Логотип exploitDog
bind:"CVE-2009-3555" OR bind:"CVE-2009-2409"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2009-3555" OR bind:"CVE-2009-2409"

Количество 55

Количество 55

oracle-oval логотип

ELSA-2010-0166

около 15 лет назад

ELSA-2010-0166: gnutls security update (MODERATE)

EPSS: Низкий
fstec логотип

BDU:2015-09404

больше 15 лет назад

Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить целостность и доступность защищаемой информации

CVSS2: 5.8
EPSS: Низкий
ubuntu логотип

CVE-2009-2409

почти 16 лет назад

The Network Security Services (NSS) library before 3.12.3, as used in Firefox; GnuTLS before 2.6.4 and 2.7.4; OpenSSL 0.9.8 through 0.9.8k; and other products support MD2 with X.509 certificates, which might allow remote attackers to spoof certificates by using MD2 design flaws to generate a hash collision in less than brute-force time. NOTE: the scope of this issue is currently limited because the amount of computation required is still large.

CVSS2: 5.1
EPSS: Низкий
redhat логотип

CVE-2009-2409

почти 16 лет назад

The Network Security Services (NSS) library before 3.12.3, as used in Firefox; GnuTLS before 2.6.4 and 2.7.4; OpenSSL 0.9.8 through 0.9.8k; and other products support MD2 with X.509 certificates, which might allow remote attackers to spoof certificates by using MD2 design flaws to generate a hash collision in less than brute-force time. NOTE: the scope of this issue is currently limited because the amount of computation required is still large.

CVSS2: 2.6
EPSS: Низкий
nvd логотип

CVE-2009-2409

почти 16 лет назад

The Network Security Services (NSS) library before 3.12.3, as used in Firefox; GnuTLS before 2.6.4 and 2.7.4; OpenSSL 0.9.8 through 0.9.8k; and other products support MD2 with X.509 certificates, which might allow remote attackers to spoof certificates by using MD2 design flaws to generate a hash collision in less than brute-force time. NOTE: the scope of this issue is currently limited because the amount of computation required is still large.

CVSS2: 5.1
EPSS: Низкий
debian логотип

CVE-2009-2409

почти 16 лет назад

The Network Security Services (NSS) library before 3.12.3, as used in ...

CVSS2: 5.1
EPSS: Низкий
ubuntu логотип

CVE-2009-3555

больше 15 лет назад

The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.

CVSS2: 5.8
EPSS: Низкий
redhat логотип

CVE-2009-3555

больше 15 лет назад

The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.

CVSS2: 4.3
EPSS: Низкий
nvd логотип

CVE-2009-3555

больше 15 лет назад

The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.

CVSS2: 5.8
EPSS: Низкий
debian логотип

CVE-2009-3555

больше 15 лет назад

The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as us ...

CVSS2: 5.8
EPSS: Низкий
github логотип

GHSA-c2f9-w3c5-x385

около 3 лет назад

The Network Security Services (NSS) library before 3.12.3, as used in Firefox; GnuTLS before 2.6.4 and 2.7.4; OpenSSL 0.9.8 through 0.9.8k; and other products support MD2 with X.509 certificates, which might allow remote attackers to spoof certificates by using MD2 design flaws to generate a hash collision in less than brute-force time. NOTE: the scope of this issue is currently limited because the amount of computation required is still large.

EPSS: Низкий
oracle-oval логотип

ELSA-2010-0054

больше 15 лет назад

ELSA-2010-0054: openssl security update (MODERATE)

EPSS: Низкий
fstec логотип

BDU:2015-03444

больше 10 лет назад

Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

CVSS2: 7.5
EPSS: Низкий
fstec логотип

BDU:2015-03443

почти 16 лет назад

Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

CVSS2: 7.5
EPSS: Низкий
github логотип

GHSA-f7w7-6pjc-wwm6

около 3 лет назад

Apache Tomcat affected by vulnerability in TLS and SSL protocol

EPSS: Низкий
oracle-oval логотип

ELSA-2010-0165

около 15 лет назад

ELSA-2010-0165: nss security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2010-0164

около 15 лет назад

ELSA-2010-0164: openssl097a security update (MODERATE)

