Логотип exploitDog
bind:CVE-2004-0009
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2004-0009

Количество 4

Количество 4

ubuntu логотип

CVE-2004-0009

больше 21 года назад

Apache-SSL 1.3.28+1.52 and earlier, with SSLVerifyClient set to 1 or 3 and SSLFakeBasicAuth enabled, allows remote attackers to forge a client certificate by using basic authentication with the "one-line DN" of the target user.

CVSS2: 7.5
EPSS: Низкий
nvd логотип

CVE-2004-0009

больше 21 года назад

Apache-SSL 1.3.28+1.52 and earlier, with SSLVerifyClient set to 1 or 3 and SSLFakeBasicAuth enabled, allows remote attackers to forge a client certificate by using basic authentication with the "one-line DN" of the target user.

CVSS2: 7.5
EPSS: Низкий
debian логотип

CVE-2004-0009

больше 21 года назад

Apache-SSL 1.3.28+1.52 and earlier, with SSLVerifyClient set to 1 or 3 ...

CVSS2: 7.5
EPSS: Низкий
github логотип

GHSA-76rg-wcxr-453v

около 3 лет назад

Apache-SSL 1.3.28+1.52 and earlier, with SSLVerifyClient set to 1 or 3 and SSLFakeBasicAuth enabled, allows remote attackers to forge a client certificate by using basic authentication with the "one-line DN" of the target user.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2004-0009

Apache-SSL 1.3.28+1.52 and earlier, with SSLVerifyClient set to 1 or 3 and SSLFakeBasicAuth enabled, allows remote attackers to forge a client certificate by using basic authentication with the "one-line DN" of the target user.

CVSS2: 7.5
1%
Низкий
больше 21 года назад
nvd логотип
CVE-2004-0009

Apache-SSL 1.3.28+1.52 and earlier, with SSLVerifyClient set to 1 or 3 and SSLFakeBasicAuth enabled, allows remote attackers to forge a client certificate by using basic authentication with the "one-line DN" of the target user.

CVSS2: 7.5
1%
Низкий
больше 21 года назад
debian логотип
CVE-2004-0009

Apache-SSL 1.3.28+1.52 and earlier, with SSLVerifyClient set to 1 or 3 ...

CVSS2: 7.5
1%
Низкий
больше 21 года назад
github логотип
GHSA-76rg-wcxr-453v

Apache-SSL 1.3.28+1.52 and earlier, with SSLVerifyClient set to 1 or 3 and SSLFakeBasicAuth enabled, allows remote attackers to forge a client certificate by using basic authentication with the "one-line DN" of the target user.

1%
Низкий
около 3 лет назад

Уязвимостей на страницу