Логотип exploitDog
bind:CVE-2007-6591
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2007-6591

Количество 5

Количество 5

ubuntu логотип

CVE-2007-6591

больше 17 лет назад

KDE Konqueror 3.5.5 and 3.95.00, when a user accepts an SSL server certificate on the basis of the CN domain name in the DN field, regards the certificate as also accepted for all domain names in subjectAltName:dNSName fields, even though these fields cannot be examined in the product, which makes it easier for remote attackers to trick a user into accepting an invalid certificate for a spoofed web site.

CVSS2: 4.3
EPSS: Низкий
redhat логотип

CVE-2007-6591

почти 18 лет назад

KDE Konqueror 3.5.5 and 3.95.00, when a user accepts an SSL server certificate on the basis of the CN domain name in the DN field, regards the certificate as also accepted for all domain names in subjectAltName:dNSName fields, even though these fields cannot be examined in the product, which makes it easier for remote attackers to trick a user into accepting an invalid certificate for a spoofed web site.

CVSS2: 4.3
EPSS: Низкий
nvd логотип

CVE-2007-6591

больше 17 лет назад

KDE Konqueror 3.5.5 and 3.95.00, when a user accepts an SSL server certificate on the basis of the CN domain name in the DN field, regards the certificate as also accepted for all domain names in subjectAltName:dNSName fields, even though these fields cannot be examined in the product, which makes it easier for remote attackers to trick a user into accepting an invalid certificate for a spoofed web site.

CVSS2: 4.3
EPSS: Низкий
debian логотип

CVE-2007-6591

больше 17 лет назад

KDE Konqueror 3.5.5 and 3.95.00, when a user accepts an SSL server cer ...

CVSS2: 4.3
EPSS: Низкий
github логотип

GHSA-v2mp-wwpv-88m2

больше 3 лет назад

KDE Konqueror 3.5.5 and 3.95.00, when a user accepts an SSL server certificate on the basis of the CN domain name in the DN field, regards the certificate as also accepted for all domain names in subjectAltName:dNSName fields, even though these fields cannot be examined in the product, which makes it easier for remote attackers to trick a user into accepting an invalid certificate for a spoofed web site.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2007-6591

KDE Konqueror 3.5.5 and 3.95.00, when a user accepts an SSL server certificate on the basis of the CN domain name in the DN field, regards the certificate as also accepted for all domain names in subjectAltName:dNSName fields, even though these fields cannot be examined in the product, which makes it easier for remote attackers to trick a user into accepting an invalid certificate for a spoofed web site.

CVSS2: 4.3
0%
Низкий
больше 17 лет назад
redhat логотип
CVE-2007-6591

KDE Konqueror 3.5.5 and 3.95.00, when a user accepts an SSL server certificate on the basis of the CN domain name in the DN field, regards the certificate as also accepted for all domain names in subjectAltName:dNSName fields, even though these fields cannot be examined in the product, which makes it easier for remote attackers to trick a user into accepting an invalid certificate for a spoofed web site.

CVSS2: 4.3
0%
Низкий
почти 18 лет назад
nvd логотип
CVE-2007-6591

KDE Konqueror 3.5.5 and 3.95.00, when a user accepts an SSL server certificate on the basis of the CN domain name in the DN field, regards the certificate as also accepted for all domain names in subjectAltName:dNSName fields, even though these fields cannot be examined in the product, which makes it easier for remote attackers to trick a user into accepting an invalid certificate for a spoofed web site.

CVSS2: 4.3
0%
Низкий
больше 17 лет назад
debian логотип
CVE-2007-6591

KDE Konqueror 3.5.5 and 3.95.00, when a user accepts an SSL server cer ...

CVSS2: 4.3
0%
Низкий
больше 17 лет назад
github логотип
GHSA-v2mp-wwpv-88m2

KDE Konqueror 3.5.5 and 3.95.00, when a user accepts an SSL server certificate on the basis of the CN domain name in the DN field, regards the certificate as also accepted for all domain names in subjectAltName:dNSName fields, even though these fields cannot be examined in the product, which makes it easier for remote attackers to trick a user into accepting an invalid certificate for a spoofed web site.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу