        <vers num="1.8.5.80"/>
        <vers num="1.8.5.81"/>
        <vers num="1.8.5.82"/>
        <vers num="1.8.5.83"/>
        <vers num="1.8.5.84"/>
        <vers num="1.8.5.85"/>
        <vers num="1.8.5.86"/>
        <vers num="1.8.5.87"/>
        <vers num="1.8.5.88"/>
        <vers num="1.8.5.89"/>
        <vers num="1.8.5.90"/>
        <vers num="1.8.5.91"/>
        <vers num="1.8.5.92"/>
        <vers num="1.8.5.93"/>
        <vers num="1.8.5.94"/>
        <vers num="1.8.5.95"/>
        <vers num="1.8.5.96"/>
        <vers num="1.8.5.97"/>
        <vers num="1.8.5.98"/>
        <vers num="1.8.5.99"/>
        <vers num="1.8.5.100"/>
        <vers num="1.8.5.101"/>
        <vers num="1.8.5.102"/>
        <vers num="1.8.5.103"/>
        <vers num="1.8.5.104"/>
        <vers num="1.8.5.105"/>
        <vers num="1.8.5.106"/>
        <vers num="1.8.5.107"/>
        <vers num="1.8.5.108"/>
        <vers num="1.8.5.109"/>
        <vers num="1.8.5.110"/>
        <vers num="1.8.5.111"/>
        <vers num="1.8.5.113"/>
        <vers num="1.8.5.114"/>
        <vers num="1.8.5.115"/>
        <vers num="1.8.5.116"/>
        <vers num="1.8.5.122"/>
        <vers num="1.8.5.123"/>
        <vers num="1.8.5.124"/>
        <vers num="1.8.5.125"/>
        <vers num="1.8.5.126"/>
        <vers num="1.8.5.127"/>
        <vers num="1.8.5.128"/>
        <vers num="1.8.5.129"/>
        <vers num="1.8.5.130"/>
        <vers num="1.8.5.131"/>
        <vers num="1.8.5.132"/>
        <vers num="1.8.5.133"/>
        <vers num="1.8.5.134"/>
        <vers num="1.8.5.135"/>
        <vers num="1.8.5.136"/>
        <vers num="1.8.5.137"/>
        <vers num="1.8.5.138"/>
        <vers num="1.8.5.139"/>
        <vers num="1.8.5.140"/>
        <vers num="1.8.5.141"/>
        <vers num="1.8.5.142"/>
        <vers num="1.8.5.145"/>
        <vers num="1.8.5.146"/>
        <vers num="1.8.5.147"/>
        <vers num="1.8.5.148"/>
        <vers num="1.8.5.149"/>
        <vers num="1.8.5.150"/>
        <vers num="1.8.5.151"/>
        <vers num="1.8.5.153"/>
        <vers num="1.8.5.154"/>
        <vers num="1.8.5.155"/>
        <vers num="1.8.5.156"/>
        <vers num="1.8.5.157"/>
        <vers num="1.8.5.158"/>
        <vers num="1.8.5.159"/>
        <vers num="1.8.5.160"/>
        <vers num="1.8.5.161"/>
        <vers num="1.8.5.162"/>
        <vers num="1.8.5.163"/>
        <vers num="1.8.5.164"/>
        <vers num="1.8.5.165"/>
        <vers num="1.8.5.166"/>
        <vers num="1.8.5.167"/>
        <vers num="1.8.5.168"/>
        <vers num="1.8.5.169"/>
        <vers num="1.8.5.170"/>
        <vers num="1.8.5.171"/>
        <vers num="1.8.5.172"/>
        <vers num="1.8.5.173"/>
        <vers num="1.8.5.174"/>
        <vers num="1.8.5.175"/>
        <vers num="1.8.5.176"/>
        <vers num="1.8.5.177"/>
        <vers num="1.8.5.178"/>
        <vers num="1.8.5.179"/>
        <vers num="1.8.5.180"/>
        <vers num="1.8.5.181"/>
        <vers num="1.8.5.182"/>
        <vers num="1.8.5.183"/>
        <vers num="1.8.5.184"/>
        <vers num="1.8.5.185"/>
        <vers num="1.8.5.186"/>
        <vers num="1.8.5.187"/>
        <vers num="1.8.5.188"/>
        <vers num="1.8.5.189"/>
        <vers num="1.8.5.190"/>
        <vers num="1.8.5.191"/>
        <vers num="1.8.5.192"/>
        <vers num="1.8.5.193"/>
        <vers num="1.8.5.194"/>
        <vers num="1.8.5.195"/>
        <vers num="1.8.5.196"/>
        <vers num="1.8.5.197"/>
        <vers num="1.8.5.198"/>
        <vers num="1.8.5.199"/>
        <vers num="1.8.5.200"/>
        <vers num="1.8.5.201"/>
        <vers num="1.8.5.202"/>
        <vers num="1.8.5.203"/>
        <vers num="1.8.5.204"/>
        <vers num="1.8.5.205"/>
        <vers num="1.8.5.206"/>
        <vers num="1.8.5.207"/>
        <vers num="1.8.5.208"/>
        <vers num="1.8.5.209"/>
        <vers num="1.8.5.210"/>
        <vers num="1.8.5.211"/>
        <vers num="1.8.5.212"/>
        <vers num="1.8.5.213"/>
        <vers num="1.8.5.214"/>
        <vers num="1.8.5.215"/>
        <vers num="1.8.5.216"/>
        <vers num="1.8.5.217"/>
        <vers num="1.8.5.218"/>
        <vers num="1.8.5.219"/>
        <vers num="1.8.5.220"/>
        <vers num="1.8.5.221"/>
        <vers num="1.8.5.222"/>
        <vers num="1.8.5.223"/>
        <vers num="1.8.5.224"/>
        <vers num="1.8.5.225"/>
        <vers num="1.8.5.226"/>
        <vers num="1.8.5.227"/>
        <vers num="1.8.5.228"/>
        <vers num="1.8.5.229"/>
        <vers num="1.8.5.230"/>
        <vers num="1.8.6" edition="preview1"/>
        <vers num="1.8.6" edition="preview2"/>
        <vers num="1.8.6" edition="preview3"/>
        <vers num="1.8.6-26"/>
        <vers num="1.8.6.1"/>
        <vers num="1.8.6.2"/>
        <vers num="1.8.6.4"/>
        <vers num="1.8.6.5"/>
        <vers num="1.8.6.6"/>
        <vers num="1.8.6.7"/>
        <vers num="1.8.6.8"/>
        <vers num="1.8.6.9"/>
        <vers num="1.8.6.10"/>
        <vers num="1.8.6.12"/>
        <vers num="1.8.6.13"/>
        <vers num="1.8.6.14"/>
        <vers num="1.8.6.15"/>
        <vers num="1.8.6.16"/>
        <vers num="1.8.6.17"/>
        <vers num="1.8.6.18"/>
        <vers num="1.8.6.19"/>
        <vers num="1.8.6.20"/>
        <vers num="1.8.6.21"/>
        <vers num="1.8.6.22"/>
        <vers num="1.8.6.23"/>
        <vers num="1.8.6.24"/>
        <vers num="1.8.6.25"/>
        <vers num="1.8.6.26"/>
        <vers num="1.8.6.27"/>
        <vers num="1.8.6.30"/>
        <vers num="1.8.6.31"/>
        <vers num="1.8.6.32"/>
        <vers num="1.8.6.33"/>
        <vers num="1.8.6.34"/>
        <vers num="1.8.6.35"/>
        <vers num="1.8.6.36"/>
        <vers num="1.8.6.37"/>
        <vers num="1.8.6.38"/>
        <vers num="1.8.6.39"/>
        <vers num="1.8.6.40"/>
        <vers num="1.8.6.41"/>
        <vers num="1.8.6.42"/>
        <vers num="1.8.6.43"/>
        <vers num="1.8.6.44"/>
        <vers num="1.8.6.45"/>
        <vers num="1.8.6.46"/>
        <vers num="1.8.6.47"/>
        <vers num="1.8.6.48"/>
        <vers num="1.8.6.49"/>
        <vers num="1.8.6.50"/>
        <vers num="1.8.6.51"/>
        <vers num="1.8.6.52"/>
        <vers num="1.8.6.53"/>
        <vers num="1.8.6.54"/>
        <vers num="1.8.6.55"/>
        <vers num="1.8.6.56"/>
        <vers num="1.8.6.57"/>
        <vers num="1.8.6.58"/>
        <vers num="1.8.6.59"/>
        <vers num="1.8.6.60"/>
        <vers num="1.8.6.63"/>
        <vers num="1.8.6.64"/>
        <vers num="1.8.6.65"/>
        <vers num="1.8.6.66"/>
        <vers num="1.8.6.67"/>
        <vers num="1.8.6.68"/>
        <vers num="1.8.6.69"/>
        <vers num="1.8.6.70"/>
        <vers num="1.8.6.72"/>
        <vers num="1.8.6.73"/>
        <vers num="1.8.6.74"/>
        <vers num="1.8.6.75"/>
        <vers num="1.8.6.76"/>
        <vers num="1.8.6.77"/>
        <vers num="1.8.6.78"/>
        <vers num="1.8.6.79"/>
        <vers num="1.8.6.80"/>
        <vers num="1.8.6.81"/>
        <vers num="1.8.6.82"/>
        <vers num="1.8.6.83"/>
        <vers num="1.8.6.84"/>
        <vers num="1.8.6.85"/>
        <vers num="1.8.6.86"/>
        <vers num="1.8.6.87"/>
        <vers num="1.8.6.88"/>
        <vers num="1.8.6.89"/>
        <vers num="1.8.6.90"/>
        <vers num="1.8.6.91"/>
        <vers num="1.8.6.92"/>
        <vers num="1.8.6.93"/>
        <vers num="1.8.6.94"/>
        <vers num="1.8.6.95"/>
        <vers num="1.8.6.96"/>
        <vers num="1.8.6.97"/>
        <vers num="1.8.6.98"/>
        <vers num="1.8.6.99"/>
        <vers num="1.8.6.100"/>
        <vers num="1.8.6.101"/>
        <vers num="1.8.6.102"/>
        <vers num="1.8.6.103"/>
        <vers num="1.8.6.104"/>
        <vers num="1.8.6.105"/>
        <vers num="1.8.6.106"/>
        <vers num="1.8.6.107"/>
        <vers num="1.8.6.109"/>
        <vers num="1.8.6.110"/>
        <vers num="1.8.6.111"/>
        <vers num="1.8.6.112"/>
        <vers num="1.8.6.113"/>
        <vers num="1.8.6.114"/>
        <vers num="1.8.6.115"/>
        <vers num="1.8.6.121"/>
        <vers num="1.8.6.122"/>
        <vers num="1.8.6.123"/>
        <vers num="1.8.6.124"/>
        <vers num="1.8.6.125"/>
        <vers num="1.8.6.126"/>
        <vers num="1.8.6.127"/>
        <vers num="1.8.6.128"/>
        <vers num="1.8.6.129"/>
        <vers num="1.8.6.130"/>
        <vers num="1.8.6.131"/>
        <vers num="1.8.6.132"/>
        <vers num="1.8.6.133"/>
        <vers num="1.8.6.134"/>
        <vers num="1.8.6.135"/>
        <vers num="1.8.6.136"/>
        <vers num="1.8.6.137"/>
        <vers num="1.8.6.138"/>
        <vers num="1.8.6.139"/>
        <vers num="1.8.6.140"/>
        <vers num="1.8.6.141"/>
        <vers num="1.8.6.144"/>
        <vers num="1.8.6.145"/>
        <vers num="1.8.6.146"/>
        <vers num="1.8.6.147"/>
        <vers num="1.8.6.148"/>
        <vers num="1.8.6.149"/>
        <vers num="1.8.6.150"/>
        <vers num="1.8.6.151"/>
        <vers num="1.8.6.153"/>
        <vers num="1.8.6.154"/>
        <vers num="1.8.6.155"/>
        <vers num="1.8.6.156"/>
        <vers num="1.8.6.157"/>
        <vers num="1.8.6.158"/>
        <vers num="1.8.6.159"/>
        <vers num="1.8.6.160"/>
        <vers num="1.8.6.161"/>
        <vers num="1.8.6.162"/>
        <vers num="1.8.6.163"/>
        <vers num="1.8.6.164"/>
        <vers num="1.8.6.165"/>
        <vers num="1.8.6.166"/>
        <vers num="1.8.6.167"/>
        <vers num="1.8.6.168"/>
        <vers num="1.8.6.169"/>
        <vers num="1.8.6.170"/>
        <vers num="1.8.6.171"/>
        <vers num="1.8.6.172"/>
        <vers num="1.8.6.173"/>
        <vers num="1.8.6.174"/>
        <vers num="1.8.6.175"/>
        <vers num="1.8.6.176"/>
        <vers num="1.8.6.177"/>
        <vers num="1.8.6.178"/>
        <vers num="1.8.6.179"/>
        <vers num="1.8.6.180"/>
        <vers num="1.8.6.181"/>
        <vers num="1.8.6.182"/>
        <vers num="1.8.6.183"/>
        <vers num="1.8.6.184"/>
        <vers num="1.8.6.185"/>
        <vers num="1.8.6.186"/>
        <vers num="1.8.6.187"/>
        <vers num="1.8.6.188"/>
        <vers num="1.8.6.189"/>
        <vers num="1.8.6.190"/>
        <vers num="1.8.6.191"/>
        <vers num="1.8.6.192"/>
        <vers num="1.8.6.193"/>
        <vers num="1.8.6.194"/>
        <vers num="1.8.6.195"/>
        <vers num="1.8.6.196"/>
        <vers num="1.8.6.197"/>
        <vers num="1.8.6.198"/>
        <vers num="1.8.6.199"/>
        <vers num="1.8.6.200"/>
        <vers num="1.8.6.201"/>
        <vers num="1.8.6.202"/>
        <vers num="1.8.6.203"/>
        <vers num="1.8.6.204"/>
        <vers num="1.8.6.205"/>
        <vers num="1.8.6.206"/>
        <vers num="1.8.6.207"/>
        <vers num="1.8.6.208"/>
        <vers num="1.8.6.209"/>
        <vers num="1.8.6.210"/>
        <vers num="1.8.6.211"/>
        <vers num="1.8.6.212"/>
        <vers num="1.8.6.213"/>
        <vers num="1.8.6.214"/>
        <vers num="1.8.6.215"/>
        <vers num="1.8.6.216"/>
        <vers num="1.8.6.217"/>
        <vers num="1.8.6.218"/>
        <vers num="1.8.6.219"/>
        <vers num="1.8.6.220"/>
        <vers num="1.8.6.221"/>
        <vers num="1.8.6.222"/>
        <vers num="1.8.6.223"/>
        <vers num="1.8.6.224"/>
        <vers num="1.8.6.225"/>
        <vers num="1.8.6.226"/>
        <vers num="1.8.6.227"/>
        <vers num="1.8.6.228"/>
        <vers num="1.8.6.229"/>
        <vers num="1.8.7" edition="p160"/>
        <vers num="1.8.7" edition="p17"/>
        <vers num="1.8.7" edition="p173"/>
        <vers num="1.8.7" edition="p174"/>
        <vers num="1.8.7" edition="p22"/>
        <vers num="1.8.7" edition="p248"/>
        <vers num="1.8.7" edition="p249"/>
        <vers num="1.8.7" edition="p299"/>
        <vers num="1.8.7" edition="p301"/>
        <vers num="1.8.7" edition="p302"/>
        <vers num="1.8.7" edition="p330"/>
        <vers num="1.8.7" edition="p334"/>
        <vers num="1.8.7" edition="p352"/>
        <vers num="1.8.7" edition="p357"/>
        <vers num="1.8.7" edition="p358"/>
        <vers num="1.8.7" edition="p370"/>
        <vers num="1.8.7" edition="p371"/>
        <vers num="1.8.7" edition="p373"/>
        <vers num="1.8.7" edition="p374"/>
        <vers num="1.8.7" edition="p71"/>
        <vers num="1.8.7" edition="p72"/>
        <vers num="1.8.7" edition="preview1"/>
        <vers num="1.8.7" edition="preview2"/>
        <vers num="1.8.7" edition="preview3"/>
        <vers num="1.8.7" edition="preview4"/>
        <vers num="1.8.7.7"/>
        <vers num="1.8.7.17"/>
        <vers num="1.8.7.20"/>
        <vers num="1.8.7.21"/>
        <vers num="1.9.0"/>
        <vers num="1.9.0.0"/>
        <vers num="1.9.0.1"/>
      </prod>
      <prod name="ubuntu_linux" vendor="canonical">
        <vers num="6.06" edition=":~~lts~~~"/>
        <vers num="7.04"/>
        <vers num="7.10"/>
        <vers num="8.04" edition=":~~lts~~~"/>
      </prod>
      <prod name="debian_linux" vendor="debian">
        <vers num="4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2727" seq="2008-2727" published="2008-09-02" modified="2008-09-10" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2008-2725.  Reason: This candidate is a duplicate of CVE-2008-2725.  Notes: All CVE users should reference CVE-2008-2725 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2008-2728" seq="2008-2728" published="2008-09-02" modified="2008-09-10" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2008-2726.  Reason: This candidate is a duplicate of CVE-2008-2726.  Notes: All CVE users should reference CVE-2008-2726 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2008-2729" seq="2008-2729" published="2008-06-30" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.9" CVSS_base_score="4.9" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:N/A:N)">
    <desc>
      <descript source="cve">arch/x86_64/lib/copy_user.S in the Linux kernel before 2.6.19 on some AMD64 systems does not erase destination memory locations after an exception during kernel memory copy, which allows local users to obtain sensitive information.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=3022d734a54cbd2b65eea9a024564821101b4a9a;hp=f0f4c3432e5e1087b3a8c0e6bd4113d3c37497ff">http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=3022d734a54cbd2b65eea9a024564821101b4a9a;hp=f0f4c3432e5e1087b3a8c0e6bd4113d3c37497ff</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2008-0508.html">RHSA-2008:0508</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1630">DSA-1630</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:174">MDVSA-2008:174</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0519.html">RHSA-2008:0519</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0585.html">RHSA-2008:0585</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29943">29943</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020364">1020364</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-625-1">USN-625-1</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=451271">https://bugzilla.redhat.com/show_bug.cgi?id=451271</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43558">linux-kernel-destination-info-disclosure(43558)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11571">oval:org.mitre.oval:def:11571</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="red_hat">
        <vers num="2.6.0"/>
        <vers num="2.6.1"/>
        <vers num="2.6.2"/>
        <vers num="2.6.3"/>
        <vers num="2.6.4"/>
        <vers num="2.6.5"/>
        <vers num="2.6.6"/>
        <vers num="2.6.7"/>
        <vers num="2.6.8"/>
        <vers num="2.6.9"/>
        <vers num="2.6.10"/>
        <vers num="2.6.11"/>
        <vers num="2.6.12"/>
        <vers num="2.6.13"/>
        <vers num="2.6.14"/>
        <vers num="2.6.15"/>
        <vers num="2.6.16"/>
        <vers num="2.6.17"/>
        <vers num="2.6.18"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2730" seq="2008-2730" published="2008-06-26" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The Real-Time Information Server (RIS) Data Collector service in Cisco Unified Communications Manager (CUCM) 5.x before 5.1(3) and 6.x before 6.1(1) allows remote attackers to bypass authentication, and obtain cluster configuration information and statistics, via a direct TCP connection to the service port, aka Bug ID CSCsj90843.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_advisory09186a00809b9011.shtml" patch="1">20080625 Cisco Unified Communications Manager Denial of Service and Authentication Bypass Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29935">29935</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020361">1020361</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1933/references">ADV-2008-1933</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43355">cucm-risdatacollector-info-disclosure(43355)</ref>
    </refs>
    <vuln_soft>
      <prod name="unified_communications_manager" vendor="cisco">
        <vers num="5.1"/>
        <vers num="6.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2732" seq="2008-2732" published="2008-09-04" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Multiple unspecified vulnerabilities in the SIP inspection functionality in Cisco PIX and Adaptive Security Appliance (ASA) 5500 devices 7.0 before 7.0(7)16, 7.1 before 7.1(2)71, 7.2 before 7.2(4)7, 8.0 before 8.0(3)20, and 8.1 before 8.1(1)8 allow remote attackers to cause a denial of service (device reload) via unknown vectors, aka Bug IDs CSCsq07867, CSCsq57091, CSCsk60581, and CSCsq39315.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CISCO" url="http://tools.cisco.com/security/center/content/CiscoAppliedMitigationBulletin/cisco-amb-20080903-asa">20080903 Cisco Applied Mitigation Bulletin: Identifying and Mitigating Exploitation of the Remote Access VPN and SIP Vulnerabilities in Cisco PIX and Cisco ASA</ref>
      <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_advisory09186a00809f138a.shtml">20080903 Remote Access VPN and SIP Vulnerabilities in Cisco PIX and Cisco ASA</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30998">30998</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020808">1020808</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020809">1020809</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/44866">cisco-pix-asa-sipinspection-dos(44866)</ref>
    </refs>
    <vuln_soft>
      <prod name="adaptive_security_appliance_5500" vendor="cisco">
        <vers num="7.2"/>
        <vers num="8.0"/>
        <vers num="8.1"/>
      </prod>
      <prod name="pix" vendor="cisco">
        <vers num="7.2"/>
        <vers num="8.0"/>
        <vers num="8.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2733" seq="2008-2733" published="2008-09-04" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.1" CVSS_base_score="7.1" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Cisco PIX and Adaptive Security Appliance (ASA) 5500 devices 7.2 before 7.2(4)2, 8.0 before 8.0(3)14, and 8.1 before 8.1(1)4, when configured as a client VPN endpoint, do not properly process IPSec client authentication, which allows remote attackers to cause a denial of service (device reload) via a crafted authentication attempt, aka Bug ID CSCso69942.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CISCO" url="http://tools.cisco.com/security/center/content/CiscoAppliedMitigationBulletin/cisco-amb-20080903-asa">20080903 Cisco Applied Mitigation Bulletin: Identifying and Mitigating Exploitation of the Remote Access VPN and SIP Vulnerabilities in Cisco PIX and Cisco ASA</ref>
      <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_advisory09186a00809f138a.shtml">20080903 Remote Access VPN and SIP Vulnerabilities in Cisco PIX and Cisco ASA</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30998">30998</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020810">1020810</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020811">1020811</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/44867">cisco-pix-asa-ipsecclientauth-dos(44867)</ref>
    </refs>
    <vuln_soft>
      <prod name="adaptive_security_appliance_5500" vendor="cisco">
        <vers num="7.2"/>
        <vers num="8.0"/>
        <vers num="8.1"/>
      </prod>
      <prod name="pix" vendor="cisco">
        <vers num="7.2"/>
        <vers num="8.0"/>
        <vers num="8.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2734" seq="2008-2734" published="2008-09-04" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.1" CVSS_base_score="7.1" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Memory leak in the crypto functionality in Cisco Adaptive Security Appliance (ASA) 5500 devices 7.2 before 7.2(4)2, 8.0 before 8.0(3)14, and 8.1 before 8.1(1)4, when configured as a clientless SSL VPN endpoint, allows remote attackers to cause a denial of service (memory consumption and VPN hang) via a crafted SSL or HTTP packet, aka Bug ID CSCso66472.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CISCO" url="http://tools.cisco.com/security/center/content/CiscoAppliedMitigationBulletin/cisco-amb-20080903-asa">20080903 Cisco Applied Mitigation Bulletin: Identifying and Mitigating Exploitation of the Remote Access VPN and SIP Vulnerabilities in Cisco PIX and Cisco ASA</ref>
      <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_advisory09186a00809f138a.shtml">20080903 Remote Access VPN and SIP Vulnerabilities in Cisco PIX and Cisco ASA</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30998">30998</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020812">1020812</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/44868">cisco-asa-sslvpn-dos(44868)</ref>
    </refs>
    <vuln_soft>
      <prod name="adaptive_security_appliance_5500" vendor="cisco">
        <vers num="8.0"/>
        <vers num="8.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2735" seq="2008-2735" published="2008-09-04" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.1" CVSS_base_score="7.1" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">The HTTP server in Cisco Adaptive Security Appliance (ASA) 5500 devices 8.0 before 8.0(3)15 and 8.1 before 8.1(1)5, when configured as a clientless SSL VPN endpoint, does not properly process URIs, which allows remote attackers to cause a denial of service (device reload) via a URI in a crafted SSL or HTTP packet, aka Bug ID CSCsq19369.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CISCO" url="http://tools.cisco.com/security/center/content/CiscoAppliedMitigationBulletin/cisco-amb-20080903-asa">20080903 Cisco Applied Mitigation Bulletin: Identifying and Mitigating Exploitation of the Remote Access VPN and SIP Vulnerabilities in Cisco PIX and Cisco ASA</ref>