EPSS: Низкий
fstec логотип

BDU:2015-08549

около 15 лет назад

Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

CVSS2: 7.5
EPSS: Низкий
fstec логотип

BDU:2015-07481

около 15 лет назад

Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

CVSS2: 7.5
EPSS: Низкий
fstec логотип

BDU:2015-05280

больше 10 лет назад

Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

CVSS2: 5.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2010-0166

ELSA-2010-0166: gnutls security update (MODERATE)

около 15 лет назад
fstec логотип
BDU:2015-09404

Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить целостность и доступность защищаемой информации

CVSS2: 5.8
больше 15 лет назад
ubuntu логотип
CVE-2009-2409

The Network Security Services (NSS) library before 3.12.3, as used in Firefox; GnuTLS before 2.6.4 and 2.7.4; OpenSSL 0.9.8 through 0.9.8k; and other products support MD2 with X.509 certificates, which might allow remote attackers to spoof certificates by using MD2 design flaws to generate a hash collision in less than brute-force time. NOTE: the scope of this issue is currently limited because the amount of computation required is still large.

CVSS2: 5.1
2%
Низкий
почти 16 лет назад
redhat логотип
CVE-2009-2409

The Network Security Services (NSS) library before 3.12.3, as used in Firefox; GnuTLS before 2.6.4 and 2.7.4; OpenSSL 0.9.8 through 0.9.8k; and other products support MD2 with X.509 certificates, which might allow remote attackers to spoof certificates by using MD2 design flaws to generate a hash collision in less than brute-force time. NOTE: the scope of this issue is currently limited because the amount of computation required is still large.

CVSS2: 2.6
2%
Низкий
почти 16 лет назад
nvd логотип
CVE-2009-2409

The Network Security Services (NSS) library before 3.12.3, as used in Firefox; GnuTLS before 2.6.4 and 2.7.4; OpenSSL 0.9.8 through 0.9.8k; and other products support MD2 with X.509 certificates, which might allow remote attackers to spoof certificates by using MD2 design flaws to generate a hash collision in less than brute-force time. NOTE: the scope of this issue is currently limited because the amount of computation required is still large.

CVSS2: 5.1
2%
Низкий
почти 16 лет назад
debian логотип
CVE-2009-2409

The Network Security Services (NSS) library before 3.12.3, as used in ...

CVSS2: 5.1
2%
Низкий
почти 16 лет назад
ubuntu логотип
CVE-2009-3555

The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.

CVSS2: 5.8
4%
Низкий
больше 15 лет назад
redhat логотип
CVE-2009-3555

The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.

CVSS2: 4.3
4%
Низкий
больше 15 лет назад
nvd логотип
CVE-2009-3555

The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.

CVSS2: 5.8
4%
Низкий
больше 15 лет назад
debian логотип
CVE-2009-3555

The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as us ...

CVSS2: 5.8
4%
Низкий
больше 15 лет назад
github логотип
GHSA-c2f9-w3c5-x385

The Network Security Services (NSS) library before 3.12.3, as used in Firefox; GnuTLS before 2.6.4 and 2.7.4; OpenSSL 0.9.8 through 0.9.8k; and other products support MD2 with X.509 certificates, which might allow remote attackers to spoof certificates by using MD2 design flaws to generate a hash collision in less than brute-force time. NOTE: the scope of this issue is currently limited because the amount of computation required is still large.

2%
Низкий
около 3 лет назад
oracle-oval логотип
ELSA-2010-0054

ELSA-2010-0054: openssl security update (MODERATE)

больше 15 лет назад
fstec логотип
BDU:2015-03444

Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

CVSS2: 7.5
больше 10 лет назад
fstec логотип
BDU:2015-03443

Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

CVSS2: 7.5
почти 16 лет назад
github логотип
GHSA-f7w7-6pjc-wwm6

Apache Tomcat affected by vulnerability in TLS and SSL protocol

4%
Низкий
около 3 лет назад
oracle-oval логотип
ELSA-2010-0165

ELSA-2010-0165: nss security update (MODERATE)

около 15 лет назад
oracle-oval логотип
ELSA-2010-0164

ELSA-2010-0164: openssl097a security update (MODERATE)

около 15 лет назад
fstec логотип
BDU:2015-08549

Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

CVSS2: 7.5
4%
Низкий
около 15 лет назад
fstec логотип
BDU:2015-07481

Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

CVSS2: 7.5
4%
Низкий
около 15 лет назад
fstec логотип
BDU:2015-05280

Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

CVSS2: 5.8
4%
Низкий
больше 10 лет назад

Уязвимостей на страницу