Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-1584

Опубликовано: 15 окт. 2014
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 4.3

Описание

The Public Key Pinning (PKP) implementation in Mozilla Firefox before 33.0 skips pinning checks upon an unspecified issuer-verification error, which makes it easier for remote attackers to bypass an intended pinning configuration and spoof a web site via a crafted certificate that leads to presentation of the Untrusted Connection dialog to the user.

РелизСтатусПримечание
devel

released

33.0+build2-0ubuntu0.14.10.1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [33.0+build2-0ubuntu0.14.04.1]]
lucid

ignored

end of life
precise

released

33.0+build2-0ubuntu0.12.04.1
trusty

released

33.0+build2-0ubuntu0.14.04.1
trusty/esm

DNE

trusty was released [33.0+build2-0ubuntu0.14.04.1]
upstream

released

33.0

Показывать по

EPSS

Процентиль: 71%
0.00682
Низкий

4.3 Medium

CVSS2

Связанные уязвимости

redhat
почти 11 лет назад

The Public Key Pinning (PKP) implementation in Mozilla Firefox before 33.0 skips pinning checks upon an unspecified issuer-verification error, which makes it easier for remote attackers to bypass an intended pinning configuration and spoof a web site via a crafted certificate that leads to presentation of the Untrusted Connection dialog to the user.

nvd
почти 11 лет назад

The Public Key Pinning (PKP) implementation in Mozilla Firefox before 33.0 skips pinning checks upon an unspecified issuer-verification error, which makes it easier for remote attackers to bypass an intended pinning configuration and spoof a web site via a crafted certificate that leads to presentation of the Untrusted Connection dialog to the user.

debian
почти 11 лет назад

The Public Key Pinning (PKP) implementation in Mozilla Firefox before ...

github
около 3 лет назад

The Public Key Pinning (PKP) implementation in Mozilla Firefox before 33.0 skips pinning checks upon an unspecified issuer-verification error, which makes it easier for remote attackers to bypass an intended pinning configuration and spoof a web site via a crafted certificate that leads to presentation of the Untrusted Connection dialog to the user.

EPSS

Процентиль: 71%
0.00682
Низкий

4.3 Medium

CVSS2