      <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_advisory09186a00809f138a.shtml">20080903 Remote Access VPN and SIP Vulnerabilities in Cisco PIX and Cisco ASA</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30998">30998</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020812">1020812</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/44869">cisco-asa-uri-dos(44869)</ref>
    </refs>
    <vuln_soft>
      <prod name="adaptive_security_appliance_5500" vendor="cisco">
        <vers num="8.0"/>
        <vers num="8.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2736" seq="2008-2736" published="2008-09-04" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.1" CVSS_base_score="7.1" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:N/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Cisco Adaptive Security Appliance (ASA) 5500 devices 8.0(3)15, 8.0(3)16, 8.1(1)4, and 8.1(1)5, when configured as a clientless SSL VPN endpoint, allows remote attackers to obtain usernames and passwords via unknown vectors, aka Bug ID CSCsq45636.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CISCO" url="http://tools.cisco.com/security/center/content/CiscoAppliedMitigationBulletin/cisco-amb-20080903-asa">20080903 Cisco Applied Mitigation Bulletin: Identifying and Mitigating Exploitation of the Remote Access VPN and SIP Vulnerabilities in Cisco PIX and Cisco ASA</ref>
      <ref source="CONFIRM" url="http://www.cisco.com/en/US/docs/security/asa/asa81/release/notes/asarn812.html">http://www.cisco.com/en/US/docs/security/asa/asa81/release/notes/asarn812.html</ref>
      <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_advisory09186a00809f138a.shtml">20080903 Remote Access VPN and SIP Vulnerabilities in Cisco PIX and Cisco ASA</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30998">30998</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020813">1020813</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/44870">cisco-asa-clientlessvpn-info-disclosure(44870)</ref>
    </refs>
    <vuln_soft>
      <prod name="adaptive_security_appliance_5500" vendor="cisco">
        <vers num="8.0"/>
        <vers num="8.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2737" seq="2008-2737" published="2008-08-18" modified="2008-09-10" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2008-3558.  Reason: This candidate is a duplicate of CVE-2008-3558.  Notes: All CVE users should reference CVE-2008-3558 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2008-2739" seq="2008-2739" published="2008-09-26" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">The SERVICE.DNS signature engine in the Intrusion Prevention System (IPS) in Cisco IOS 12.3 and 12.4 allows remote attackers to cause a denial of service (device crash or hang) via network traffic that triggers unspecified IPS signatures, a different vulnerability than CVE-2008-1447.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_advisory09186a0080a01556.shtml" patch="1">20080924 Cisco IOS IPS Denial of Service Vulnerability</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2670">ADV-2008-2670</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6058">oval:org.mitre.oval:def:6058</ref>
    </refs>
    <vuln_soft>
      <prod name="ios" vendor="cisco">
        <vers num="12.3t"/>
        <vers num="12.3xl"/>
        <vers num="12.3xq"/>
        <vers num="12.3xr"/>
        <vers num="12.3xs"/>
        <vers num="12.3xx"/>
        <vers num="12.3ya"/>
        <vers num="12.3yd"/>
        <vers num="12.3yg"/>
        <vers num="12.3yh"/>
        <vers num="12.3yk"/>
        <vers num="12.3ys"/>
        <vers num="12.3yt"/>
        <vers num="12.3za"/>
        <vers num="12.4xa"/>
        <vers num="12.4xc"/>
        <vers num="12.4xe"/>
        <vers num="12.4xj"/>
        <vers num="12.4xk"/>
        <vers num="12.4xt"/>
        <vers num="12.4xv"/>
      </prod>
      <prod name="ios" vendor="cisco">
        <vers num="12.3yi"/>
        <vers num="12.4xf"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2742" seq="2008-2742" published="2008-06-17" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unrestricted file upload in the mcpuk file editor (atk/attributes/fck/editor/filemanager/browser/mcpuk/connectors/php/config.php) in Achievo 1.2.0 through 1.3.2 allows remote attackers to execute arbitrary code by uploading a file with .php followed by a safe extension, then accessing it via a direct request to the file in the Achievo root directory.  NOTE: this is only a vulnerability in environments that support multiple extensions, such as Apache with the mod_mime module enabled.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.achievo.org/blog/archives/631-Achievo-1.3.3-Security-Release.html">http://www.achievo.org/blog/archives/631-Achievo-1.3.3-Security-Release.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29621">29621</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42980">achievo-config-file-upload(42980)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5770">5770</ref>
    </refs>
    <vuln_soft>
      <prod name="achievo" vendor="achievo">
        <vers num="1.2.0"/>
        <vers num="1.2.1"/>
        <vers num="1.3.0"/>
        <vers num="1.3.1"/>
        <vers num="1.3.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2743" seq="2008-2743" published="2008-06-17" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the embedded web server in Xerox 4110, 4590, and 4595 Copier/Printers allows remote attackers to inject arbitrary web script or HTML via unknown attack vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29690">29690</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020282">1020282</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1829/references">ADV-2008-1829</ref>
      <ref source="CONFIRM" url="http://www.xerox.com/downloads/usa/en/c/cert_XRX08_007.pdf">http://www.xerox.com/downloads/usa/en/c/cert_XRX08_007.pdf</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43058">xerox-copierprinter-webserver-xss(43058)</ref>
    </refs>
    <vuln_soft>
      <prod name="xerox_4110" vendor="xerox">
        <vers num=""/>
      </prod>
      <prod name="xerox_4590" vendor="xerox">
        <vers num=""/>
      </prod>
      <prod name="xerox_4595" vendor="xerox">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2744" seq="2008-2744" published="2008-06-17" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in vBulletin 3.6.10 and 3.7.1 allows remote attackers to inject arbitrary web script or HTML via unknown vectors and an "obscure method." NOTE: the vector is probably in the redirect parameter to the Admin Control Panel (admincp/index.php).</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3946">3946</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493340/100/0/threaded">20080613 Exploit for vBulletin "obscure" XSS (3.7.1 &amp; 3.6.10)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29704">29704</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020322">1020322</ref>
      <ref source="CONFIRM" url="http://www.vbulletin.com/forum/showthread.php?t=274882">http://www.vbulletin.com/forum/showthread.php?t=274882</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43090">vbulletin-redirect-xss(43090)</ref>
    </refs>
    <vuln_soft>
      <prod name="vbulletin" vendor="vbulletin">
        <vers num="3.6.10"/>
        <vers num="3.7.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2745" seq="2008-2745" published="2008-06-17" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in BiAnno ActiveX Control (BiAnno.ocx) in Black Ice Software Annotation Plugin 10.95 allows remote attackers to execute arbitrary code via a long parameter to the AnnoSaveToTiff method.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29635">29635</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1795/references">ADV-2008-1795</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42982">annotationsdk-activex-annosavetotiff-bo(42982)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5777">5777</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5778">5778</ref>
    </refs>
    <vuln_soft>
      <prod name="annotation_software" vendor="black_ice">
        <vers num="10.95"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2746" seq="2008-2746" published="2008-06-17" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in login.php in Gryphon gllcTS2 4.2.4 allows remote attackers to execute arbitrary SQL commands via the detail parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29697">29697</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43057">gllcts2-login-sql-injection(43057)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5796">5796</ref>
    </refs>
    <vuln_soft>
      <prod name="gllcts2" vendor="gryphon">
        <vers num="4.2.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2747" seq="2008-2747" published="2008-06-18" modified="2018-10-11" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">No-IP Dynamic Update Client (DUC) 2.2.1 on Windows uses weak permissions for the HKLM\SOFTWARE\Vitalwerks\DUC registry key, which allows local users to obtain obfuscated passwords and other sensitive information by reading the (1) TrayPassword, (2) Username, (3) Password, and (4) Hosts registry values.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3952">3952</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493367/100/0/threaded">20080616 DUC NO-IP Local Password Information Disclosure Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29758">29758</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43298">noipduc-duc-info-disclosure(43298)</ref>
    </refs>
    <vuln_soft>
      <prod name="dynamic_update_client" vendor="no-ip">
        <vers num="2.2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2748" seq="2008-2748" published="2008-06-18" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Skulltag 0.97d2-RC2 and earlier allows remote attackers to cause a denial of service (daemon hang) via a series of long, malformed connect packets, related to these packets being "parsed multiple times."</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.org/poc/skulltagloop.zip">http://aluigi.org/poc/skulltagloop.zip</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3953">3953</ref>
      <ref source="CONFIRM" url="http://skulltag.com/testing/public/Skulltag%20Version%20History.txt">http://skulltag.com/testing/public/Skulltag%20Version%20History.txt</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493386/100/0/threaded">20080616 Server freezed in Skulltag 0.97d2-RC2</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29760">29760</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43125">skulltag-packet-dos(43125)</ref>
    </refs>
    <vuln_soft>
      <prod name="skulltag" vendor="skulltag_team">
        <vers num="0.95c"/>
        <vers num="0.95d"/>
        <vers num="0.95e"/>
        <vers num="0.95f"/>
        <vers num="0.95g"/>
        <vers num="0.95h"/>
        <vers num="0.95i"/>
        <vers num="0.95j"/>
        <vers num="0.95k"/>
        <vers num="0.96b"/>
        <vers num="0.96c"/>
        <vers num="0.96d"/>
        <vers num="0.96e"/>
        <vers num="0.96f"/>
        <vers num="0.97b"/>
        <vers num="0.97c"/>
        <vers num="0.97c2"/>
        <vers num="0.97c3"/>
        <vers num="0.97d" edition="beta_1"/>
        <vers num="0.97d" edition="beta_2"/>
        <vers num="0.97d" edition="beta_3"/>
        <vers num="0.97d" edition="beta_4"/>
        <vers num="0.97d" edition="beta_4.1"/>
        <vers num="0.97d" edition="beta_4.2"/>
        <vers num="0.97d" edition="beta_4.3"/>
        <vers num="0.97d" edition="rc10"/>
        <vers num="0.97d" edition="rc9"/>
        <vers num="0.97d2" edition="rc2"/>
        <vers num="0.97d2" edition="rc3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2749" seq="2008-2749" published="2008-06-18" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.1" CVSS_base_score="7.1" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in cshttpd in Sun Java System Calendar Server 6 and 6.3, and Sun ONE Calendar Server 6.0, when access logging (aka service.http.commandlog.all) is enabled, allows remote attackers to cause a denial of service (daemon crash) via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-66-235521-1" patch="1">235521</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29763">29763</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020299">1020299</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1857">ADV-2008-1857</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43127">sun-java-systemcalendarserver-dos(43127)</ref>
    </refs>
    <vuln_soft>
      <prod name="java_system_calendar_server" vendor="sun">
        <vers num="6" edition="2004q2"/>
        <vers num="6" edition="2005q1"/>
        <vers num="6" edition="2005q4"/>
        <vers num="6.3"/>
      </prod>
      <prod name="one_calendar_server" vendor="sun">
        <vers num="6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2750" seq="2008-2750" published="2008-06-18" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">The pppol2tp_recvmsg function in drivers/net/pppol2tp.c in the Linux kernel 2.6 before 2.6.26-rc6 allows remote attackers to cause a denial of service (kernel heap memory corruption and system crash) and possibly have unspecified other impact via a crafted PPPOL2TP packet that results in a large value for a certain length variable.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=6b6707a50c7598a83820077393f8823ab791abf8">http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=6b6707a50c7598a83820077393f8823ab791abf8</ref>
      <ref source="CONFIRM" url="http://kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.26-rc6">http://kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.26-rc6</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00009.html">SUSE-SA:2008:037</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1020297">1020297</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0207">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0207</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:167">MDVSA-2008:167</ref>
      <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/06/19/3">[oss-security] 20080619 Re: query on a pppol2tp_recvmsg() fix - security relevant?</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29747" patch="1">29747</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-625-1">USN-625-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1854">ADV-2008-1854</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43111">linux-kernel-pppol2tprecvmsg-dos(43111)</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2629">https://issues.rpath.com/browse/RPL-2629</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00082.html">FEDORA-2008-5893</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.6.0" edition="test1"/>
        <vers num="2.6.0" edition="test10"/>
        <vers num="2.6.0" edition="test11"/>
        <vers num="2.6.0" edition="test2"/>
        <vers num="2.6.0" edition="test3"/>
        <vers num="2.6.0" edition="test4"/>
        <vers num="2.6.0" edition="test5"/>
        <vers num="2.6.0" edition="test6"/>
        <vers num="2.6.0" edition="test7"/>
        <vers num="2.6.0" edition="test8"/>
        <vers num="2.6.0" edition="test9"/>
        <vers num="2.6.1" edition="rc1"/>
        <vers num="2.6.1" edition="rc2"/>
        <vers num="2.6.1" edition="rc3"/>
        <vers num="2.6.2" edition="rc1"/>
        <vers num="2.6.2" edition="rc2"/>
        <vers num="2.6.2" edition="rc3"/>
        <vers num="2.6.10" edition="rc1"/>
        <vers num="2.6.10" edition="rc2"/>
        <vers num="2.6.10" edition="rc3"/>
        <vers num="2.6.11" edition="rc1"/>
        <vers num="2.6.11" edition="rc2"/>
        <vers num="2.6.11" edition="rc3"/>
        <vers num="2.6.11" edition="rc4"/>
        <vers num="2.6.11" edition="rc5"/>
        <vers num="2.6.11.1"/>
        <vers num="2.6.11.2"/>
        <vers num="2.6.11.3"/>
        <vers num="2.6.11.4"/>
        <vers num="2.6.11.5"/>
        <vers num="2.6.11.6"/>
        <vers num="2.6.11.7"/>
        <vers num="2.6.11.8"/>
        <vers num="2.6.11.9"/>
        <vers num="2.6.11.10"/>
        <vers num="2.6.11.11"/>
        <vers num="2.6.11.12"/>
        <vers num="2.6.11_rc1_bk6"/>
        <vers num="2.6.12" edition="rc1"/>
        <vers num="2.6.12" edition="rc2"/>
        <vers num="2.6.12" edition="rc3"/>
        <vers num="2.6.12" edition="rc4"/>
        <vers num="2.6.12" edition="rc5"/>
        <vers num="2.6.12" edition="rc6"/>
        <vers num="2.6.12.1"/>
        <vers num="2.6.12.2"/>
        <vers num="2.6.12.3"/>
        <vers num="2.6.12.4"/>
        <vers num="2.6.12.5"/>
        <vers num="2.6.12.6"/>
        <vers num="2.6.12.12"/>
        <vers num="2.6.12.22"/>
        <vers num="2.6.13" edition="rc1"/>
        <vers num="2.6.13" edition="rc2"/>
        <vers num="2.6.13" edition="rc3"/>
        <vers num="2.6.13" edition="rc4"/>
        <vers num="2.6.13" edition="rc5"/>
        <vers num="2.6.13" edition="rc6"/>
        <vers num="2.6.13" edition="rc7"/>
        <vers num="2.6.13.1"/>
        <vers num="2.6.13.2"/>
        <vers num="2.6.13.3"/>
        <vers num="2.6.13.4"/>
        <vers num="2.6.13.5"/>
        <vers num="2.6.14" edition="rc1"/>
        <vers num="2.6.14" edition="rc2"/>
        <vers num="2.6.14" edition="rc3"/>
        <vers num="2.6.14" edition="rc4"/>
        <vers num="2.6.14" edition="rc5"/>
        <vers num="2.6.14.1"/>
        <vers num="2.6.14.2"/>
        <vers num="2.6.14.3"/>
        <vers num="2.6.14.4"/>
        <vers num="2.6.14.5"/>
        <vers num="2.6.14.6"/>
        <vers num="2.6.14.7"/>
        <vers num="2.6.15" edition="rc1"/>
        <vers num="2.6.15" edition="rc2"/>
        <vers num="2.6.15" edition="rc3"/>
        <vers num="2.6.15" edition="rc4"/>
        <vers num="2.6.15" edition="rc5"/>
        <vers num="2.6.15" edition="rc6"/>
        <vers num="2.6.15" edition="rc7"/>
        <vers num="2.6.15.1"/>
        <vers num="2.6.15.2"/>
        <vers num="2.6.15.3"/>
        <vers num="2.6.15.4"/>
        <vers num="2.6.15.5"/>
        <vers num="2.6.15.6"/>
        <vers num="2.6.15.7"/>
        <vers num="2.6.15.11"/>
        <vers num="2.6.16" edition="rc1"/>
        <vers num="2.6.16" edition="rc2"/>
        <vers num="2.6.16" edition="rc3"/>
        <vers num="2.6.16" edition="rc4"/>
        <vers num="2.6.16" edition="rc5"/>
        <vers num="2.6.16" edition="rc6"/>
        <vers num="2.6.16.1"/>
        <vers num="2.6.16.2"/>
        <vers num="2.6.16.3"/>
        <vers num="2.6.16.4"/>
        <vers num="2.6.16.5"/>
        <vers num="2.6.16.6"/>
        <vers num="2.6.16.7"/>
        <vers num="2.6.16.8"/>
        <vers num="2.6.16.9"/>
        <vers num="2.6.16.10"/>
        <vers num="2.6.16.11"/>
        <vers num="2.6.16.12"/>
        <vers num="2.6.16.13"/>
        <vers num="2.6.16.14"/>
        <vers num="2.6.16.15"/>
        <vers num="2.6.16.16"/>
        <vers num="2.6.16.17"/>
        <vers num="2.6.16.18"/>
        <vers num="2.6.16.19"/>
        <vers num="2.6.16.20"/>
        <vers num="2.6.16.21"/>
        <vers num="2.6.16.22"/>
        <vers num="2.6.16.23"/>
        <vers num="2.6.16.24"/>
        <vers num="2.6.16.25"/>
        <vers num="2.6.16.26"/>
        <vers num="2.6.16.27"/>
        <vers num="2.6.16.28"/>
        <vers num="2.6.16.29"/>
        <vers num="2.6.16.30"/>
        <vers num="2.6.16.31"/>
        <vers num="2.6.16.32"/>
        <vers num="2.6.16.33"/>
        <vers num="2.6.16.34"/>
        <vers num="2.6.16.35"/>
        <vers num="2.6.16.36"/>
        <vers num="2.6.16.37"/>
        <vers num="2.6.16.38"/>
        <vers num="2.6.16.39"/>
        <vers num="2.6.16.40"/>
        <vers num="2.6.16.41"/>
        <vers num="2.6.16.43"/>
        <vers num="2.6.16.44"/>
        <vers num="2.6.16.45"/>
        <vers num="2.6.16.46"/>
        <vers num="2.6.16.47"/>
        <vers num="2.6.16.48"/>
        <vers num="2.6.16.49"/>
        <vers num="2.6.16.50"/>
        <vers num="2.6.16.51"/>
        <vers num="2.6.16.52"/>
        <vers num="2.6.16.53"/>
        <vers num="2.6.16_rc7"/>
        <vers num="2.6.17" edition="rc1"/>
        <vers num="2.6.17" edition="rc2"/>
        <vers num="2.6.17" edition="rc3"/>
        <vers num="2.6.17" edition="rc4"/>
        <vers num="2.6.17" edition="rc5"/>
        <vers num="2.6.17" edition="rc6"/>
        <vers num="2.6.17.1"/>
        <vers num="2.6.17.2"/>
        <vers num="2.6.17.3"/>
        <vers num="2.6.17.4"/>
        <vers num="2.6.17.5"/>
        <vers num="2.6.17.6"/>
        <vers num="2.6.17.7"/>
        <vers num="2.6.17.8"/>
        <vers num="2.6.17.9"/>
        <vers num="2.6.17.10"/>
        <vers num="2.6.17.11"/>
        <vers num="2.6.17.12"/>
        <vers num="2.6.17.13"/>
        <vers num="2.6.17.14"/>
        <vers num="2.6.18" edition="rc1"/>
        <vers num="2.6.18" edition="rc2"/>
        <vers num="2.6.18" edition="rc3"/>
        <vers num="2.6.18" edition="rc4"/>
        <vers num="2.6.18" edition="rc5"/>
        <vers num="2.6.18" edition="rc6"/>
        <vers num="2.6.18" edition="rc7"/>
        <vers num="2.6.18.1"/>
        <vers num="2.6.18.2"/>
        <vers num="2.6.18.3"/>
        <vers num="2.6.18.4"/>
        <vers num="2.6.18.5"/>
        <vers num="2.6.18.6"/>
        <vers num="2.6.18.7"/>
        <vers num="2.6.18.8"/>
        <vers num="2.6.19" edition="rc1"/>
        <vers num="2.6.19" edition="rc2"/>
        <vers num="2.6.19" edition="rc3"/>
        <vers num="2.6.19" edition="rc4"/>
        <vers num="2.6.19.1"/>
        <vers num="2.6.19.2"/>
        <vers num="2.6.19.3"/>
        <vers num="2.6.20" edition="rc2"/>
        <vers num="2.6.20.1"/>
        <vers num="2.6.20.2"/>
        <vers num="2.6.20.3"/>
        <vers num="2.6.20.4"/>
        <vers num="2.6.20.5"/>
        <vers num="2.6.20.6"/>
        <vers num="2.6.20.7"/>
        <vers num="2.6.20.8"/>
        <vers num="2.6.20.9"/>
        <vers num="2.6.20.10"/>
        <vers num="2.6.20.11"/>
        <vers num="2.6.20.12"/>
        <vers num="2.6.20.13"/>
        <vers num="2.6.20.14"/>
        <vers num="2.6.20.15"/>
        <vers num="2.6.21" edition="git1"/>
        <vers num="2.6.21" edition="git2"/>
        <vers num="2.6.21" edition="git3"/>
        <vers num="2.6.21" edition="git4"/>
        <vers num="2.6.21" edition="git5"/>
        <vers num="2.6.21" edition="git6"/>
        <vers num="2.6.21" edition="git7"/>
        <vers num="2.6.21" edition="rc3"/>
        <vers num="2.6.21" edition="rc4"/>
        <vers num="2.6.21" edition="rc5"/>
        <vers num="2.6.21" edition="rc6"/>
        <vers num="2.6.21" edition="rc7"/>
        <vers num="2.6.21.1"/>
        <vers num="2.6.21.2"/>
        <vers num="2.6.21.3"/>
        <vers num="2.6.21.4"/>
        <vers num="2.6.21.6"/>
        <vers num="2.6.21.7"/>
        <vers num="2.6.22" edition="rc6"/>
        <vers num="2.6.22.1"/>
        <vers num="2.6.22.2"/>
        <vers num="2.6.22.3"/>
        <vers num="2.6.22.4"/>
        <vers num="2.6.22.5"/>
        <vers num="2.6.22.6"/>
        <vers num="2.6.22.7"/>
        <vers num="2.6.22.8"/>
        <vers num="2.6.22.9"/>
        <vers num="2.6.22.10"/>
        <vers num="2.6.22.11"/>
        <vers num="2.6.22.12"/>
        <vers num="2.6.22.13"/>
        <vers num="2.6.22.14"/>
        <vers num="2.6.22.15"/>
        <vers num="2.6.22.16"/>
        <vers num="2.6.22.17"/>
        <vers num="2.6.22.18"/>
        <vers num="2.6.22.19"/>
        <vers num="2.6.22.20"/>
        <vers num="2.6.22.21"/>
        <vers num="2.6.22.22"/>
        <vers num="2.6.22_rc1"/>
        <vers num="2.6.22_rc7"/>
        <vers num="2.6.23" edition="rc1"/>
        <vers num="2.6.23" edition="rc2"/>
        <vers num="2.6.23.1"/>
        <vers num="2.6.23.2"/>
        <vers num="2.6.23.3"/>
        <vers num="2.6.23.4"/>
        <vers num="2.6.23.5"/>
        <vers num="2.6.23.6"/>
        <vers num="2.6.23.7"/>
        <vers num="2.6.23.9"/>
        <vers num="2.6.23.10"/>
        <vers num="2.6.23.14"/>
        <vers num="2.6.24" edition="rc2"/>
        <vers num="2.6.24" edition="rc3"/>
        <vers num="2.6.24.1"/>
        <vers num="2.6.24.2"/>
        <vers num="2.6.24.3"/>
        <vers num="2.6.24.4"/>
        <vers num="2.6.24.5"/>
        <vers num="2.6.24.6"/>
        <vers num="2.6.24_rc1"/>
        <vers num="2.6.25"/>
        <vers num="2.6.25.1"/>
        <vers num="2.6.25.2"/>
        <vers num="2.6.25.3"/>
        <vers num="2.6.25.4"/>
        <vers num="2.6_test9_cvs"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2751" seq="2008-2751" published="2008-06-18" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in the Glassfish webadmin interface in Sun Java System Application Server 9.1_01 allow remote attackers to inject arbitrary web script or HTML via the (1) propertyForm:propertyContentPage:propertySheet:propertSectionTextField:jndiProp:JndiNew, (2) propertyForm:propertyContentPage:propertySheet:propertSectionTextField:resTypeProp:resType, (3) propertyForm:propertyContentPage:propertySheet:propertSectionTextField:factoryClassProp:factoryClass, or (4) propertyForm:propertyContentPage:propertySheet:propertSectionTextField:descProp:desc parameter to (a) resourceNode/customResourceNew.jsf; the (5) propertyForm:propertyContentPage:propertySheet:propertSectionTextField:jndiProp:JndiNew, (6) propertyForm:propertyContentPage:propertySheet:propertSectionTextField:resTypeProp:resType, (7) propertyForm:propertyContentPage:propertySheet:propertSectionTextField:factoryClassProp:factoryClass, (8) propertyForm:propertyContentPage:propertySheet:propertSectionTextField:jndiLookupProp:jndiLookup, or (9) propertyForm:propertyContentPage:propertySheet:propertSectionTextField:descProp:desc parameter to (b) resourceNode/externalResourceNew.jsf; the (10) propertyForm:propertySheet:propertSectionTextField:jndiProp:Jndi, (11) propertyForm:propertySheet:propertSectionTextField:nameProp:name, or (12) propertyForm:propertySheet:propertSectionTextField:descProp:desc parameter to (c) resourceNode/jmsDestinationNew.jsf; the (13) propertyForm:propertySheet:generalPropertySheet:jndiProp:Jndi or (14) propertyForm:propertySheet:generalPropertySheet:descProp:cd parameter to (d) resourceNode/jmsConnectionNew.jsf; the (15) propertyForm:propertySheet:propertSectionTextField:jndiProp:jnditext or (16) propertyForm:propertySheet:propertSectionTextField:descProp:desc parameter to (e) resourceNode/jdbcResourceNew.jsf; the (17) propertyForm:propertyContentPage:propertySheet:propertSectionTextField:nameProp:name, (18) propertyForm:propertyContentPage:propertySheet:propertSectionTextField:classNameProp:classname, or (19) propertyForm:propertyContentPage:propertySheet:propertSectionTextField:loadOrderProp:loadOrder parameter to (f) applications/lifecycleModulesNew.jsf; or the (20) propertyForm:propertyContentPage:propertySheet:generalPropertySheet:jndiProp:name, (21) propertyForm:propertyContentPage:propertySheet:generalPropertySheet:resTypeProp:resType, or (22) propertyForm:propertyContentPage:propertySheet:generalPropertySheet:dbProp:db parameter to (g) resourceNode/jdbcConnectionPoolNew1.jsf.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3949">3949</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493370/100/0/threaded">20080614 Muitiple XSS - Glassfish Web Interface (Sun Java System Application Server 9.1_01 (build b09d-fcs) )</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29751">29751</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42989">glassfish-multiple-scripts-xss(42989)</ref>
    </refs>
    <vuln_soft>
      <prod name="glassfish_server" vendor="oracle">
        <vers num="1.0" edition="ur1"/>
        <vers num="1.0" edition="ur1_po1"/>
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="2.1.1"/>
        <vers num="3.0"/>
        <vers num="3.0.1"/>
      </prod>
      <prod name="java_system_application_server" vendor="sun">
        <vers num="9.1_01"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2752" seq="2008-2752" published="2008-06-18" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.1" CVSS_base_score="7.1" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Microsoft Word 2000 9.0.2812 and 2003 11.8106.8172 does not properly handle unordered lists, which allows user-assisted remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted .doc file.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29769">29769</ref>
      <ref source="MISC" url="http://www.securityfocus.com/data/vulnerabilities/exploits/crash-word-1.doc">http://www.securityfocus.com/data/vulnerabilities/exploits/crash-word-1.doc</ref>
      <ref source="MISC" url="http://www.securityfocus.com/data/vulnerabilities/exploits/crash-word-2.doc">http://www.securityfocus.com/data/vulnerabilities/exploits/crash-word-2.doc</ref>
      <ref source="MISC" url="http://www.securityfocus.com/data/vulnerabilities/exploits/crash-word-3.doc">http://www.securityfocus.com/data/vulnerabilities/exploits/crash-word-3.doc</ref>
      <ref source="MISC" url="http://www.securityfocus.com/data/vulnerabilities/exploits/crash-word-4.doc">http://www.securityfocus.com/data/vulnerabilities/exploits/crash-word-4.doc</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43155">microsoft-word-unorderedlist-code-execution(43155)</ref>
    </refs>
    <vuln_soft>
      <prod name="word" vendor="microsoft">
        <vers num="2000" edition="sp2"/>
        <vers num="2000" edition="sp3"/>
        <vers num="2000" edition="sr1"/>
        <vers num="2000" edition="sr1a"/>
        <vers num="2003" edition="sp1"/>
        <vers num="2003" edition="sp2"/>
        <vers num="2003" edition="sp3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2753" seq="2008-2753" published="2008-06-18" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in Pooya Site Builder (PSB) 6.0 allow remote attackers to execute arbitrary SQL commands via the (1) xslIdn parameter to (a) utils/getXsl.aspx, and the (2) part parameter to (b) getXml.aspx and (c) getXls.aspx in utils/.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugreport.ir/index.php?/42">http://bugreport.ir/index.php?/42</ref>
      <ref source="BUGTRAQ" url="http://seclists.org/bugtraq/2008/Jun/0115.html">20080611 Pooya Site Builder (PSB) SQL Injection Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29673">29673</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43007">pooyasitebuilder-getxsl-sql-injection(43007)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5788">5788</ref>
    </refs>
    <vuln_soft>
      <prod name="pooya_site_builder" vendor="paridel">
        <vers num="6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2754" seq="2008-2754" published="2008-06-18" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in toplists.php in eFiction 3.0 and 3.4.3, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the list parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29658">29658</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42998">efiction-toplists-sql-injection(42998)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5785">5785</ref>
    </refs>
    <vuln_soft>
      <prod name="efiction" vendor="efiction">
        <vers num="3.0"/>
        <vers num="3.4.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2755" seq="2008-2755" published="2008-06-18" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in JAMM CMS allows remote attackers to execute arbitrary SQL commands via the id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29674">29674</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43023">jamm-index-sql-injection(43023)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5789">5789</ref>
    </refs>
    <vuln_soft>
      <prod name="jamm_cms" vendor="jamm-media">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2756" seq="2008-2756" published="2008-06-18" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in admin/users.asp in Xigla Absolute Control Panel XE 1.0 allows remote attackers to inject arbitrary web script or HTML via the name parameter and other unspecified parameters.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugreport.ir/index.php?/41">http://bugreport.ir/index.php?/41</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=121322052622903&amp;w=2">20080611 Xigla Multiple Products - Multiple Vulnerabilities</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3950">3950</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29672">29672</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43048">absolutecontrolpanel-users-xss(43048)</ref>
    </refs>
    <vuln_soft>
      <prod name="absolute_control_panel_xe" vendor="xigla">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2757" seq="2008-2757" published="2008-06-18" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in search.asp in Xigla Absolute News Manager XE 3.2 allows remote authenticated administrators to execute arbitrary SQL commands via the orderby parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugreport.ir/index.php?/41">http://bugreport.ir/index.php?/41</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=121322052622903&amp;w=2">20080611 Xigla Multiple Products - Multiple Vulnerabilities</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3950">3950</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29672">29672</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43043">absolutenews-search-sql-injection(43043)</ref>
    </refs>
    <vuln_soft>
      <prod name="absolute_news_manager_xe" vendor="xigla">
        <vers num="3.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2758" seq="2008-2758" published="2008-06-18" modified="2017-08-07" severity="Low" CVSS_version="2.0" CVSS_score="3.5" CVSS_base_score="3.5" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="6.8" CVSS_vector="(AV:N/AC:M/Au:S/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in Xigla Absolute News Manager XE 3.2 allow remote authenticated administrators to inject arbitrary web script or HTML via the (1) pblname and (2) text parameters to (a) admin/search.asp, (3) name parameter to (b) admin/publishers.asp, and other unspecified vectors to (c) anmviewer.asp and (d) editarticleX.asp in admin/.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugreport.ir/index.php?/41">http://bugreport.ir/index.php?/41</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=121322052622903&amp;w=2">20080611 Xigla Multiple Products - Multiple Vulnerabilities</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3950">3950</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29672">29672</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43042">absolutenews-search-publishers-xss(43042)</ref>
    </refs>
    <vuln_soft>
      <prod name="absolute_news_manager_xe" vendor="xigla">
        <vers num="3.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2759" seq="2008-2759" published="2008-06-18" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in Xigla Absolute Form Processor XE 4.0 allow remote attackers to inject arbitrary web script or HTML via the (1) showfields, (2) text, and (3) submissions parameters to search.asp and the (4) name parameter to users.asp. NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugreport.ir/index.php?/41">http://bugreport.ir/index.php?/41</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=121322052622903&amp;w=2">20080611 Xigla Multiple Products - Multiple Vulnerabilities</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3950">3950</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29672">29672</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43047">absoluteform-search-users-xss(43047)</ref>
    </refs>
    <vuln_soft>
      <prod name="absolute_form_processor_xe" vendor="xigla">
        <vers num="4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2760" seq="2008-2760" published="2008-06-18" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in searchbanners.asp in Xigla Absolute Banner Manager XE 2.0 allows remote authenticated administrators to execute arbitrary SQL commands via the orderby parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugreport.ir/index.php?/41">http://bugreport.ir/index.php?/41</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=121322052622903&amp;w=2">20080611 Xigla Multiple Products - Multiple Vulnerabilities</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3950">3950</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29672">29672</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43046">absolutebanner-searchbanners-sql-injection(43046)</ref>
    </refs>
    <vuln_soft>
      <prod name="absolute_banner_manager" vendor="xigla">
        <vers num="2.0" edition=":asp"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2761" seq="2008-2761" published="2008-06-18" modified="2017-08-07" severity="Low" CVSS_version="2.0" CVSS_score="3.5" CVSS_base_score="3.5" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="6.8" CVSS_vector="(AV:N/AC:M/Au:S/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in Xigla Absolute Banner Manager XE 2.0 allow remote authenticated administrators to inject arbitrary web script or HTML via the text parameter in (1) searchbanners.asp and (2) listadvertisers.asp, and other unspecified fields.  NOTE: some of these details are obtained from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugreport.ir/index.php?/41">http://bugreport.ir/index.php?/41</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=121322052622903&amp;w=2">20080611 Xigla Multiple Products - Multiple Vulnerabilities</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3950">3950</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29672">29672</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43045">absolutebanner-searchbanners-xss(43045)</ref>
    </refs>
    <vuln_soft>
      <prod name="absolute_banner_manager" vendor="xigla">
        <vers num="2.0" edition=":asp"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2762" seq="2008-2762" published="2008-06-18" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in search.asp in Xigla Absolute Form Processor XE 4.0 allows remote authenticated administrators to execute arbitrary SQL commands via the orderby parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugreport.ir/index.php?/41">http://bugreport.ir/index.php?/41</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=121322052622903&amp;w=2">20080611 Xigla Multiple Products - Multiple Vulnerabilities</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3950">3950</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29672">29672</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43051">absoluteform-search-sql-injection(43051)</ref>
    </refs>
    <vuln_soft>
      <prod name="absolute_form_processor_xe" vendor="xigla">
        <vers num="4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2763" seq="2008-2763" published="2008-06-18" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in search.asp in Xigla Absolute Live Support XE 5.1 allows remote authenticated administrators to execute arbitrary SQL commands via the orderby parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugreport.ir/index.php?/41">http://bugreport.ir/index.php?/41</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=121322052622903&amp;w=2">20080611 Xigla Multiple Products - Multiple Vulnerabilities</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3950">3950</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29672">29672</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43050">absolutelivesupport-search-sql-injection(43050)</ref>
    </refs>
    <vuln_soft>
      <prod name="absolute_live_support_xe" vendor="xigla">
        <vers num="5.1" edition=":asp"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2764" seq="2008-2764" published="2008-06-18" modified="2017-08-07" severity="Low" CVSS_version="2.0" CVSS_score="3.5" CVSS_base_score="3.5" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="6.8" CVSS_vector="(AV:N/AC:M/Au:S/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in admin/search.asp in Xigla Absolute Live Support XE 5.1 allows remote authenticated administrators to inject arbitrary web script or HTML via unspecified vectors ("all fields").</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugreport.ir/index.php?/41">http://bugreport.ir/index.php?/41</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=121322052622903&amp;w=2">20080611 Xigla Multiple Products - Multiple Vulnerabilities</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3950">3950</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29672">29672</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43049">absolutelivesupport-search-xss(43049)</ref>
    </refs>
    <vuln_soft>
      <prod name="absolute_live_support_xe" vendor="xigla">
        <vers num="5.1" edition=":asp"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2765" seq="2008-2765" published="2008-06-18" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in gallery.asp in Xigla Absolute Image Gallery XE allows remote attackers to execute arbitrary SQL commands via the categoryid parameter in a viewimage action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugreport.ir/index.php?/41">http://bugreport.ir/index.php?/41</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=121322052622903&amp;w=2">20080611 Xigla Multiple Products - Multiple Vulnerabilities</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3950">3950</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29672">29672</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43052">absoluteimage-gallery-sql-injection(43052)</ref>
    </refs>
    <vuln_soft>
      <prod name="absolute_image_gallery_xe" vendor="xigla">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2766" seq="2008-2766" published="2008-06-18" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Xigla Absolute Image Gallery XE allows remote attackers to inject arbitrary web script or HTML via unspecified vectors in (1) admin/search.asp and (2) gallery.asp.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugreport.ir/index.php?/41">http://bugreport.ir/index.php?/41</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=121322052622903&amp;w=2">20080611 Xigla Multiple Products - Multiple Vulnerabilities</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3950">3950</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29672">29672</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43053">absoluteimage-gallery-search-xss(43053)</ref>
    </refs>
    <vuln_soft>
      <prod name="absolute_image_gallery_xe" vendor="xigla">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2767" seq="2008-2767" published="2008-06-18" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in search.asp in Xigla Poll Manager XE allows remote authenticated users with administrator role privileges to execute arbitrary SQL commands via the orderby parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugreport.ir/index.php?/41">http://bugreport.ir/index.php?/41</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=121322052622903&amp;w=2">20080611 Xigla Multiple Products - Multiple Vulnerabilities</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3950">3950</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29672">29672</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43055">absolutepoll-search-sql-injection(43055)</ref>
    </refs>
    <vuln_soft>
      <prod name="absolute_poll_manager_xe" vendor="xigla">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2768" seq="2008-2768" published="2008-06-18" modified="2017-08-07" severity="Low" CVSS_version="2.0" CVSS_score="3.5" CVSS_base_score="3.5" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="6.8" CVSS_vector="(AV:N/AC:M/Au:S/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in admin/search.asp in Xigla Poll Manager XE allows remote authenticated users with administrator role privileges to inject arbitrary web script or HTML via unspecified vectors ("all fields").</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugreport.ir/index.php?/41">http://bugreport.ir/index.php?/41</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=121322052622903&amp;w=2">20080611 Xigla Multiple Products - Multiple Vulnerabilities</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3950">3950</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29672">29672</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43054">absolutepoll-search-xss(43054)</ref>
    </refs>
    <vuln_soft>
      <prod name="absolute_poll_manager_xe" vendor="xigla">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2769" seq="2008-2769" published="2008-06-18" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in authentication/smf/smf.functions.php in Simple Machines phpRaider 1.0.6 and 1.0.7 allows remote attackers to execute arbitrary PHP code via a URL in the pConfig_auth[smf_path] parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://forums.phpraider.com/showthread.php?t=1087#v1_0_7b_-_May_29__2008">http://forums.phpraider.com/showthread.php?t=1087#v1_0_7b_-_May_29__2008</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3947">3947</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493275/100/0/threaded">20080611 phpRaider &lt;= v1.0.6,7 Maybe Other Versions Remote File include Vulnerable</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42996">phpraider-smffunctions-file-include(42996)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpraider" vendor="phpraider">
        <vers num="1.0.6"/>
        <vers num="1.0.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2770" seq="2008-2770" published="2008-06-18" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in MycroCMS 0.5, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the entry_id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29671">29671</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43002">mycrocms-entryid-sql-injection(43002)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5787">5787</ref>
    </refs>
    <vuln_soft>
      <prod name="mycrocms" vendor="mycrocms">
        <vers num="0.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2771" seq="2008-2771" published="2008-06-18" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The Node Hierarchy module 5.x before 5.x-1.1 and 6.x before 6.x-1.0 for Drupal does not properly implement access checks, which allows remote attackers with "access content" permissions to bypass restrictions and modify the node hierarchy via unspecified attack vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://drupal.org/node/269473" patch="1">http://drupal.org/node/269473</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29675" patch="1">29675</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43006">node-hierarchy-access-security-bypass(43006)</ref>
    </refs>
    <vuln_soft>
      <prod name="drupal" vendor="drupal">
        <vers num="5.0"/>
        <vers num="6.0"/>
      </prod>
      <prod name="node_hierarchy_module" vendor="drupal">
        <vers num="5"/>
        <vers num="6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2772" seq="2008-2772" published="2008-06-18" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The Magic Tabs module 5.x before 5.x-1.1 for Drupal allows remote attackers to execute arbitrary PHP code via unspecified URL arguments, possibly related to a missing "whitelist of callbacks."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://drupal.org/node/269321" patch="1">http://drupal.org/node/269321</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29682" patch="1">29682</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43020">magictabs-unspecified-code-execution(43020)</ref>
    </refs>
    <vuln_soft>
      <prod name="magic_tabs_module" vendor="drupal">
        <vers num="5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2773" seq="2008-2773" published="2008-06-18" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the Taxonomy Image module 5.x before 5.x-1.3 and 6.x before 6.x-1.3, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://drupal.org/node/269389" patch="1">http://drupal.org/node/269389</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29683" patch="1">29683</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43013">taxonomyimage-unspecified-xss(43013)</ref>
    </refs>
    <vuln_soft>
      <prod name="taxonomy_image_module" vendor="drupal">
        <vers num="5"/>
        <vers num="6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2774" seq="2008-2774" published="2008-06-19" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in item.php in CartKeeper CKGold Shopping Cart 2.5 and 2.7 allows remote attackers to execute arbitrary SQL commands via the category_id parameter, a different vector than CVE-2007-4736.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1677">ADV-2008-1677</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42646">ckgold-item-sql-injection(42646)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5678">5678</ref>
    </refs>
    <vuln_soft>
      <prod name="ckgold_shopping_cart" vendor="cartkeeper">
        <vers num="2.5"/>
        <vers num="2.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2775" seq="2008-2775" published="2008-06-19" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in search.asp in DT Centrepiece 4.0 allows remote attackers to execute arbitrary SQL commands via the searchFor parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29403">29403</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42663">dtcentrepiece-search-sql-injection(42663)</ref>
    </refs>
    <vuln_soft>
      <prod name="dt_centrepiece" vendor="dt_centrepiece">
        <vers num="4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2776" seq="2008-2776" published="2008-06-19" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in search.asp in DT Centrepiece 4.0 allows remote attackers to inject arbitrary web script or HTML via the searchFor parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29403">29403</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42662">dtcentrepiece-search-xss(42662)</ref>
    </refs>
    <vuln_soft>
      <prod name="dt_centrepiece" vendor="dt_centrepiece">
        <vers num="4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2777" seq="2008-2777" published="2008-06-19" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Ortro before 1.3.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.ortro.net/changelog#release_1.3.1_2008.05.27">http://www.ortro.net/changelog#release_1.3.1_2008.05.27</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1679/references">ADV-2008-1679</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42657">ortro-unspecified-xss(42657)</ref>
    </refs>
    <vuln_soft>
      <prod name="ortro" vendor="luca_corbo">
        <vers num="0.9.0"/>
        <vers num="0.9.1"/>
        <vers num="0.9.2"/>
        <vers num="1.0.0"/>
        <vers num="1.0.1"/>
        <vers num="1.1.0"/>
        <vers num="1.1.1"/>
        <vers num="1.1.2"/>
        <vers num="1.1.3"/>
        <vers num="1.1.4"/>
        <vers num="1.1.5"/>
        <vers num="1.1.6"/>
        <vers num="1.2.0"/>
        <vers num="1.2.0_beta"/>
        <vers num="1.2.0_rc1"/>
        <vers num="1.2.0_rc2"/>
        <vers num="1.2.1"/>
        <vers num="1.3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2778" seq="2008-2778" published="2008-06-19" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in inc/class_search.php in the Search System in RevokeBB 1.0 RC11 allows remote attackers to execute arbitrary SQL commands via the search parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29393" adv="1">29393</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1676/references">ADV-2008-1676</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42647">revokebb-search-sql-injection(42647)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5677">5677</ref>
    </refs>
    <vuln_soft>
      <prod name="revokebb" vendor="revokesoft">
        <vers num="1.0" edition="rc11"/>
        <vers num="1.0" edition="rc4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2779" seq="2008-2779" published="2008-06-19" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in GlobalSCAPE CuteFTP Home 8.2.0 Build 02.26.2008.4 and CuteFTP Pro 8.2.0 Build 04.01.2008.1 allows remote FTP servers to create or overwrite arbitrary files via ..\ (dot dot backslash) sequences in responses to LIST commands, a related issue to CVE-2002-1345.  NOTE: this can be leveraged for code execution by writing to a Startup folder.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://vuln.sg/cuteftp820-en.html">http://vuln.sg/cuteftp820-en.html</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020113">1020113</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1653/references">ADV-2008-1653</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42633">cuteftp-list-directory-traversal(42633)</ref>
    </refs>
    <vuln_soft>
      <prod name="cuteftp" vendor="globalscape">
        <vers num="8.2.0" edition=":home"/>
        <vers num="8.2.0" edition=":pro"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2780" seq="2008-2780" published="2008-06-19" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">The Anubis (aka Anubis+Ripe160) plugin before 1.3 for encrypt stores the unencrypted file's size in cleartext in the header of the encrypted file, which allows attackers to distinguish between encrypted data and random padding at the end of the encrypted file.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1663/references">ADV-2008-1663</ref>
      <ref source="CONFIRM" url="https://albinoloverats.net/index.php?option=com_content&amp;task=view&amp;id=60&amp;Itemid=2">https://albinoloverats.net/index.php?option=com_content&amp;task=view&amp;id=60&amp;Itemid=2</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42652">anubis-filesize-information-disclosure(42652)</ref>
    </refs>
    <vuln_soft>
      <prod name="anubis_plugin" vendor="albinoloverats">
        <vers num="1.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2781" seq="2008-2781" published="2008-06-19" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in DZOIC Handshakes 3.5 allows remote attackers to execute arbitrary SQL commands via the fname parameter in a members search action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3954">3954</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/492556/100/0/threaded">20080524 dzoic handshakes sql injection >> index.php on $fname</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29353">29353</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42639">handshakes-index-sql-injection(42639)</ref>
    </refs>
    <vuln_soft>
      <prod name="handshakes" vendor="dzoic">
        <vers num="3.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2782" seq="2008-2782" published="2008-06-19" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple directory traversal vulnerabilities in OtomiGenX 2.2 allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the lang parameter to (1) library_rss.php and (2) rss.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/forum/forum.php?forum_id=834373">http://sourceforge.net/forum/forum.php?forum_id=834373</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1678/references">ADV-2008-1678</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42665">otomigenx-lang-file-include(42665)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5680">5680</ref>
    </refs>
    <vuln_soft>
      <prod name="otomigenx" vendor="otomigenx">
        <vers num="2.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2783" seq="2008-2783" published="2008-06-19" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in Horde Groupware, Groupware Webmail Edition, and Kronolith allow remote attackers to inject arbitrary web script or HTML via the timestamp parameter to (1) week.php, (2) workweek.php, and (3) day.php; and (4) the horde parameter in the PATH_INFO to the default URI.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29365">29365</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42640">kronolith-groupware-multiple-xss(42640)</ref>
    </refs>
    <vuln_soft>
      <prod name="groupware" vendor="horde">
        <vers num=""/>
      </prod>
      <prod name="groupware_webmail_edition" vendor="horde">
        <vers num=""/>
      </prod>
      <prod name="kronolith" vendor="horde">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2784" seq="2008-2784" published="2008-06-19" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:P)">
    <desc>
      <descript source="cve">The smtp_filter function in spamdyke before 3.1.8 does not filter RCPT commands after encountering the first DATA command, which allows remote attackers to use the server as an open mail relay by sending RCPT commands with invalid recipients, followed by a DATA command, followed by arbitrary RCPT commands and a second DATA command.</descript>
    </desc>
    <loss_types>
      <avail/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.spamdyke.org/documentation/Changelog.txt">http://www.spamdyke.org/documentation/Changelog.txt</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1684/references">ADV-2008-1684</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/42658">spamdyke-smtpfilter-security-bypass(42658)</ref>
    </refs>
    <vuln_soft>
      <prod name="spamdyke" vendor="spamdyke">
        <vers num="3.0.0"/>
        <vers num="3.0.1"/>
        <vers num="3.1.0"/>
        <vers num="3.1.1"/>
        <vers num="3.1.2"/>
        <vers num="3.1.3"/>
        <vers num="3.1.4"/>
        <vers num="3.1.5"/>
        <vers num="3.1.6"/>
        <vers num="3.1.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2785" seq="2008-2785" published="2008-06-19" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Mozilla Firefox before 2.0.0.16 and 3.x before 3.0.1, Thunderbird before 2.0.0.16, and SeaMonkey before 1.1.11 use an incorrect integer data type as a CSS object reference counter in the CSSValue array (aka nsCSSValue:Array) data structure, which allows remote attackers to execute arbitrary code via a large number of references to a common CSS object, leading to a counter overflow and a free of in-use memory, aka ZDI-CAN-349.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://blog.mozilla.com/security/2008/06/18/new-security-issue-under-investigation/">http://blog.mozilla.com/security/2008/06/18/new-security-issue-under-investigation/</ref>
      <ref source="MISC" url="http://dvlabs.tippingpoint.com/blog/2008/06/18/vulnerability-in-mozilla-firefox-30">http://dvlabs.tippingpoint.com/blog/2008/06/18/vulnerability-in-mozilla-firefox-30</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2008-0616.html">RHSA-2008:0616</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200808-03.xml">GLSA-200808-03</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.410484">SSA:2008-210-05</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1">256408</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0238">http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0238</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1614">DSA-1614</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1615">DSA-1615</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1621">DSA-1621</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2009/dsa-1697">DSA-1697</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:148">MDVSA-2008:148</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:155">MDVSA-2008:155</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/security/announce/2008/mfsa2008-34.html" adv="1" patch="1">http://www.mozilla.org/security/announce/2008/mfsa2008-34.html</ref>
      <ref source="CONFIRM" url="http://www.novell.com/support/search.do?cmd=displayKC&amp;docType=kc&amp;externalId=InfoDocument-patchbuilder-readme5031400">http://www.novell.com/support/search.do?cmd=displayKC&amp;docType=kc&amp;externalId=InfoDocument-patchbuilder-readme5031400</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0597.html">RHSA-2008:0597</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0598.html">RHSA-2008:0598</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0599.html">RHSA-2008:0599</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/494504/100/0/threaded">20080717 ZDI-08-044: Mozilla Firefox CSSValue Array Memory Corruption Vulnerability</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/494860/100/0/threaded">20080729 rPSA-2008-0238-1 firefox</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29802">29802</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020336">1020336</ref>
      <ref source="SLACKWARE" url="http://www.slackware.org/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.380767">SSA:2008-198-02</ref>
      <ref source="SLACKWARE" url="http://www.slackware.org/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.380974">SSA:2008-198-01</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-623-1">USN-623-1</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-626-1">USN-626-1</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-626-2">USN-626-2</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-629-1">USN-629-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1873">ADV-2008-1873</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/0977">ADV-2009-0977</ref>
      <ref source="MISC" url="http://www.zerodayinitiative.com/advisories/ZDI-08-044/">http://www.zerodayinitiative.com/advisories/ZDI-08-044/</ref>
      <ref source="CONFIRM" url="https://bugzilla.mozilla.org/show_bug.cgi?id=440230">https://bugzilla.mozilla.org/show_bug.cgi?id=440230</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43167">firefox-unspecified-code-execution(43167)</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2683">https://issues.rpath.com/browse/RPL-2683</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9900">oval:org.mitre.oval:def:9900</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00125.html">FEDORA-2008-6737</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00144.html">FEDORA-2008-6706</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00667.html">FEDORA-2008-6517</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00672.html">FEDORA-2008-6519</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="2.0"/>
        <vers num="2.0.0.1"/>
        <vers num="2.0.0.2"/>
        <vers num="2.0.0.3"/>
        <vers num="2.0.0.4"/>
        <vers num="2.0.0.5"/>
        <vers num="2.0.0.6"/>
        <vers num="2.0.0.7"/>
        <vers num="2.0.0.8"/>
        <vers num="2.0.0.9"/>
        <vers num="2.0.0.10"/>
        <vers num="2.0.0.11"/>
        <vers num="2.0.0.12"/>
        <vers num="2.0.0.13"/>
        <vers num="2.0.0.14"/>
        <vers num="2.0.0.15" prev="1"/>
        <vers num="3.0"/>
      </prod>
      <prod name="seamonkey" vendor="mozilla">
        <vers num="1.0" edition="alpha"/>
        <vers num="1.0" edition="beta"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.4"/>
        <vers num="1.0.5"/>
        <vers num="1.0.6"/>
        <vers num="1.0.7"/>
        <vers num="1.0.8"/>
        <vers num="1.0.9"/>
        <vers num="1.1" edition="alpha"/>
        <vers num="1.1" edition="beta"/>
        <vers num="1.1.1"/>
        <vers num="1.1.2"/>
        <vers num="1.1.3"/>
        <vers num="1.1.4"/>
        <vers num="1.1.5"/>
        <vers num="1.1.6"/>
        <vers num="1.1.7"/>
        <vers num="1.1.8"/>
        <vers num="1.1.9"/>
        <vers num="1.1.10" prev="1"/>
      </prod>
      <prod name="thunderbird" vendor="mozilla">
        <vers num="0.1"/>
        <vers num="0.2"/>
        <vers num="0.3"/>
        <vers num="0.4"/>
        <vers num="0.5"/>
        <vers num="0.6"/>
        <vers num="0.7"/>
        <vers num="0.8"/>
        <vers num="0.9"/>
        <vers num="1.0"/>
        <vers num="1.0.2"/>
        <vers num="1.0.5"/>
        <vers num="1.0.6"/>
        <vers num="1.0.7"/>
        <vers num="1.0.8"/>
        <vers num="1.5"/>
        <vers num="1.5.0.2"/>
        <vers num="1.5.0.4"/>
        <vers num="1.5.0.5"/>
        <vers num="1.5.0.7"/>
        <vers num="1.5.0.8"/>
        <vers num="1.5.0.9"/>
        <vers num="1.5.0.10"/>
        <vers num="1.5.0.12"/>
        <vers num="1.5.0.13"/>
        <vers num="1.5.0.14"/>
        <vers num="2.0.0.0"/>
        <vers num="2.0.0.4"/>
        <vers num="2.0.0.5"/>
        <vers num="2.0.0.6"/>
        <vers num="2.0.0.9"/>
        <vers num="2.0.0.12"/>
        <vers num="2.0.0.14" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2786" seq="2008-2786" published="2008-06-19" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in Firefox 3.0 and 2.0.x has unknown impact and attack vectors.  NOTE: due to lack of details as of 20080619, it is not clear whether this is the same issue as CVE-2008-2785.  A CVE identifier has been assigned for tracking purposes.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2008-June/062832.html">20080618 Coming soon : Firefox 3 Release overflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29794">29794</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43317">mozilla-firefox-unspecified-bo(43317)</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="2.0"/>
        <vers num="3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2787" seq="2008-2787" published="2008-06-20" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in out.php in OpenDocMan 1.2.5 allows remote attackers to inject arbitrary web script or HTML via the last_message parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3948">3948</ref>
      <ref source="MISC" url="http://www.s21sec.com/avisos/s21sec-044-en.txt">http://www.s21sec.com/avisos/s21sec-044-en.txt</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/493390/100/0/threaded">20080617 S21SEC-044-en:OpenDocMan Cross Site Scripting (XSS)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29765" patch="1">29765</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020300">1020300</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43135">opendocman-out-xss(43135)</ref>
    </refs>
    <vuln_soft>
      <prod name="opendocman" vendor="opendocman">
