Search for vulnerabilities
Vulnerability details: VCID-8mpr-nrf7-aaas
Vulnerability ID VCID-8mpr-nrf7-aaas
Aliases CVE-2008-3106
Summary CVE-2008-3106 security flaw
Status Published
Exploitability 0.5
Weighted Severity 9.0
Risk 4.5
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
rhas Critical https://access.redhat.com/errata/RHSA-2008:0594
rhas Low https://access.redhat.com/errata/RHSA-2008:0638
rhas Critical https://access.redhat.com/errata/RHSA-2008:0790
rhas Critical https://access.redhat.com/errata/RHSA-2008:0906
epss 0.01479 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.01553 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.01553 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.01553 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.01553 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.01553 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.01553 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.01553 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.01553 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.02035 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.02035 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.02035 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.02847 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.02847 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.02847 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.02847 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.17799 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.17799 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.17799 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.17799 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.17799 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.17799 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.17799 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.17799 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.17799 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.17799 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.17799 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.17799 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.17799 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.17799 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.17799 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.17799 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.17799 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.17799 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.17799 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.17799 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.17799 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.17799 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.17799 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.17799 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.17799 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.17799 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.17799 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.17799 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.17799 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.17799 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.17799 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.17799 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.17799 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.17799 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.17799 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.17799 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.17799 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.17799 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.17799 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.17799 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.17799 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.17799 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.17799 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.17799 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.17799 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.17799 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.17799 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.17799 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.17799 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.17799 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.17799 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.17799 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
epss 0.24943 https://api.first.org/data/v1/epss?cve=CVE-2008-3106
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=1618330
cvssv2 4.3 https://nvd.nist.gov/vuln/detail/CVE-2008-3106
Reference id Reference type URL
http://lists.apple.com/archives/security-announce//2008/Sep/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00002.html
http://marc.info/?l=bugtraq&m=122331139823057&w=2
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3106.json
https://api.first.org/data/v1/epss?cve=CVE-2008-3106
http://secunia.com/advisories/31010
http://secunia.com/advisories/31320
http://secunia.com/advisories/31497
http://secunia.com/advisories/31600
http://secunia.com/advisories/31736
http://secunia.com/advisories/32018
http://secunia.com/advisories/32179
http://secunia.com/advisories/32180
http://secunia.com/advisories/32436
http://secunia.com/advisories/33237
http://secunia.com/advisories/33238
http://secunia.com/advisories/37386
http://security.gentoo.org/glsa/glsa-200911-02.xml
https://exchange.xforce.ibmcloud.com/vulnerabilities/43658
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10866
http://sunsolve.sun.com/search/document.do?assetkey=1-66-238628-1
http://support.apple.com/kb/HT3179
http://support.avaya.com/elmodocs2/security/ASA-2008-299.htm
http://support.avaya.com/elmodocs2/security/ASA-2008-428.htm
http://support.avaya.com/elmodocs2/security/ASA-2008-507.htm
http://support.avaya.com/elmodocs2/security/ASA-2008-509.htm
http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=751014
http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=756717
http://www.redhat.com/support/errata/RHSA-2008-0594.html
http://www.redhat.com/support/errata/RHSA-2008-0790.html
http://www.redhat.com/support/errata/RHSA-2008-0906.html
http://www.redhat.com/support/errata/RHSA-2008-1044.html
http://www.redhat.com/support/errata/RHSA-2008-1045.html
http://www.securityfocus.com/archive/1/497041/100/0/threaded
http://www.securityfocus.com/bid/30143
http://www.securitytracker.com/id?1020457
http://www.us-cert.gov/cas/techalerts/TA08-193A.html
http://www.vmware.com/security/advisories/VMSA-2008-0016.html
http://www.vupen.com/english/advisories/2008/2056/references
http://www.vupen.com/english/advisories/2008/2740
1618330 https://bugzilla.redhat.com/show_bug.cgi?id=1618330
cpe:2.3:a:sun:jdk:5.0:update_1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_1:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:5.0:update_10:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_10:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:5.0:update_11:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_11:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:5.0:update_12:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_12:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:5.0:update_13:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_13:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:5.0:update_14:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_14:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:5.0:update_2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_2:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:5.0:update_3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_3:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:5.0:update_4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_4:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:5.0:update_5:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_5:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:5.0:update_6:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_6:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:5.0:update_7:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_7:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:5.0:update_8:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_8:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:5.0:update_9:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_9:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:6:update_1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:6:update_1:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:6:update_2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:6:update_2:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:6:update_3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:6:update_3:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:6:update_4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:6:update_4:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:6:update_5:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:6:update_5:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:*:update_15:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:*:update_15:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:*:update_6:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:*:update_6:*:*:*:*:*:*
cpe:2.3:a:sun:jre:5.0:update_1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_1:*:*:*:*:*:*
cpe:2.3:a:sun:jre:5.0:update_10:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_10:*:*:*:*:*:*
cpe:2.3:a:sun:jre:5.0:update_11:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_11:*:*:*:*:*:*
cpe:2.3:a:sun:jre:5.0:update_12:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_12:*:*:*:*:*:*
cpe:2.3:a:sun:jre:5.0:update_13:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_13:*:*:*:*:*:*
cpe:2.3:a:sun:jre:5.0:update_14:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_14:*:*:*:*:*:*
cpe:2.3:a:sun:jre:5.0:update_2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_2:*:*:*:*:*:*
cpe:2.3:a:sun:jre:5.0:update_3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_3:*:*:*:*:*:*
cpe:2.3:a:sun:jre:5.0:update_4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_4:*:*:*:*:*:*
cpe:2.3:a:sun:jre:5.0:update_5:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_5:*:*:*:*:*:*
cpe:2.3:a:sun:jre:5.0:update_6:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_6:*:*:*:*:*:*
cpe:2.3:a:sun:jre:5.0:update_7:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_7:*:*:*:*:*:*
cpe:2.3:a:sun:jre:5.0:update_8:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_8:*:*:*:*:*:*
cpe:2.3:a:sun:jre:5.0:update_9:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_9:*:*:*:*:*:*
cpe:2.3:a:sun:jre:6:update_1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:6:update_1:*:*:*:*:*:*
cpe:2.3:a:sun:jre:6:update_2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:6:update_2:*:*:*:*:*:*
cpe:2.3:a:sun:jre:6:update_3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:6:update_3:*:*:*:*:*:*
cpe:2.3:a:sun:jre:6:update_4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:6:update_4:*:*:*:*:*:*
cpe:2.3:a:sun:jre:6:update_5:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:6:update_5:*:*:*:*:*:*
cpe:2.3:a:sun:jre:*:update_15:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:*:update_15:*:*:*:*:*:*
cpe:2.3:a:sun:jre:*:update_6:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:*:update_6:*:*:*:*:*:*
CVE-2008-3106 https://nvd.nist.gov/vuln/detail/CVE-2008-3106
GLSA-200911-02 https://security.gentoo.org/glsa/200911-02
RHSA-2008:0594 https://access.redhat.com/errata/RHSA-2008:0594
RHSA-2008:0638 https://access.redhat.com/errata/RHSA-2008:0638
RHSA-2008:0790 https://access.redhat.com/errata/RHSA-2008:0790
RHSA-2008:0906 https://access.redhat.com/errata/RHSA-2008:0906
No exploits are available.
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2008-3106
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.87181
EPSS Score 0.01479
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.