{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-27T16:53:04.559","vulnerabilities":[{"cve":{"id":"CVE-2008-1437","sourceIdentifier":"secure@microsoft.com","published":"2008-05-13T22:20:00.000","lastModified":"2026-04-23T00:35:47.467","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Unspecified vulnerability in Microsoft Malware Protection Engine (mpengine.dll) 1.1.3520.0 and 0.1.13.192, as used in multiple Microsoft products, allows context-dependent attackers to cause a denial of service (engine hang and restart) via a crafted file, a different vulnerability than CVE-2008-1438."},{"lang":"es","value":"Vulnerabilidad no especificada en la Máquina de Protección de Malware de Microsoft (mpengine.dll) versiones 1.1.3520.0 y 0.1.13.192, tal y como se usa en múltiples productos de Microsoft, permite a atacantes según contexto provocar una denegación de servicio (cuelgue del equipo y reinicio) a través de un archivo manipulado, una vulnerabilidad diferente a la CVE-2008-1438."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-399"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:antigen_for_exchange:*:*:*:*:*:*:*:*","matchCriteriaId":"ABC4C839-B772-44EB-BD55-7477FFD73C69"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:antigen_for_smtp_gateway:*:*:*:*:*:*:*:*","matchCriteriaId":"F2B3A3CB-9A6C-4FC6-BF90-003D8A9FC3D9"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:diagnostics_and_recovery_toolkit:6.0:*:*:*:*:*:*:*","matchCriteriaId":"166B173E-90D5-4DBF-AD6F-3C804687CB38"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:forefront_client_security:*:*:*:*:*:*:*:*","matchCriteriaId":"769D4056-0E25-4A0A-B0E7-265AC188053A"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:forefront_security_for_exchange_server:*:*:*:*:*:*:*:*","matchCriteriaId":"1B50C829-EFB4-4C5D-B1F2-871F3EE7B5C7"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:forefront_security_for_sharepoint:*:*:*:*:*:*:*:*","matchCriteriaId":"ACFC59CB-6211-49DD-B833-B00D3CE53A18"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:malware_protection_engine:0.1.13.192:*:*:*:*:*:*:*","matchCriteriaId":"8CEA6F8E-1A38-47FC-891C-326EAA8A9F6B"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:malware_protection_engine:1.1.3520.0:*:*:*:*:*:*:*","matchCriteriaId":"A6EFC0F5-EB5E-4D34-9B8B-5C60CCC32D70"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:windows_defender:*:*:*:*:*:*:*:*","matchCriteriaId":"A458632B-D1AE-4643-A8F0-4295B506E341"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:windows_live_onecare:*:*:*:*:*:*:*:*","matchCriteriaId":"4109D8E8-A385-4098-A983-FCF5F69CCD1F"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=121129490723574&w=2","source":"secure@microsoft.com"},{"url":"http://secunia.com/advisories/30172","source":"secure@microsoft.com","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/29060","source":"secure@microsoft.com"},{"url":"http://www.securitytracker.com/id?1020016","source":"secure@microsoft.com"},{"url":"http://www.us-cert.gov/cas/techalerts/TA08-134A.html","source":"secure@microsoft.com","tags":["US Government Resource"]},{"url":"http://www.vupen.com/english/advisories/2008/1506/references","source":"secure@microsoft.com"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-029","source":"secure@microsoft.com"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13981","source":"secure@microsoft.com"},{"url":"http://marc.info/?l=bugtraq&m=121129490723574&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/30172","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/29060","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securitytracker.com/id?1020016","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.us-cert.gov/cas/techalerts/TA08-134A.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.vupen.com/english/advisories/2008/1506/references","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-029","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13981","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}