        <vers num="1.2.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2788" seq="2008-2788" published="2008-06-20" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php in OpenDocMan 1.2.5 allows remote attackers to inject arbitrary web script or HTML via the redirection parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/tracker/index.php?func=detail&amp;aid=1975163&amp;group_id=69505&amp;atid=524753">http://sourceforge.net/tracker/index.php?func=detail&amp;aid=1975163&amp;group_id=69505&amp;atid=524753</ref>
    </refs>
    <vuln_soft>
      <prod name="opendocman" vendor="opendocman">
        <vers num="1.2.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2789" seq="2008-2789" published="2008-06-20" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in pages/index.php in BASIC-CMS allows remote attackers to execute arbitrary SQL commands via the page_id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://packetstormsecurity.org/1002-exploits/basiccms-sqlxss.txt">http://packetstormsecurity.org/1002-exploits/basiccms-sqlxss.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29771">29771</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43140">basiccms-index-sql-injection(43140)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5836">5836</ref>
    </refs>
    <vuln_soft>
      <prod name="basic-cms" vendor="basic-cms">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2790" seq="2008-2790" published="2008-06-20" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in detail.php in MountainGrafix easyTrade 2.x allows remote attackers to execute arbitrary SQL commands via the id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://shop.mountaingrafix.at/media/patches/etv_patch_2_3_2.zip" patch="1">http://shop.mountaingrafix.at/media/patches/etv_patch_2_3_2.zip</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29775">29775</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43152">easytrade-detail-sql-injection(43152)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5840">5840</ref>
    </refs>
    <vuln_soft>
      <prod name="easytrade" vendor="mountaingrafix">
        <vers num="2.x"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2791" seq="2008-2791" published="2008-06-20" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in product.detail.php in Kalptaru Infotech Comparison Engine Power Script 1.0 allows remote attackers to execute arbitrary SQL commands via the id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29768">29768</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43138">engine-productdetail-sql-injection(43138)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5834">5834</ref>
    </refs>
    <vuln_soft>
      <prod name="comparison_engine_power_script" vendor="kalptaru_infotech">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2792" seq="2008-2792" published="2008-06-20" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in eroCMS 1.4 and earlier allows remote attackers to execute arbitrary SQL commands via the site parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29781">29781</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43157">erocms-index-sql-injection(43157)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5846">5846</ref>
    </refs>
    <vuln_soft>
      <prod name="erocms" vendor="erocms">
        <vers num="1.4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2793" seq="2008-2793" published="2008-06-20" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in group_posts.php in ClipShare before 3.0.1 allows remote attackers to execute arbitrary SQL commands via the tid parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29779">29779</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43142">clipshare-groupposts-sql-injection(43142)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5839">5839</ref>
    </refs>
    <vuln_soft>
      <prod name="clipshare" vendor="clip-share">
        <vers num="3.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2794" seq="2008-2794" published="2008-06-20" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.1" CVSS_vector="(AV:L/AC:L/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the GUI in Symantec Altiris Notification Server Agent 6.x before 6.0 SP3 R8 allows local users to gain privileges via unknown attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://securityresponse.symantec.com/avcenter/security/Content/2008.06.17.html" patch="1">http://securityresponse.symantec.com/avcenter/security/Content/2008.06.17.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29708">29708</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020304">1020304</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1861/references">ADV-2008-1861</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43154">symantec-ans-agent-privilege-escalation(43154)</ref>
    </refs>
    <vuln_soft>
      <prod name="altiris_notification_server" vendor="symantec">
        <vers num="6.0" edition=":sp1"/>
        <vers num="6.0" edition="sp2"/>
        <vers num="6.0" edition="sp3"/>
        <vers num="6.0" edition="sp3_r7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2795" seq="2008-2795" published="2008-06-20" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in the FTP and SFTP clients in IDM Computer Solutions Inc UltraEdit 14.00b allows remote FTP servers to create or overwrite arbitrary files via a .. (dot dot) or a ..\ (dot dot backslash) in a response to a LIST command.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://vuln.sg/ultraedit1400b-en.html">http://vuln.sg/ultraedit1400b-en.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29784">29784</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1864/references">ADV-2008-1864</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43149">ultraedit-list-directory-traversal(43149)</ref>
    </refs>
    <vuln_soft>
      <prod name="ultraedit" vendor="idm_computer_solutions_inc">
        <vers num="14.00b"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2796" seq="2008-2796" published="2008-06-20" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in FreeCMS 0.2 allows remote attackers to execute arbitrary SQL commands via the page parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3973">3973</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29773">29773</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43141">freecms-index-sql-injection(43141)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5838">5838</ref>
    </refs>
    <vuln_soft>
      <prod name="freecms" vendor="freecms.us">
        <vers num="0.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2797" seq="2008-2797" published="2008-06-20" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in MainLayout.do in ManageEngine OpUtils 5.0 allows remote attackers to inject arbitrary web script or HTML via the hostName parameter, when viewing an SNMP graph.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29785">29785</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43158">optutils-mainlayout-xss(43158)</ref>
    </refs>
    <vuln_soft>
      <prod name="oputils" vendor="manageengine">
        <vers num="5.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2798" seq="2008-2798" published="2008-07-07" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.15, Thunderbird 2.0.0.14 and earlier, and SeaMonkey before 1.1.10 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via unknown vectors related to the layout engine.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00004.html">SUSE-SA:2008:034</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2008-0616.html">RHSA-2008:0616</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200808-03.xml">GLSA-200808-03</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.383152">SSA:2008-191-03</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.384911">SSA:2008-191</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.410484">SSA:2008-210-05</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0216">http://wiki.rpath.com/Advisories:rPSA-2008-0216</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1607">DSA-1607</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1615">DSA-1615</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1621">DSA-1621</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2009/dsa-1697">DSA-1697</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:136">MDVSA-2008:136</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:155">MDVSA-2008:155</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.15">http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.15</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/security/announce/2008/mfsa2008-21.html">http://www.mozilla.org/security/announce/2008/mfsa2008-21.html</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0547.html">RHSA-2008:0547</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0549.html">RHSA-2008:0549</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0569.html">RHSA-2008:0569</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/494080/100/0/threaded">20080708 rPSA-2008-0216-1 firefox</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30038">30038</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020419">1020419</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-619-1">USN-619-1</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-629-1">USN-629-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1993/references">ADV-2008-1993</ref>
      <ref source="CONFIRM" url="https://bugzilla.mozilla.org/show_bug.cgi?id=378027">https://bugzilla.mozilla.org/show_bug.cgi?id=378027</ref>
      <ref source="CONFIRM" url="https://bugzilla.mozilla.org/show_bug.cgi?id=391178">https://bugzilla.mozilla.org/show_bug.cgi?id=391178</ref>
      <ref source="CONFIRM" url="https://bugzilla.mozilla.org/show_bug.cgi?id=430814">https://bugzilla.mozilla.org/show_bug.cgi?id=430814</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2646">https://issues.rpath.com/browse/RPL-2646</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10087">oval:org.mitre.oval:def:10087</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00125.html">FEDORA-2008-6737</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00144.html">FEDORA-2008-6706</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00207.html">FEDORA-2008-6127</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00288.html">FEDORA-2008-6193</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00295.html">FEDORA-2008-6196</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="2.0"/>
        <vers num="2.0.0.1"/>
        <vers num="2.0.0.2"/>
        <vers num="2.0.0.3"/>
        <vers num="2.0.0.4"/>
        <vers num="2.0.0.5"/>
        <vers num="2.0.0.6"/>
        <vers num="2.0.0.7"/>
        <vers num="2.0.0.8"/>
        <vers num="2.0.0.9"/>
        <vers num="2.0.0.10"/>
        <vers num="2.0.0.11"/>
        <vers num="2.0.0.12"/>
        <vers num="2.0.0.13"/>
        <vers num="2.0.0.14" prev="1"/>
      </prod>
      <prod name="seamonkey" vendor="mozilla">
        <vers num="1.1"/>
        <vers num="1.1.2"/>
        <vers num="1.1.3"/>
        <vers num="1.1.4"/>
        <vers num="1.1.5"/>
        <vers num="1.1.6"/>
        <vers num="1.1.7"/>
        <vers num="1.1.8"/>
        <vers num="1.1.9" prev="1"/>
      </prod>
      <prod name="thunderbird" vendor="mozilla">
        <vers num="2.0.0.0"/>
        <vers num="2.0.0.1"/>
        <vers num="2.0.0.2"/>
        <vers num="2.0.0.3"/>
        <vers num="2.0.0.4"/>
        <vers num="2.0.0.5"/>
        <vers num="2.0.0.6"/>
        <vers num="2.0.0.8"/>
        <vers num="2.0.0.9"/>
        <vers num="2.0.0.11"/>
        <vers num="2.0.0.12"/>
        <vers num="2.0.0.13"/>
        <vers num="2.0.0.14" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2799" seq="2008-2799" published="2008-07-07" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.15, Thunderbird 2.0.0.14 and earlier, and SeaMonkey before 1.1.10 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via unknown vectors related to the JavaScript engine.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00004.html">SUSE-SA:2008:034</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2008-0616.html">RHSA-2008:0616</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200808-03.xml">GLSA-200808-03</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.383152">SSA:2008-191-03</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.384911">SSA:2008-191</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.410484">SSA:2008-210-05</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0216">http://wiki.rpath.com/Advisories:rPSA-2008-0216</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1607">DSA-1607</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1615">DSA-1615</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1621">DSA-1621</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2009/dsa-1697">DSA-1697</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:136">MDVSA-2008:136</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:155">MDVSA-2008:155</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.15">http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.15</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/security/announce/2008/mfsa2008-21.html">http://www.mozilla.org/security/announce/2008/mfsa2008-21.html</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0547.html">RHSA-2008:0547</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0549.html">RHSA-2008:0549</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0569.html">RHSA-2008:0569</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/494080/100/0/threaded">20080708 rPSA-2008-0216-1 firefox</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30038">30038</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020419">1020419</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-619-1">USN-619-1</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-629-1">USN-629-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1993/references">ADV-2008-1993</ref>
      <ref source="CONFIRM" url="https://bugzilla.mozilla.org/show_bug.cgi?id=356378">https://bugzilla.mozilla.org/show_bug.cgi?id=356378</ref>
      <ref source="CONFIRM" url="https://bugzilla.mozilla.org/show_bug.cgi?id=380833">https://bugzilla.mozilla.org/show_bug.cgi?id=380833</ref>
      <ref source="CONFIRM" url="https://bugzilla.mozilla.org/show_bug.cgi?id=418128">https://bugzilla.mozilla.org/show_bug.cgi?id=418128</ref>
      <ref source="CONFIRM" url="https://bugzilla.mozilla.org/show_bug.cgi?id=431409">https://bugzilla.mozilla.org/show_bug.cgi?id=431409</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2646">https://issues.rpath.com/browse/RPL-2646</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10743">oval:org.mitre.oval:def:10743</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00125.html">FEDORA-2008-6737</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00144.html">FEDORA-2008-6706</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00207.html">FEDORA-2008-6127</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00288.html">FEDORA-2008-6193</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00295.html">FEDORA-2008-6196</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="2.0"/>
        <vers num="2.0.0.1"/>
        <vers num="2.0.0.2"/>
        <vers num="2.0.0.3"/>
        <vers num="2.0.0.4"/>
        <vers num="2.0.0.5"/>
        <vers num="2.0.0.6"/>
        <vers num="2.0.0.7"/>
        <vers num="2.0.0.8"/>
        <vers num="2.0.0.9"/>
        <vers num="2.0.0.10"/>
        <vers num="2.0.0.11"/>
        <vers num="2.0.0.12"/>
        <vers num="2.0.0.13"/>
        <vers num="2.0.0.14" prev="1"/>
      </prod>
      <prod name="seamonkey" vendor="mozilla">
        <vers num="1.1"/>
        <vers num="1.1.2"/>
        <vers num="1.1.3"/>
        <vers num="1.1.4"/>
        <vers num="1.1.5"/>
        <vers num="1.1.6"/>
        <vers num="1.1.7"/>
        <vers num="1.1.8"/>
        <vers num="1.1.9" prev="1"/>
      </prod>
      <prod name="thunderbird" vendor="mozilla">
        <vers num="2.0.0.0"/>
        <vers num="2.0.0.1"/>
        <vers num="2.0.0.2"/>
        <vers num="2.0.0.3"/>
        <vers num="2.0.0.4"/>
        <vers num="2.0.0.5"/>
        <vers num="2.0.0.6"/>
        <vers num="2.0.0.8"/>
        <vers num="2.0.0.9"/>
        <vers num="2.0.0.11"/>
        <vers num="2.0.0.12"/>
        <vers num="2.0.0.13"/>
        <vers num="2.0.0.14" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2800" seq="2008-2800" published="2008-07-07" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 allow remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via vectors involving (1) an event handler attached to an outer window, (2) a SCRIPT element in an unloaded document, or (3) the onreadystatechange handler in conjunction with an XMLHttpRequest.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00004.html">SUSE-SA:2008:034</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2008-0616.html">RHSA-2008:0616</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200808-03.xml">GLSA-200808-03</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.383152">SSA:2008-191-03</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.384911">SSA:2008-191</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1">256408</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0216">http://wiki.rpath.com/Advisories:rPSA-2008-0216</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1607">DSA-1607</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1615">DSA-1615</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2009/dsa-1697">DSA-1697</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:136">MDVSA-2008:136</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.15">http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.15</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/security/announce/2008/mfsa2008-22.html">http://www.mozilla.org/security/announce/2008/mfsa2008-22.html</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0547.html">RHSA-2008:0547</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0549.html">RHSA-2008:0549</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0569.html">RHSA-2008:0569</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/494080/100/0/threaded">20080708 rPSA-2008-0216-1 firefox</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30038">30038</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020419">1020419</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-619-1">USN-619-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1993/references">ADV-2008-1993</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/0977">ADV-2009-0977</ref>
      <ref source="CONFIRM" url="https://bugzilla.mozilla.org/show_bug.cgi?id=428672">https://bugzilla.mozilla.org/show_bug.cgi?id=428672</ref>
      <ref source="CONFIRM" url="https://bugzilla.mozilla.org/show_bug.cgi?id=432591">https://bugzilla.mozilla.org/show_bug.cgi?id=432591</ref>
      <ref source="CONFIRM" url="https://bugzilla.mozilla.org/show_bug.cgi?id=433328">https://bugzilla.mozilla.org/show_bug.cgi?id=433328</ref>
      <ref source="CONFIRM" url="https://bugzilla.mozilla.org/show_bug.cgi?id=439035">https://bugzilla.mozilla.org/show_bug.cgi?id=439035</ref>
      <ref source="CONFIRM" url="https://bugzilla.mozilla.org/show_bug.cgi?id=440308">https://bugzilla.mozilla.org/show_bug.cgi?id=440308</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2646">https://issues.rpath.com/browse/RPL-2646</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9386">oval:org.mitre.oval:def:9386</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00207.html">FEDORA-2008-6127</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00288.html">FEDORA-2008-6193</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00295.html">FEDORA-2008-6196</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="2.0"/>
        <vers num="2.0.0.1"/>
        <vers num="2.0.0.2"/>
        <vers num="2.0.0.3"/>
        <vers num="2.0.0.4"/>
        <vers num="2.0.0.5"/>
        <vers num="2.0.0.6"/>
        <vers num="2.0.0.7"/>
        <vers num="2.0.0.8"/>
        <vers num="2.0.0.9"/>
        <vers num="2.0.0.10"/>
        <vers num="2.0.0.11"/>
        <vers num="2.0.0.12"/>
        <vers num="2.0.0.13"/>
        <vers num="2.0.0.14" prev="1"/>
      </prod>
      <prod name="seamonkey" vendor="mozilla">
        <vers num="1.1"/>
        <vers num="1.1.2"/>
        <vers num="1.1.3"/>
        <vers num="1.1.4"/>
        <vers num="1.1.5"/>
        <vers num="1.1.6"/>
        <vers num="1.1.7"/>
        <vers num="1.1.8"/>
        <vers num="1.1.9" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2801" seq="2008-2801" published="2008-07-07" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 do not properly implement JAR signing, which allows remote attackers to execute arbitrary code via (1) injection of JavaScript into documents within a JAR archive or (2) a JAR archive that uses relative URLs to JavaScript files.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00004.html">SUSE-SA:2008:034</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2008-0616.html">RHSA-2008:0616</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200808-03.xml">GLSA-200808-03</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.383152">SSA:2008-191-03</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.384911">SSA:2008-191</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1">256408</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0216">http://wiki.rpath.com/Advisories:rPSA-2008-0216</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1607">DSA-1607</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1615">DSA-1615</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2009/dsa-1697">DSA-1697</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:136">MDVSA-2008:136</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.15">http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.15</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/security/announce/2008/mfsa2008-23.html">http://www.mozilla.org/security/announce/2008/mfsa2008-23.html</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0547.html">RHSA-2008:0547</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0549.html">RHSA-2008:0549</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0569.html">RHSA-2008:0569</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/494080/100/0/threaded">20080708 rPSA-2008-0216-1 firefox</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30038">30038</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020419">1020419</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-619-1">USN-619-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1993/references">ADV-2008-1993</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/0977">ADV-2009-0977</ref>
