{"vulnerability": "cve-2008-1447", "sightings": [{"uuid": "8b4b1e64-4f09-4b57-994a-356a5469f4da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2008-1447", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:38.000000Z"}, {"uuid": "854fe9f2-2dd1-48b5-b70a-f381561ba522", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2008-1447", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:08:28.000000Z"}, {"uuid": "ac3dae7a-c4df-4730-b9dd-d42b1eba43ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2008-1447", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/spoof/dns/bailiwicked_host.rb", "content": "", "creation_timestamp": "2018-05-29T15:50:33.000000Z"}, {"uuid": "de4be61e-9d54-4632-8fa0-2ea75d9042c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2008-1447", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/spoof/dns/bailiwicked_domain.rb", "content": "", "creation_timestamp": "2018-05-29T15:50:33.000000Z"}, {"uuid": "56767063-35b5-4c8e-8131-1a52e368f430", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "db99543d-496c-4eef-ad0a-2df2093364df", "vulnerability": "CVE-2008-1447", "type": "confirmed", "source": "https://www.exploit-db.com/exploits/6123", "content": "", "creation_timestamp": "2008-07-24T00:00:00.000000Z"}, {"uuid": "278ed4a2-ae96-4f91-8616-d9e7371d9f55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "db99543d-496c-4eef-ad0a-2df2093364df", "vulnerability": "CVE-2008-1447", "type": "confirmed", "source": "https://www.exploit-db.com/exploits/6122", "content": "", "creation_timestamp": "2008-07-23T00:00:00.000000Z"}, {"uuid": "4645d572-a3cf-4d86-b0d1-a99e6505eb7b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "db99543d-496c-4eef-ad0a-2df2093364df", "vulnerability": "CVE-2008-1447", "type": "confirmed", "source": "https://www.exploit-db.com/exploits/6130", "content": "", "creation_timestamp": "2008-07-25T00:00:00.000000Z"}, {"uuid": "0586631f-0c36-43b1-b142-9e56b2032906", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2008-1447", "type": "published-proof-of-concept", "source": "Telegram/DOBfrk2dyhFzkyen0Qpzsdfs3pgTsKY3tpML2V_jo-xel9A", "content": "", "creation_timestamp": "2025-08-22T21:00:04.000000Z"}, {"uuid": "01b35c93-4516-477d-b74f-af19c7bd94d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2008-1447", "type": "seen", "source": "https://t.me/VulnerabilityNews/22078", "content": "It was found that various OpenID Providers (OPs) had TLS Server Certificates that used weak keys, as a result of the Debian Predictable Random Number Generator (CVE-2008-0166). In combination with the DNS Cache Poisoning issue (CVE-2008-1447) and the fact that almost all SSL/TLS implementations do not consult CRLs (currently an untracked issue), this means that it is impossible to rely on these OPs.\nPublished at: May 21, 2021 at 10:15PM\nView on website", "creation_timestamp": "2021-05-22T00:46:52.000000Z"}]}