      <ref source="CONFIRM" url="https://bugzilla.mozilla.org/show_bug.cgi?id=418996">https://bugzilla.mozilla.org/show_bug.cgi?id=418996</ref>
      <ref source="CONFIRM" url="https://bugzilla.mozilla.org/show_bug.cgi?id=424188">https://bugzilla.mozilla.org/show_bug.cgi?id=424188</ref>
      <ref source="CONFIRM" url="https://bugzilla.mozilla.org/show_bug.cgi?id=424426">https://bugzilla.mozilla.org/show_bug.cgi?id=424426</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2646">https://issues.rpath.com/browse/RPL-2646</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11810">oval:org.mitre.oval:def:11810</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00207.html">FEDORA-2008-6127</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00288.html">FEDORA-2008-6193</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00295.html">FEDORA-2008-6196</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="2.0"/>
        <vers num="2.0.0.1"/>
        <vers num="2.0.0.2"/>
        <vers num="2.0.0.3"/>
        <vers num="2.0.0.4"/>
        <vers num="2.0.0.5"/>
        <vers num="2.0.0.6"/>
        <vers num="2.0.0.7"/>
        <vers num="2.0.0.8"/>
        <vers num="2.0.0.9"/>
        <vers num="2.0.0.10"/>
        <vers num="2.0.0.11"/>
        <vers num="2.0.0.12"/>
        <vers num="2.0.0.13"/>
        <vers num="2.0.0.14" prev="1"/>
      </prod>
      <prod name="seamonkey" vendor="mozilla">
        <vers num="1.1"/>
        <vers num="1.1.2"/>
        <vers num="1.1.3"/>
        <vers num="1.1.4"/>
        <vers num="1.1.5"/>
        <vers num="1.1.6"/>
        <vers num="1.1.7"/>
        <vers num="1.1.8"/>
        <vers num="1.1.9" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2802" seq="2008-2802" published="2008-07-07" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Mozilla Firefox before 2.0.0.15, Thunderbird 2.0.0.14 and earlier, and SeaMonkey before 1.1.10 allow remote attackers to execute arbitrary code via an XUL document that includes a script from a chrome: URI that points to a fastload file, related to this file's "privilege level."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00004.html">SUSE-SA:2008:034</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2008-0616.html">RHSA-2008:0616</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200808-03.xml">GLSA-200808-03</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.383152">SSA:2008-191-03</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.384911">SSA:2008-191</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.410484">SSA:2008-210-05</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1">256408</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0216">http://wiki.rpath.com/Advisories:rPSA-2008-0216</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1607">DSA-1607</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1615">DSA-1615</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1621">DSA-1621</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2009/dsa-1697">DSA-1697</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:136">MDVSA-2008:136</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:155">MDVSA-2008:155</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.15">http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.15</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/security/announce/2008/mfsa2008-24.html">http://www.mozilla.org/security/announce/2008/mfsa2008-24.html</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0547.html">RHSA-2008:0547</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0549.html">RHSA-2008:0549</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0569.html">RHSA-2008:0569</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/494080/100/0/threaded">20080708 rPSA-2008-0216-1 firefox</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30038">30038</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020419">1020419</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-619-1">USN-619-1</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-629-1">USN-629-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1993/references">ADV-2008-1993</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/0977">ADV-2009-0977</ref>
      <ref source="CONFIRM" url="https://bugzilla.mozilla.org/show_bug.cgi?id=419846">https://bugzilla.mozilla.org/show_bug.cgi?id=419846</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2646">https://issues.rpath.com/browse/RPL-2646</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11121">oval:org.mitre.oval:def:11121</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00125.html">FEDORA-2008-6737</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00144.html">FEDORA-2008-6706</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00207.html">FEDORA-2008-6127</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00288.html">FEDORA-2008-6193</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00295.html">FEDORA-2008-6196</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="2.0"/>
        <vers num="2.0.0.1"/>
        <vers num="2.0.0.2"/>
        <vers num="2.0.0.3"/>
        <vers num="2.0.0.4"/>
        <vers num="2.0.0.5"/>
        <vers num="2.0.0.6"/>
        <vers num="2.0.0.7"/>
        <vers num="2.0.0.8"/>
        <vers num="2.0.0.9"/>
        <vers num="2.0.0.10"/>
        <vers num="2.0.0.11"/>
        <vers num="2.0.0.12"/>
        <vers num="2.0.0.13"/>
        <vers num="2.0.0.14" prev="1"/>
      </prod>
      <prod name="seamonkey" vendor="mozilla">
        <vers num="1.1"/>
        <vers num="1.1.2"/>
        <vers num="1.1.3"/>
        <vers num="1.1.4"/>
        <vers num="1.1.5"/>
        <vers num="1.1.6"/>
        <vers num="1.1.7"/>
        <vers num="1.1.8"/>
        <vers num="1.1.9" prev="1"/>
      </prod>
      <prod name="thunderbird" vendor="mozilla">
        <vers num="2.0.0.0"/>
        <vers num="2.0.0.1"/>
        <vers num="2.0.0.2"/>
        <vers num="2.0.0.3"/>
        <vers num="2.0.0.4"/>
        <vers num="2.0.0.5"/>
        <vers num="2.0.0.6"/>
        <vers num="2.0.0.8"/>
        <vers num="2.0.0.9"/>
        <vers num="2.0.0.11"/>
        <vers num="2.0.0.12"/>
        <vers num="2.0.0.13"/>
        <vers num="2.0.0.14" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2803" seq="2008-2803" published="2008-07-07" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The mozIJSSubScriptLoader.LoadScript function in Mozilla Firefox before 2.0.0.15, Thunderbird 2.0.0.14 and earlier, and SeaMonkey before 1.1.10 does not apply XPCNativeWrappers to scripts loaded from (1) file: URIs, (2) data: URIs, or (3) certain non-canonical chrome: URIs, which allows remote attackers to execute arbitrary code via vectors involving third-party add-ons.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00004.html">SUSE-SA:2008:034</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2008-0616.html">RHSA-2008:0616</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200808-03.xml">GLSA-200808-03</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.383152">SSA:2008-191-03</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.384911">SSA:2008-191</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.410484">SSA:2008-210-05</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1">256408</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0216">http://wiki.rpath.com/Advisories:rPSA-2008-0216</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1607">DSA-1607</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1615">DSA-1615</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1621">DSA-1621</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2009/dsa-1697">DSA-1697</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:136">MDVSA-2008:136</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:155">MDVSA-2008:155</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.15">http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.15</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/security/announce/2008/mfsa2008-25.html">http://www.mozilla.org/security/announce/2008/mfsa2008-25.html</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0547.html">RHSA-2008:0547</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0549.html">RHSA-2008:0549</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0569.html">RHSA-2008:0569</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/494080/100/0/threaded">20080708 rPSA-2008-0216-1 firefox</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30038">30038</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020419">1020419</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-619-1">USN-619-1</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-629-1">USN-629-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1993/references">ADV-2008-1993</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/0977">ADV-2009-0977</ref>
      <ref source="CONFIRM" url="https://bugzilla.mozilla.org/show_bug.cgi?id=418356">https://bugzilla.mozilla.org/show_bug.cgi?id=418356</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2646">https://issues.rpath.com/browse/RPL-2646</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10747">oval:org.mitre.oval:def:10747</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00125.html">FEDORA-2008-6737</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00144.html">FEDORA-2008-6706</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00207.html">FEDORA-2008-6127</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00288.html">FEDORA-2008-6193</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00295.html">FEDORA-2008-6196</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="2.0"/>
        <vers num="2.0.0.1"/>
        <vers num="2.0.0.2"/>
        <vers num="2.0.0.3"/>
        <vers num="2.0.0.4"/>
        <vers num="2.0.0.5"/>
        <vers num="2.0.0.6"/>
        <vers num="2.0.0.7"/>
        <vers num="2.0.0.8"/>
        <vers num="2.0.0.9"/>
        <vers num="2.0.0.10"/>
        <vers num="2.0.0.11"/>
        <vers num="2.0.0.12"/>
        <vers num="2.0.0.13"/>
        <vers num="2.0.0.14" prev="1"/>
      </prod>
      <prod name="seamonkey" vendor="mozilla">
        <vers num="1.1"/>
        <vers num="1.1.2"/>
        <vers num="1.1.3"/>
        <vers num="1.1.4"/>
        <vers num="1.1.5"/>
        <vers num="1.1.6"/>
        <vers num="1.1.7"/>
        <vers num="1.1.8"/>
        <vers num="1.1.9" prev="1"/>
      </prod>
      <prod name="thunderbird" vendor="mozilla">
        <vers num="2.0.0.0"/>
        <vers num="2.0.0.1"/>
        <vers num="2.0.0.2"/>
        <vers num="2.0.0.3"/>
        <vers num="2.0.0.4"/>
        <vers num="2.0.0.5"/>
        <vers num="2.0.0.6"/>
        <vers num="2.0.0.8"/>
        <vers num="2.0.0.9"/>
        <vers num="2.0.0.11"/>
        <vers num="2.0.0.12"/>
        <vers num="2.0.0.13"/>
        <vers num="2.0.0.14" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2804" seq="2008-2804" published="2009-03-26" modified="2009-03-26" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2008-2800.  Reason: This candidate is a reservation duplicate of CVE-2008-2800.  Notes: All CVE users should reference CVE-2008-2800 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2008-2805" seq="2008-2805" published="2008-07-07" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 allow remote attackers to force the upload of arbitrary local files from a client computer via vectors involving originalTarget and DOM Range.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00004.html">SUSE-SA:2008:034</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2008-0616.html">RHSA-2008:0616</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200808-03.xml">GLSA-200808-03</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.383152">SSA:2008-191-03</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.384911">SSA:2008-191</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1">256408</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0216">http://wiki.rpath.com/Advisories:rPSA-2008-0216</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1607">DSA-1607</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1615">DSA-1615</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2009/dsa-1697">DSA-1697</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:136">MDVSA-2008:136</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.15">http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.15</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/security/announce/2008/mfsa2008-27.html">http://www.mozilla.org/security/announce/2008/mfsa2008-27.html</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0547.html">RHSA-2008:0547</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0549.html">RHSA-2008:0549</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0569.html">RHSA-2008:0569</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/494080/100/0/threaded">20080708 rPSA-2008-0216-1 firefox</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30038">30038</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020419">1020419</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-619-1">USN-619-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1993/references">ADV-2008-1993</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/0977">ADV-2009-0977</ref>
      <ref source="CONFIRM" url="https://bugzilla.mozilla.org/show_bug.cgi?id=423541">https://bugzilla.mozilla.org/show_bug.cgi?id=423541</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2646">https://issues.rpath.com/browse/RPL-2646</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10143">oval:org.mitre.oval:def:10143</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00207.html">FEDORA-2008-6127</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00288.html">FEDORA-2008-6193</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00295.html">FEDORA-2008-6196</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="2.0"/>
        <vers num="2.0.0.1"/>
        <vers num="2.0.0.2"/>
        <vers num="2.0.0.3"/>
        <vers num="2.0.0.4"/>
        <vers num="2.0.0.5"/>
        <vers num="2.0.0.6"/>
        <vers num="2.0.0.7"/>
        <vers num="2.0.0.8"/>
        <vers num="2.0.0.9"/>
        <vers num="2.0.0.10"/>
        <vers num="2.0.0.11"/>
        <vers num="2.0.0.12"/>
        <vers num="2.0.0.13"/>
        <vers num="2.0.0.14" prev="1"/>
      </prod>
      <prod name="seamonkey" vendor="mozilla">
        <vers num="1.1"/>
        <vers num="1.1.2"/>
        <vers num="1.1.3"/>
        <vers num="1.1.4"/>
        <vers num="1.1.5"/>
        <vers num="1.1.6"/>
        <vers num="1.1.7"/>
        <vers num="1.1.8"/>
        <vers num="1.1.9" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2806" seq="2008-2806" published="2008-07-07" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 on Mac OS X allow remote attackers to bypass the Same Origin Policy and create arbitrary socket connections via a crafted Java applet, related to the Java Embedding Plugin (JEP) and Java LiveConnect.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00004.html">SUSE-SA:2008:034</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.383152">SSA:2008-191-03</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.384911">SSA:2008-191</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0216">http://wiki.rpath.com/Advisories:rPSA-2008-0216</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.15">http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.15</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/security/announce/2008/mfsa2008-28.html">http://www.mozilla.org/security/announce/2008/mfsa2008-28.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/494080/100/0/threaded">20080708 rPSA-2008-0216-1 firefox</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30038">30038</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020419">1020419</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-619-1">USN-619-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1993/references">ADV-2008-1993</ref>
      <ref source="CONFIRM" url="https://bugzilla.mozilla.org/show_bug.cgi?id=408329">https://bugzilla.mozilla.org/show_bug.cgi?id=408329</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2646">https://issues.rpath.com/browse/RPL-2646</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00288.html">FEDORA-2008-6193</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00295.html">FEDORA-2008-6196</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="2.0" edition="beta_1"/>
        <vers num="2.0" edition="rc2"/>
        <vers num="2.0" edition="rc3"/>
        <vers num="2.0.0.2"/>
        <vers num="2.0.0.3"/>
        <vers num="2.0.0.11"/>
        <vers num="2.0.0.12"/>
        <vers num="2.0.0.13"/>
        <vers num="2.0.0.14"/>
        <vers num="2.0_.1"/>
        <vers num="2.0_.4"/>
        <vers num="2.0_.5"/>
        <vers num="2.0_.6"/>
        <vers num="2.0_.7"/>
        <vers num="2.0_.9"/>
        <vers num="2.0_.10"/>
        <vers num="2.0_8"/>
      </prod>
      <prod name="seamonkey" vendor="mozilla">
        <vers num="1.1" edition="beta"/>
        <vers num="1.1.1"/>
        <vers num="1.1.2"/>
        <vers num="1.1.3"/>
        <vers num="1.1.4"/>
        <vers num="1.1.5"/>
        <vers num="1.1.6"/>
        <vers num="1.1.7"/>
        <vers num="1.1.8"/>
        <vers num="1.1.9"/>
      </prod>
      <prod name="thunderbird" vendor="mozilla">
        <vers num="2.0_.4"/>
        <vers num="2.0_.5"/>
        <vers num="2.0_.6"/>
        <vers num="2.0_.9"/>
        <vers num="2.0_.12"/>
        <vers num="2.0_.13"/>
        <vers num="2.0_.14"/>
        <vers num="2.0_8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2807" seq="2008-2807" published="2008-07-07" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 do not properly handle an invalid .properties file for an add-on, which allows remote attackers to read uninitialized memory, as demonstrated by use of ISO 8859 encoding instead of UTF-8 encoding in a French .properties file.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00004.html">SUSE-SA:2008:034</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2008-0616.html">RHSA-2008:0616</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200808-03.xml">GLSA-200808-03</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.383152">SSA:2008-191-03</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.384911">SSA:2008-191</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.410484">SSA:2008-210-05</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1">256408</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0216">http://wiki.rpath.com/Advisories:rPSA-2008-0216</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1607">DSA-1607</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1615">DSA-1615</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1621">DSA-1621</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2009/dsa-1697">DSA-1697</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:136">MDVSA-2008:136</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:155">MDVSA-2008:155</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.15">http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.15</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/security/announce/2008/mfsa2008-29.html">http://www.mozilla.org/security/announce/2008/mfsa2008-29.html</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0547.html">RHSA-2008:0547</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0549.html">RHSA-2008:0549</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0569.html">RHSA-2008:0569</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/494080/100/0/threaded">20080708 rPSA-2008-0216-1 firefox</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30038">30038</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020419">1020419</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-619-1">USN-619-1</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-629-1">USN-629-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1993/references">ADV-2008-1993</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/0977">ADV-2009-0977</ref>
      <ref source="CONFIRM" url="https://bugzilla.mozilla.org/show_bug.cgi?id=397093">https://bugzilla.mozilla.org/show_bug.cgi?id=397093</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/50656">firefox-propertiesfile-info-disclosure(50656)</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2646">https://issues.rpath.com/browse/RPL-2646</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9432">oval:org.mitre.oval:def:9432</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00125.html">FEDORA-2008-6737</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00144.html">FEDORA-2008-6706</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00207.html">FEDORA-2008-6127</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00288.html">FEDORA-2008-6193</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00295.html">FEDORA-2008-6196</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="2.0"/>
        <vers num="2.0.0.1"/>
        <vers num="2.0.0.2"/>
        <vers num="2.0.0.3"/>
        <vers num="2.0.0.4"/>
        <vers num="2.0.0.5"/>
        <vers num="2.0.0.6"/>
        <vers num="2.0.0.7"/>
        <vers num="2.0.0.8"/>
        <vers num="2.0.0.9"/>
        <vers num="2.0.0.10"/>
        <vers num="2.0.0.11"/>
        <vers num="2.0.0.12"/>
        <vers num="2.0.0.13"/>
        <vers num="2.0.0.14" prev="1"/>
      </prod>
      <prod name="seamonkey" vendor="mozilla">
        <vers num="1.1"/>
        <vers num="1.1.2"/>
        <vers num="1.1.3"/>
        <vers num="1.1.4"/>
        <vers num="1.1.5"/>
        <vers num="1.1.6"/>
        <vers num="1.1.7"/>
        <vers num="1.1.8"/>
        <vers num="1.1.9" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2808" seq="2008-2808" published="2008-07-07" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 do not properly escape HTML in file:// URLs in directory listings, which allows remote attackers to conduct cross-site scripting (XSS) attacks or have unspecified other impact via a crafted filename.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00004.html">SUSE-SA:2008:034</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2008-0616.html">RHSA-2008:0616</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200808-03.xml">GLSA-200808-03</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.383152">SSA:2008-191-03</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.384911">SSA:2008-191</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1">256408</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0216">http://wiki.rpath.com/Advisories:rPSA-2008-0216</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1607">DSA-1607</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1615">DSA-1615</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2009/dsa-1697">DSA-1697</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:136">MDVSA-2008:136</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.15">http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.15</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/security/announce/2008/mfsa2008-30.html">http://www.mozilla.org/security/announce/2008/mfsa2008-30.html</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0547.html">RHSA-2008:0547</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0549.html">RHSA-2008:0549</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0569.html">RHSA-2008:0569</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/494080/100/0/threaded">20080708 rPSA-2008-0216-1 firefox</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30038">30038</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020419">1020419</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-619-1">USN-619-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1993/references">ADV-2008-1993</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/0977">ADV-2009-0977</ref>
      <ref source="CONFIRM" url="https://bugzilla.mozilla.org/show_bug.cgi?id=411433">https://bugzilla.mozilla.org/show_bug.cgi?id=411433</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2646">https://issues.rpath.com/browse/RPL-2646</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9668">oval:org.mitre.oval:def:9668</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00207.html">FEDORA-2008-6127</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00288.html">FEDORA-2008-6193</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00295.html">FEDORA-2008-6196</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="2.0" edition="beta_1"/>
        <vers num="2.0" edition="rc2"/>
        <vers num="2.0" edition="rc3"/>
        <vers num="2.0.0.2"/>
        <vers num="2.0.0.3"/>
        <vers num="2.0.0.11"/>
        <vers num="2.0.0.12"/>
        <vers num="2.0.0.13"/>
        <vers num="2.0.0.14"/>
        <vers num="2.0_.1"/>
        <vers num="2.0_.4"/>
        <vers num="2.0_.5"/>
        <vers num="2.0_.6"/>
        <vers num="2.0_.9"/>
        <vers num="2.0_.10"/>
        <vers num="2.0_8"/>
      </prod>
      <prod name="seamonkey" vendor="mozilla">
        <vers num="1.1" edition="beta"/>
        <vers num="1.1.1"/>
        <vers num="1.1.2"/>
        <vers num="1.1.3"/>
        <vers num="1.1.4"/>
        <vers num="1.1.5"/>
        <vers num="1.1.6"/>
        <vers num="1.1.7"/>
        <vers num="1.1.8"/>
        <vers num="1.1.9"/>
      </prod>
      <prod name="thunderbird" vendor="mozilla">
        <vers num="2.0_.4"/>
        <vers num="2.0_.5"/>
        <vers num="2.0_.6"/>
        <vers num="2.0_.9"/>
        <vers num="2.0_.12"/>
        <vers num="2.0_.13"/>
        <vers num="2.0_.14"/>
        <vers num="2.0_8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2809" seq="2008-2809" published="2008-07-08" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.0" CVSS_base_score="4.0" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:N/I:P/A:P)">
    <desc>
      <descript source="cve">Mozilla 1.9 M8 and earlier, Mozilla Firefox 2 before 2.0.0.15, SeaMonkey 1.1.5 and other versions before 1.1.10, Netscape 9.0, and other Mozilla-based web browsers, when a user accepts an SSL server certificate on the basis of the CN domain name in the DN field, regard the certificate as also accepted for all domain names in subjectAltName:dNSName fields, which makes it easier for remote attackers to trick a user into accepting an invalid certificate for a spoofed web site.</descript>
    </desc>
    <loss_types>
      <avail/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00004.html">SUSE-SA:2008:034</ref>
      <ref source="MISC" url="http://nils.toedtmann.net/pub/subjectAltName.txt">http://nils.toedtmann.net/pub/subjectAltName.txt</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2008-0616.html">RHSA-2008:0616</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200808-03.xml">GLSA-200808-03</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3498">3498</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1018979">1018979</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.383152">SSA:2008-191-03</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.384911">SSA:2008-191</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.410484">SSA:2008-210-05</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1">256408</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0216">http://wiki.rpath.com/Advisories:rPSA-2008-0216</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1607">DSA-1607</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1615">DSA-1615</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1621">DSA-1621</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2009/dsa-1697">DSA-1697</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:136">MDVSA-2008:136</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:155">MDVSA-2008:155</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.15">http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.15</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/security/announce/2008/mfsa2008-31.html">http://www.mozilla.org/security/announce/2008/mfsa2008-31.html</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0547.html">RHSA-2008:0547</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0549.html">RHSA-2008:0549</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0569.html">RHSA-2008:0569</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/483929/100/100/threaded">20071118 Certificate spoofing issue with Mozilla, Konqueror, Safari 2</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/483937/100/100/threaded">20071118 Re: Certificate spoofing issue with Mozilla, Konqueror, Safari 2</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/483960/100/100/threaded">20071118 RE: Certificate spoofing issue with Mozilla, Konqueror, Safari 2</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/494080/100/0/threaded">20080708 rPSA-2008-0216-1 firefox</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30038">30038</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020419">1020419</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-619-1">USN-619-1</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-629-1">USN-629-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1993/references">ADV-2008-1993</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/0977">ADV-2009-0977</ref>
      <ref source="CONFIRM" url="https://bugzilla.mozilla.org/show_bug.cgi?id=240261">https://bugzilla.mozilla.org/show_bug.cgi?id=240261</ref>
      <ref source="CONFIRM" url="https://bugzilla.mozilla.org/show_bug.cgi?id=327181">https://bugzilla.mozilla.org/show_bug.cgi?id=327181</ref>
      <ref source="CONFIRM" url="https://bugzilla.mozilla.org/show_bug.cgi?id=402347">https://bugzilla.mozilla.org/show_bug.cgi?id=402347</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43524">mozilla-altnames-spoofing(43524)</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2646">https://issues.rpath.com/browse/RPL-2646</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10205">oval:org.mitre.oval:def:10205</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00125.html">FEDORA-2008-6737</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00144.html">FEDORA-2008-6706</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00207.html">FEDORA-2008-6127</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00288.html">FEDORA-2008-6193</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00295.html">FEDORA-2008-6196</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="2.0.0.1"/>
        <vers num="2.0.0.2"/>
        <vers num="2.0.0.3"/>
        <vers num="2.0.0.4"/>
        <vers num="2.0.0.5"/>
        <vers num="2.0.0.6"/>
        <vers num="2.0.0.7"/>
        <vers num="2.0.0.8"/>
        <vers num="2.0.0.9"/>
        <vers num="2.0.0.10"/>
        <vers num="2.0.0.11"/>
        <vers num="2.0.0.12"/>
        <vers num="2.0.0.13"/>
        <vers num="2.0.0.14"/>
      </prod>
      <prod name="geckb" vendor="mozilla">
        <vers num="1.9" prev="1" edition="m8"/>
      </prod>
      <prod name="seamonkey" vendor="mozilla">
        <vers num="1.0.9" prev="1"/>
        <vers num="1.1.5"/>
      </prod>
      <prod name="navigator" vendor="netscape">
        <vers num="9.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2810" seq="2008-2810" published="2008-07-07" modified="2018-10-11" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 do not properly identify the context of Windows shortcut files, which allows user-assisted remote attackers to bypass the Same Origin Policy via a crafted web site for which the user has previously saved a shortcut.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00004.html">SUSE-SA:2008:034</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2008-0616.html">RHSA-2008:0616</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200808-03.xml">GLSA-200808-03</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.383152">SSA:2008-191-03</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.384911">SSA:2008-191</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0216">http://wiki.rpath.com/Advisories:rPSA-2008-0216</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2009/dsa-1697">DSA-1697</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.15">http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.15</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/security/announce/2008/mfsa2008-32.html">http://www.mozilla.org/security/announce/2008/mfsa2008-32.html</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0547.html">RHSA-2008:0547</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0549.html">RHSA-2008:0549</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0569.html">RHSA-2008:0569</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/494080/100/0/threaded">20080708 rPSA-2008-0216-1 firefox</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30038">30038</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020419">1020419</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-619-1">USN-619-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1993/references">ADV-2008-1993</ref>
      <ref source="CONFIRM" url="https://bugzilla.mozilla.org/show_bug.cgi?id=410156">https://bugzilla.mozilla.org/show_bug.cgi?id=410156</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2646">https://issues.rpath.com/browse/RPL-2646</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9593">oval:org.mitre.oval:def:9593</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00207.html">FEDORA-2008-6127</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00288.html">FEDORA-2008-6193</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00295.html">FEDORA-2008-6196</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="2.0"/>
        <vers num="2.0.0.1"/>
        <vers num="2.0.0.2"/>
        <vers num="2.0.0.3"/>
        <vers num="2.0.0.4"/>
        <vers num="2.0.0.5"/>
        <vers num="2.0.0.6"/>
        <vers num="2.0.0.7"/>
        <vers num="2.0.0.8"/>
        <vers num="2.0.0.9"/>
        <vers num="2.0.0.10"/>
        <vers num="2.0.0.11"/>
        <vers num="2.0.0.12"/>
        <vers num="2.0.0.13"/>
        <vers num="2.0.0.14" prev="1"/>
      </prod>
      <prod name="seamonkey" vendor="mozilla">
        <vers num="1.1"/>
        <vers num="1.1.2"/>
        <vers num="1.1.3"/>
        <vers num="1.1.4"/>
        <vers num="1.1.5"/>
        <vers num="1.1.6"/>
        <vers num="1.1.7"/>
        <vers num="1.1.8"/>
        <vers num="1.1.9" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2811" seq="2008-2811" published="2008-07-07" modified="2018-10-11" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The block reflow implementation in Mozilla Firefox before 2.0.0.15, Thunderbird 2.0.0.14 and earlier, and SeaMonkey before 1.1.10 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via an image whose display requires more pixels than nscoord_MAX, related to nsBlockFrame::DrainOverflowLines.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00004.html">SUSE-SA:2008:034</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2008-0616.html">RHSA-2008:0616</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200808-03.xml">GLSA-200808-03</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.383152">SSA:2008-191-03</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.384911">SSA:2008-191</ref>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.410484">SSA:2008-210-05</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1">256408</ref>
      <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0216">http://wiki.rpath.com/Advisories:rPSA-2008-0216</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1607">DSA-1607</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1615">DSA-1615</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1621">DSA-1621</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2009/dsa-1697">DSA-1697</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/607267">VU#607267</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:136">MDVSA-2008:136</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:155">MDVSA-2008:155</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.15">http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.15</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/security/announce/2008/mfsa2008-33.html">http://www.mozilla.org/security/announce/2008/mfsa2008-33.html</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0547.html">RHSA-2008:0547</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0549.html">RHSA-2008:0549</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0569.html">RHSA-2008:0569</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/494080/100/0/threaded">20080708 rPSA-2008-0216-1 firefox</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30038">30038</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020419">1020419</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-619-1">USN-619-1</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-629-1">USN-629-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1993/references">ADV-2008-1993</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/0977">ADV-2009-0977</ref>
      <ref source="CONFIRM" url="https://bugzilla.mozilla.org/show_bug.cgi?id=439735">https://bugzilla.mozilla.org/show_bug.cgi?id=439735</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-2646">https://issues.rpath.com/browse/RPL-2646</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9865">oval:org.mitre.oval:def:9865</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00125.html">FEDORA-2008-6737</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00144.html">FEDORA-2008-6706</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00207.html">FEDORA-2008-6127</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00288.html">FEDORA-2008-6193</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00295.html">FEDORA-2008-6196</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="2.0"/>
        <vers num="2.0.0.1"/>
        <vers num="2.0.0.2"/>
        <vers num="2.0.0.3"/>
        <vers num="2.0.0.4"/>
        <vers num="2.0.0.5"/>
        <vers num="2.0.0.6"/>
        <vers num="2.0.0.7"/>
        <vers num="2.0.0.8"/>
        <vers num="2.0.0.9"/>
        <vers num="2.0.0.10"/>
        <vers num="2.0.0.11"/>
        <vers num="2.0.0.12"/>
        <vers num="2.0.0.13"/>
        <vers num="2.0.0.14" prev="1"/>
      </prod>
      <prod name="seamonkey" vendor="mozilla">
        <vers num="1.1"/>
        <vers num="1.1.2"/>
        <vers num="1.1.3"/>
        <vers num="1.1.4"/>
        <vers num="1.1.5"/>
        <vers num="1.1.6"/>
        <vers num="1.1.7"/>
        <vers num="1.1.8"/>
        <vers num="1.1.9" prev="1"/>
      </prod>
      <prod name="thunderbird" vendor="mozilla">
        <vers num="2.0.0.0"/>
        <vers num="2.0.0.1"/>
        <vers num="2.0.0.2"/>
        <vers num="2.0.0.3"/>
        <vers num="2.0.0.4"/>
        <vers num="2.0.0.5"/>
        <vers num="2.0.0.6"/>
        <vers num="2.0.0.8"/>
        <vers num="2.0.0.9"/>
        <vers num="2.0.0.11"/>
        <vers num="2.0.0.12"/>
        <vers num="2.0.0.13"/>
        <vers num="2.0.0.14" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2812" seq="2008-2812" published="2008-07-08" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The Linux kernel before 2.6.25.10 does not properly perform tty operations, which allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving NULL pointer dereference of function pointers in (1) hamradio/6pack.c, (2) hamradio/mkiss.c, (3) irda/irtty-sir.c, (4) ppp_async.c, (5) ppp_synctty.c, (6) slip.c, (7) wan/x25_asy.c, and (8) wireless/strip.c in drivers/net/.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git;a=commitdiff;h=2a739dd53ad7ee010ae6e155438507f329dce788">http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git;a=commitdiff;h=2a739dd53ad7ee010ae6e155438507f329dce788</ref>
      <ref source="CONFIRM" url="http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.10">http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.10</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00007.html">SUSE-SA:2008:035</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00009.html">SUSE-SA:2008:037</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00012.html">SUSE-SA:2008:038</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00000.html">SUSE-SA:2008:047</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00003.html">SUSE-SA:2008:049</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.html">SUSE-SA:2008:052</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html">SUSE-SR:2008:025</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2008-365.htm">http://support.avaya.com/elmodocs2/security/ASA-2008-365.htm</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1630">DSA-1630</ref>
      <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/07/03/2">[oss-security] 20080703 2.6.25.10 security fixes, please assign CVE id</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0612.html">RHSA-2008:0612</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0665.html">RHSA-2008:0665</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0973.html">RHSA-2008:0973</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30076" patch="1">30076</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/2063/references">ADV-2008-2063</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43687">kernel-tty-dos(43687)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11632">oval:org.mitre.oval:def:11632</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6633">oval:org.mitre.oval:def:6633</ref>
      <ref source="UBUNTU" url="https://usn.ubuntu.com/637-1/">USN-637-1</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="1.2.0"/>
        <vers num="1.3.0"/>
        <vers num="2.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
        <vers num="2.0.4"/>
        <vers num="2.0.5"/>
        <vers num="2.0.6"/>
        <vers num="2.0.7"/>
        <vers num="2.0.8"/>
        <vers num="2.0.9"/>
        <vers num="2.0.9.9"/>
        <vers num="2.0.10"/>
        <vers num="2.0.11"/>
        <vers num="2.0.12"/>
        <vers num="2.0.13"/>
        <vers num="2.0.14"/>
        <vers num="2.0.15"/>
        <vers num="2.0.16"/>
        <vers num="2.0.17"/>
        <vers num="2.0.18"/>
        <vers num="2.0.19"/>
        <vers num="2.0.20"/>
        <vers num="2.0.21"/>
        <vers num="2.0.22"/>
        <vers num="2.0.23"/>
        <vers num="2.0.24"/>
        <vers num="2.0.25"/>
        <vers num="2.0.26"/>
        <vers num="2.0.27"/>
        <vers num="2.0.28"/>
        <vers num="2.0.29"/>
        <vers num="2.0.30"/>
        <vers num="2.0.31"/>
        <vers num="2.0.32"/>
        <vers num="2.0.33"/>
        <vers num="2.0.34"/>
        <vers num="2.0.35"/>
        <vers num="2.0.36"/>
        <vers num="2.0.37"/>
        <vers num="2.0.38"/>
        <vers num="2.0.39"/>
        <vers num="2.1"/>
        <vers num="2.1.89"/>
        <vers num="2.1.132"/>
        <vers num="2.2.0"/>
        <vers num="2.2.1"/>
        <vers num="2.2.2"/>
        <vers num="2.2.3"/>
        <vers num="2.2.4" edition="rc1"/>
        <vers num="2.2.5"/>
        <vers num="2.2.6"/>
        <vers num="2.2.7"/>
        <vers num="2.2.8"/>
        <vers num="2.2.9"/>
        <vers num="2.2.10"/>
        <vers num="2.2.11"/>
        <vers num="2.2.12"/>
        <vers num="2.2.13" edition="pre15"/>
        <vers num="2.2.14"/>
        <vers num="2.2.15" edition="pre16"/>
        <vers num="2.2.15_pre20"/>
        <vers num="2.2.16" edition="pre5"/>
        <vers num="2.2.16" edition="pre6"/>
        <vers num="2.2.17" edition="pre14"/>
        <vers num="2.2.18"/>
        <vers num="2.2.19"/>
        <vers num="2.2.20"/>
        <vers num="2.2.21" edition="pre1"/>
        <vers num="2.2.21" edition="pre2"/>
        <vers num="2.2.21" edition="pre3"/>
        <vers num="2.2.21" edition="pre4"/>
        <vers num="2.2.21" edition="rc1"/>
        <vers num="2.2.21" edition="rc2"/>
        <vers num="2.2.21" edition="rc3"/>
        <vers num="2.2.21" edition="rc4"/>
        <vers num="2.2.22" edition="rc1"/>
        <vers num="2.2.22" edition="rc2"/>
        <vers num="2.2.22" edition="rc3"/>
        <vers num="2.2.23" edition="rc1"/>
        <vers num="2.2.23" edition="rc2"/>
        <vers num="2.2.24" edition="rc2"/>
        <vers num="2.2.24" edition="rc3"/>
        <vers num="2.2.24" edition="rc4"/>
        <vers num="2.2.24" edition="rc5"/>
        <vers num="2.2.25"/>
        <vers num="2.2.26"/>
        <vers num="2.2.27" edition="pre1"/>
        <vers num="2.2.27" edition="pre2"/>
        <vers num="2.2.27" edition="rc1"/>
        <vers num="2.2.27" edition="rc2"/>
        <vers num="2.3.0"/>
        <vers num="2.3.1"/>
        <vers num="2.3.2"/>
        <vers num="2.3.3"/>
        <vers num="2.3.4"/>
        <vers num="2.3.5"/>
        <vers num="2.3.6"/>
        <vers num="2.3.7"/>
        <vers num="2.3.8"/>
        <vers num="2.3.9"/>
        <vers num="2.3.10"/>
        <vers num="2.3.11"/>
        <vers num="2.3.12"/>
        <vers num="2.3.13"/>
        <vers num="2.3.14"/>
        <vers num="2.3.15"/>
        <vers num="2.3.16"/>
        <vers num="2.3.17"/>
        <vers num="2.3.18"/>
        <vers num="2.3.19"/>
        <vers num="2.3.20"/>
        <vers num="2.3.21"/>
        <vers num="2.3.22"/>
        <vers num="2.3.23"/>
        <vers num="2.3.24"/>
        <vers num="2.3.25"/>
        <vers num="2.3.26"/>
        <vers num="2.3.27"/>
        <vers num="2.3.28"/>
        <vers num="2.3.29"/>
        <vers num="2.3.30"/>
        <vers num="2.3.31"/>
        <vers num="2.3.32"/>
        <vers num="2.3.33"/>
        <vers num="2.3.34"/>
        <vers num="2.3.35"/>
        <vers num="2.3.36"/>
        <vers num="2.3.37"/>
        <vers num="2.3.38"/>
        <vers num="2.3.39"/>
        <vers num="2.3.40"/>
        <vers num="2.3.41"/>
        <vers num="2.3.42"/>
        <vers num="2.3.43"/>
        <vers num="2.3.44"/>
        <vers num="2.3.45"/>
        <vers num="2.3.46"/>
        <vers num="2.3.47"/>
        <vers num="2.3.48"/>
        <vers num="2.3.49"/>
        <vers num="2.3.50"/>
        <vers num="2.3.51"/>
        <vers num="2.3.99" edition="pre1"/>
        <vers num="2.3.99" edition="pre2"/>
        <vers num="2.3.99" edition="pre3"/>
        <vers num="2.3.99" edition="pre4"/>
        <vers num="2.3.99" edition="pre5"/>
        <vers num="2.3.99" edition="pre6"/>
        <vers num="2.3.99" edition="pre7"/>
        <vers num="2.3.99" edition="pre8"/>
        <vers num="2.3.99" edition="pre9"/>
        <vers num="2.4.0" edition="test1"/>
        <vers num="2.4.0" edition="test10"/>
        <vers num="2.4.0" edition="test11"/>
        <vers num="2.4.0" edition="test12"/>
        <vers num="2.4.0" edition="test2"/>
        <vers num="2.4.0" edition="test3"/>
        <vers num="2.4.0" edition="test4"/>
        <vers num="2.4.0" edition="test5"/>
        <vers num="2.4.0" edition="test6"/>
        <vers num="2.4.0" edition="test7"/>
        <vers num="2.4.0" edition="test8"/>
        <vers num="2.4.0" edition="test9"/>
        <vers num="2.4.1"/>
        <vers num="2.4.2"/>
        <vers num="2.4.3" edition="pre3"/>
        <vers num="2.4.4"/>
        <vers num="2.4.5"/>
        <vers num="2.4.6"/>
        <vers num="2.4.7"/>
        <vers num="2.4.8"/>
        <vers num="2.4.9"/>
        <vers num="2.4.9_pre5"/>
        <vers num="2.4.10"/>
        <vers num="2.4.11" edition="pre3"/>
        <vers num="2.4.12"/>
        <vers num="2.4.13"/>
        <vers num="2.4.14"/>
        <vers num="2.4.15"/>
        <vers num="2.4.16"/>
        <vers num="2.4.17"/>
        <vers num="2.4.18" edition="pre1"/>
        <vers num="2.4.18" edition="pre2"/>
        <vers num="2.4.18" edition="pre3"/>
        <vers num="2.4.18" edition="pre4"/>
        <vers num="2.4.18" edition="pre5"/>
        <vers num="2.4.18" edition="pre6"/>
        <vers num="2.4.18" edition="pre7"/>
        <vers num="2.4.18" edition="pre8"/>
        <vers num="2.4.18" edition="pre9"/>
        <vers num="2.4.19" edition="pre1"/>
        <vers num="2.4.19" edition="pre2"/>
        <vers num="2.4.19" edition="pre3"/>
        <vers num="2.4.19" edition="pre4"/>
        <vers num="2.4.19" edition="pre5"/>
        <vers num="2.4.19" edition="pre6"/>
        <vers num="2.4.20"/>
        <vers num="2.4.21" edition="pre1"/>
        <vers num="2.4.21" edition="pre4"/>
        <vers num="2.4.21" edition="pre7"/>
        <vers num="2.4.22" edition="pre10"/>
        <vers num="2.4.23" edition="pre9"/>
        <vers num="2.4.23_ow2"/>
        <vers num="2.4.24"/>
        <vers num="2.4.24_ow1"/>
        <vers num="2.4.25"/>
        <vers num="2.4.26"/>
        <vers num="2.4.27" edition="pre1"/>
        <vers num="2.4.27" edition="pre2"/>
        <vers num="2.4.27" edition="pre3"/>
        <vers num="2.4.27" edition="pre4"/>
        <vers num="2.4.27" edition="pre5"/>
        <vers num="2.4.28"/>
        <vers num="2.4.29" edition="rc1"/>
        <vers num="2.4.29" edition="rc2"/>
        <vers num="2.4.30" edition="rc2"/>
        <vers num="2.4.30" edition="rc3"/>
        <vers num="2.4.31" edition="pre1"/>
        <vers num="2.4.32" edition="pre1"/>
        <vers num="2.4.32" edition="pre2"/>
        <vers num="2.4.33" edition="pre1"/>
        <vers num="2.4.33.2"/>
        <vers num="2.4.33.3"/>
        <vers num="2.4.33.4"/>
        <vers num="2.4.33.5"/>
        <vers num="2.4.34" edition="rc3"/>
        <vers num="2.4.34.1"/>
        <vers num="2.4.34.2"/>
        <vers num="2.4.35"/>
        <vers num="2.4.35.2"/>
        <vers num="2.4.36"/>
        <vers num="2.4.36.1"/>
        <vers num="2.4.36.2"/>
        <vers num="2.4.36.3"/>
        <vers num="2.4.36.4"/>
        <vers num="2.4.36.5"/>
        <vers num="2.5.0"/>
        <vers num="2.5.1"/>
        <vers num="2.5.2"/>
        <vers num="2.5.3"/>
        <vers num="2.5.4"/>
        <vers num="2.5.5"/>
        <vers num="2.5.6"/>
        <vers num="2.5.7"/>
        <vers num="2.5.8"/>
        <vers num="2.5.9"/>
        <vers num="2.5.10"/>
        <vers num="2.5.11"/>
        <vers num="2.5.12"/>
        <vers num="2.5.13"/>
        <vers num="2.5.14"/>
        <vers num="2.5.15"/>
        <vers num="2.5.16"/>
        <vers num="2.5.17"/>
        <vers num="2.5.18"/>
        <vers num="2.5.19"/>
        <vers num="2.5.20"/>
        <vers num="2.5.21"/>
        <vers num="2.5.22"/>
        <vers num="2.5.23"/>
        <vers num="2.5.24"/>
        <vers num="2.5.25"/>
        <vers num="2.5.26"/>
        <vers num="2.5.27"/>
        <vers num="2.5.28"/>
        <vers num="2.5.29"/>
        <vers num="2.5.30"/>
        <vers num="2.5.31"/>
        <vers num="2.5.32"/>
        <vers num="2.5.33"/>
        <vers num="2.5.34"/>
        <vers num="2.5.35"/>
        <vers num="2.5.36"/>
        <vers num="2.5.37"/>
        <vers num="2.5.38"/>
        <vers num="2.5.39"/>
        <vers num="2.5.40"/>
        <vers num="2.5.41"/>
        <vers num="2.5.42"/>
        <vers num="2.5.43"/>
        <vers num="2.5.44"/>
        <vers num="2.5.45"/>
        <vers num="2.5.46"/>
        <vers num="2.5.47"/>
        <vers num="2.5.48"/>
        <vers num="2.5.49"/>
        <vers num="2.5.50"/>
        <vers num="2.5.51"/>
        <vers num="2.5.52"/>
        <vers num="2.5.53"/>
        <vers num="2.5.54"/>
        <vers num="2.5.55"/>
        <vers num="2.5.56"/>
        <vers num="2.5.57"/>
        <vers num="2.5.58"/>
        <vers num="2.5.59"/>
        <vers num="2.5.60"/>
        <vers num="2.5.61"/>
        <vers num="2.5.62"/>
        <vers num="2.5.63"/>
        <vers num="2.5.64"/>
        <vers num="2.5.65"/>
        <vers num="2.5.66"/>
        <vers num="2.5.67"/>
        <vers num="2.5.68"/>
        <vers num="2.5.69"/>
        <vers num="2.6.0" edition="test1"/>
        <vers num="2.6.0" edition="test10"/>
        <vers num="2.6.0" edition="test11"/>
        <vers num="2.6.0" edition="test2"/>
        <vers num="2.6.0" edition="test3"/>
        <vers num="2.6.0" edition="test4"/>
        <vers num="2.6.0" edition="test5"/>
        <vers num="2.6.0" edition="test6"/>
        <vers num="2.6.0" edition="test7"/>
        <vers num="2.6.0" edition="test8"/>
        <vers num="2.6.0" edition="test9"/>
        <vers num="2.6.1" edition="rc1"/>
        <vers num="2.6.1" edition="rc2"/>
        <vers num="2.6.1" edition="rc3"/>
        <vers num="2.6.2" edition="rc1"/>
        <vers num="2.6.2" edition="rc2"/>
        <vers num="2.6.2" edition="rc3"/>
        <vers num="2.6.10" edition="rc1"/>
        <vers num="2.6.10" edition="rc2"/>
        <vers num="2.6.10" edition="rc3"/>
        <vers num="2.6.11" edition="rc1"/>
        <vers num="2.6.11" edition="rc2"/>
        <vers num="2.6.11" edition="rc3"/>
        <vers num="2.6.11" edition="rc4"/>
        <vers num="2.6.11" edition="rc5"/>
        <vers num="2.6.11.1"/>
        <vers num="2.6.11.2"/>
        <vers num="2.6.11.3"/>
        <vers num="2.6.11.4"/>
        <vers num="2.6.11.5"/>
        <vers num="2.6.11.6"/>
        <vers num="2.6.11.7"/>
        <vers num="2.6.11.8"/>
        <vers num="2.6.11.9"/>
        <vers num="2.6.11.10"/>
        <vers num="2.6.11.11"/>
        <vers num="2.6.11.12"/>
        <vers num="2.6.11_rc1_bk6"/>
        <vers num="2.6.12" edition="rc1"/>
        <vers num="2.6.12" edition="rc2"/>
        <vers num="2.6.12" edition="rc3"/>
        <vers num="2.6.12" edition="rc4"/>
        <vers num="2.6.12" edition="rc5"/>
        <vers num="2.6.12" edition="rc6"/>
        <vers num="2.6.12.1"/>
        <vers num="2.6.12.2"/>
        <vers num="2.6.12.3"/>
        <vers num="2.6.12.4"/>
        <vers num="2.6.12.5"/>
        <vers num="2.6.12.6"/>
        <vers num="2.6.12.12"/>
        <vers num="2.6.12.22"/>
        <vers num="2.6.13" edition="rc1"/>
        <vers num="2.6.13" edition="rc2"/>
        <vers num="2.6.13" edition="rc3"/>
        <vers num="2.6.13" edition="rc4"/>
        <vers num="2.6.13" edition="rc5"/>
        <vers num="2.6.13" edition="rc6"/>
        <vers num="2.6.13" edition="rc7"/>
        <vers num="2.6.13.1"/>
        <vers num="2.6.13.2"/>
        <vers num="2.6.13.3"/>
        <vers num="2.6.13.4"/>
        <vers num="2.6.13.5"/>
        <vers num="2.6.14" edition="rc1"/>
        <vers num="2.6.14" edition="rc2"/>
        <vers num="2.6.14" edition="rc3"/>
        <vers num="2.6.14" edition="rc4"/>
        <vers num="2.6.14" edition="rc5"/>
        <vers num="2.6.14.1"/>
        <vers num="2.6.14.2"/>
        <vers num="2.6.14.3"/>
        <vers num="2.6.14.4"/>
        <vers num="2.6.14.5"/>
        <vers num="2.6.14.6"/>
        <vers num="2.6.14.7"/>
        <vers num="2.6.15" edition="rc1"/>
        <vers num="2.6.15" edition="rc2"/>
        <vers num="2.6.15" edition="rc3"/>
        <vers num="2.6.15" edition="rc4"/>
        <vers num="2.6.15" edition="rc5"/>
        <vers num="2.6.15" edition="rc6"/>
        <vers num="2.6.15" edition="rc7"/>
        <vers num="2.6.15.1"/>
        <vers num="2.6.15.2"/>
        <vers num="2.6.15.3"/>
        <vers num="2.6.15.4"/>
        <vers num="2.6.15.5"/>
        <vers num="2.6.15.6"/>
        <vers num="2.6.15.7"/>
        <vers num="2.6.15.11"/>
        <vers num="2.6.16" edition="rc1"/>
        <vers num="2.6.16" edition="rc2"/>
        <vers num="2.6.16" edition="rc3"/>
        <vers num="2.6.16" edition="rc4"/>
        <vers num="2.6.16" edition="rc5"/>
        <vers num="2.6.16" edition="rc6"/>
        <vers num="2.6.16.1"/>
        <vers num="2.6.16.2"/>
        <vers num="2.6.16.3"/>
        <vers num="2.6.16.4"/>
        <vers num="2.6.16.5"/>
        <vers num="2.6.16.6"/>
        <vers num="2.6.16.7"/>
        <vers num="2.6.16.8"/>
        <vers num="2.6.16.9"/>
        <vers num="2.6.16.10"/>
        <vers num="2.6.16.11"/>
        <vers num="2.6.16.12"/>
        <vers num="2.6.16.13"/>
        <vers num="2.6.16.14"/>
        <vers num="2.6.16.15"/>
        <vers num="2.6.16.16"/>
        <vers num="2.6.16.17"/>
        <vers num="2.6.16.18"/>
        <vers num="2.6.16.19"/>
        <vers num="2.6.16.20"/>
        <vers num="2.6.16.21"/>
        <vers num="2.6.16.22"/>
        <vers num="2.6.16.23"/>
        <vers num="2.6.16.24"/>
        <vers num="2.6.16.25"/>
        <vers num="2.6.16.26"/>
        <vers num="2.6.16.27"/>
        <vers num="2.6.16.28"/>
        <vers num="2.6.16.29"/>
        <vers num="2.6.16.30"/>
        <vers num="2.6.16.31"/>
        <vers num="2.6.16.32"/>
        <vers num="2.6.16.33"/>
        <vers num="2.6.16.34"/>
        <vers num="2.6.16.35"/>
        <vers num="2.6.16.36"/>
        <vers num="2.6.16.37"/>
        <vers num="2.6.16.38"/>
        <vers num="2.6.16.39"/>
        <vers num="2.6.16.40"/>
        <vers num="2.6.16.41"/>
        <vers num="2.6.16.43"/>
        <vers num="2.6.16.44"/>
        <vers num="2.6.16.45"/>
        <vers num="2.6.16.46"/>
        <vers num="2.6.16.47"/>
        <vers num="2.6.16.48"/>
        <vers num="2.6.16.49"/>
        <vers num="2.6.16.50"/>
        <vers num="2.6.16.51"/>
        <vers num="2.6.16.52"/>
        <vers num="2.6.16.53"/>
        <vers num="2.6.16_rc7"/>
        <vers num="2.6.17" edition="rc1"/>
        <vers num="2.6.17" edition="rc2"/>
        <vers num="2.6.17" edition="rc3"/>
        <vers num="2.6.17" edition="rc4"/>
        <vers num="2.6.17" edition="rc5"/>
        <vers num="2.6.17" edition="rc6"/>
        <vers num="2.6.17.1"/>
        <vers num="2.6.17.2"/>
        <vers num="2.6.17.3"/>
        <vers num="2.6.17.4"/>
        <vers num="2.6.17.5"/>
        <vers num="2.6.17.6"/>
        <vers num="2.6.17.7"/>
        <vers num="2.6.17.8"/>
        <vers num="2.6.17.9"/>
        <vers num="2.6.17.10"/>
        <vers num="2.6.17.11"/>
        <vers num="2.6.17.12"/>
        <vers num="2.6.17.13"/>
        <vers num="2.6.17.14"/>
        <vers num="2.6.18" edition="rc1"/>
        <vers num="2.6.18" edition="rc2"/>
        <vers num="2.6.18" edition="rc3"/>
        <vers num="2.6.18" edition="rc4"/>
        <vers num="2.6.18" edition="rc5"/>
        <vers num="2.6.18" edition="rc6"/>
        <vers num="2.6.18" edition="rc7"/>
        <vers num="2.6.18.1"/>
        <vers num="2.6.18.2"/>
        <vers num="2.6.18.3"/>
        <vers num="2.6.18.4"/>
        <vers num="2.6.18.5"/>
        <vers num="2.6.18.6"/>
        <vers num="2.6.18.7"/>
        <vers num="2.6.18.8"/>
        <vers num="2.6.19" edition="rc1"/>
        <vers num="2.6.19" edition="rc2"/>
        <vers num="2.6.19" edition="rc3"/>
        <vers num="2.6.19" edition="rc4"/>
        <vers num="2.6.19.1"/>
        <vers num="2.6.19.2"/>
        <vers num="2.6.19.3"/>
        <vers num="2.6.20" edition="rc2"/>
        <vers num="2.6.20.1"/>
        <vers num="2.6.20.2"/>
        <vers num="2.6.20.3"/>
        <vers num="2.6.20.4"/>
        <vers num="2.6.20.5"/>
        <vers num="2.6.20.6"/>
        <vers num="2.6.20.7"/>
        <vers num="2.6.20.8"/>
        <vers num="2.6.20.9"/>
        <vers num="2.6.20.10"/>
        <vers num="2.6.20.11"/>
        <vers num="2.6.20.12"/>
        <vers num="2.6.20.13"/>
        <vers num="2.6.20.14"/>
        <vers num="2.6.20.15"/>
        <vers num="2.6.21" edition="git1"/>
        <vers num="2.6.21" edition="git2"/>
        <vers num="2.6.21" edition="git3"/>
        <vers num="2.6.21" edition="git4"/>
        <vers num="2.6.21" edition="git5"/>
        <vers num="2.6.21" edition="git6"/>
        <vers num="2.6.21" edition="git7"/>
        <vers num="2.6.21" edition="rc3"/>
        <vers num="2.6.21" edition="rc4"/>
        <vers num="2.6.21" edition="rc5"/>
        <vers num="2.6.21" edition="rc6"/>
        <vers num="2.6.21" edition="rc7"/>
        <vers num="2.6.21.1"/>
        <vers num="2.6.21.2"/>
        <vers num="2.6.21.3"/>
        <vers num="2.6.21.4"/>
        <vers num="2.6.21.6"/>
        <vers num="2.6.21.7"/>
        <vers num="2.6.22" edition="rc6"/>
        <vers num="2.6.22.1"/>
        <vers num="2.6.22.2"/>
        <vers num="2.6.22.3"/>
        <vers num="2.6.22.4"/>
        <vers num="2.6.22.5"/>
        <vers num="2.6.22.6"/>
        <vers num="2.6.22.7"/>
        <vers num="2.6.22.8"/>
        <vers num="2.6.22.9"/>
        <vers num="2.6.22.10"/>
        <vers num="2.6.22.11"/>
        <vers num="2.6.22.12"/>
        <vers num="2.6.22.13"/>
        <vers num="2.6.22.14"/>
        <vers num="2.6.22.15"/>
        <vers num="2.6.22.16"/>
        <vers num="2.6.22.17"/>
        <vers num="2.6.22.18"/>
        <vers num="2.6.22.19"/>
        <vers num="2.6.22.20"/>
        <vers num="2.6.22.21"/>
        <vers num="2.6.22.22"/>
        <vers num="2.6.22_rc1"/>
        <vers num="2.6.22_rc7"/>
        <vers num="2.6.23" edition="rc1"/>
        <vers num="2.6.23" edition="rc2"/>
        <vers num="2.6.23.1"/>
        <vers num="2.6.23.2"/>
        <vers num="2.6.23.3"/>
        <vers num="2.6.23.4"/>
        <vers num="2.6.23.5"/>
        <vers num="2.6.23.6"/>
        <vers num="2.6.23.7"/>
        <vers num="2.6.23.9"/>
        <vers num="2.6.23.10"/>
        <vers num="2.6.23.14"/>
        <vers num="2.6.23_rc1"/>
        <vers num="2.6.24" edition="rc2"/>
        <vers num="2.6.24" edition="rc3"/>
        <vers num="2.6.24.1"/>
        <vers num="2.6.24.2"/>
        <vers num="2.6.24.3"/>
        <vers num="2.6.24.4"/>
        <vers num="2.6.24.5"/>
        <vers num="2.6.24.6"/>
        <vers num="2.6.24_rc1"/>
        <vers num="2.6.24_rc4"/>
        <vers num="2.6.24_rc5"/>
        <vers num="2.6.25"/>
        <vers num="2.6.25.1"/>
        <vers num="2.6.25.2"/>
        <vers num="2.6.25.3"/>
        <vers num="2.6.25.4"/>
        <vers num="2.6.25.5"/>
        <vers num="2.6.25.6"/>
        <vers num="2.6.25.7"/>
        <vers num="2.6.25.8"/>
        <vers num="2.6.25.9"/>
        <vers num="2.6_test9_cvs"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2813" seq="2008-2813" published="2008-06-23" modified="2017-09-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in index.php in WallCity-Server Shoutcast Admin Panel 2.0, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the page parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29733">29733</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43109">shoutcast-index-file-include(43109)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5813">5813</ref>
    </refs>
    <vuln_soft>
      <prod name="wallcity-server_shoutcast_admin_panel" vendor="shoutcastadmin">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2814" seq="2008-2814" published="2008-06-23" modified="2017-08-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in WallCity-Server Shoutcast Admin Panel 2.0 allows remote attackers to inject arbitrary web script or HTML via the username parameter to the login interface.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43108">shoutcast-username-xss(43108)</ref>
    </refs>
    <vuln_soft>
      <prod name="wallcity-server_shoutcast_admin_panel" vendor="shoutcastadmin">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2815" seq="2008-2815" published="2008-06-23" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in shopping/index.php in MyMarket 1.72 allows remote attackers to execute arbitrary SQL commands via the id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29754">29754</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43117">mymarket-index-sql-injection(43117)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5832">5832</ref>
    </refs>
    <vuln_soft>
      <prod name="mymarket" vendor="mymarket">
        <vers num="1.72"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2816" seq="2008-2816" published="2008-06-23" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in post.php in Oxygen (aka O2PHP Bulletin Board) 2.0 allows remote attackers to execute arbitrary SQL commands via the repquote parameter in a reply action, a different vector than CVE-2006-1572.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29729">29729</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43113">oxygen-repquote-sql-injection(43113)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5828">5828</ref>
    </refs>
    <vuln_soft>
      <prod name="oxygen" vendor="o2php">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2817" seq="2008-2817" published="2008-06-23" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in albums.php in NiTrO Web Gallery 1.4.3 and earlier allows remote attackers to execute arbitrary SQL commands via the CatId parameter in a show action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29753">29753</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43100">nitro-albums-sql-injection(43100)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5830">5830</ref>
    </refs>
    <vuln_soft>
      <prod name="nitro_web_gallery" vendor="nitropowered">
        <vers num="1.4.3" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2818" seq="2008-2818" published="2008-06-23" modified="2017-09-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in Easy-Clanpage 3.0 b1 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the section parameter to the default URI.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/29707">29707</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43073">easyclanpage-section-file-include(43073)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/5801">5801</ref>
    </refs>
    <vuln_soft>
      <prod name="easy-clanpage" vendor="easy-clanpage">
        <vers num="3.0_b1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2008-2819" seq="2008-2819" published="2008-06-23" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in BlognPlus (BURO GUN +) 2.5.4 and earlier MySQL and PostgreSQL editions allows remote attackers to execute arbitrary SQL commands via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="JVN" url="http://jvn.jp/jp/JVN14072646/index.html">JVN#14072646</ref>
      <ref source="CONFIRM" url="http://www.blogn.org/index.php?e=170">http://www.blogn.org/index.php?e=170</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/29764">29764</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43136">blognplus-unspecified-sql-injection(43136)</ref>
    </refs>
    <vuln_soft>
  