Логотип exploitDog
bind:CVE-2015-2741
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2015-2741

Количество 7

Количество 7

ubuntu логотип

CVE-2015-2741

почти 11 лет назад

Mozilla Firefox before 39.0, Firefox ESR 38.x before 38.1, and Thunderbird before 38.1 do not enforce key pinning upon encountering an X.509 certificate problem that generates a user dialog, which allows user-assisted man-in-the-middle attackers to bypass intended access restrictions by triggering a (1) expired certificate or (2) mismatched hostname for a domain with pinning enabled.

CVSS2: 4.3
EPSS: Низкий
redhat логотип

CVE-2015-2741

почти 11 лет назад

Mozilla Firefox before 39.0, Firefox ESR 38.x before 38.1, and Thunderbird before 38.1 do not enforce key pinning upon encountering an X.509 certificate problem that generates a user dialog, which allows user-assisted man-in-the-middle attackers to bypass intended access restrictions by triggering a (1) expired certificate or (2) mismatched hostname for a domain with pinning enabled.

CVSS2: 4.3
EPSS: Низкий
nvd логотип

CVE-2015-2741

почти 11 лет назад

Mozilla Firefox before 39.0, Firefox ESR 38.x before 38.1, and Thunderbird before 38.1 do not enforce key pinning upon encountering an X.509 certificate problem that generates a user dialog, which allows user-assisted man-in-the-middle attackers to bypass intended access restrictions by triggering a (1) expired certificate or (2) mismatched hostname for a domain with pinning enabled.

CVSS2: 4.3
EPSS: Низкий
debian логотип

CVE-2015-2741

почти 11 лет назад

Mozilla Firefox before 39.0, Firefox ESR 38.x before 38.1, and Thunder ...

CVSS2: 4.3
EPSS: Низкий
github логотип

GHSA-7wmj-q9mp-9x7x

почти 4 года назад

Mozilla Firefox before 39.0, Firefox ESR 38.x before 38.1, and Thunderbird before 38.1 do not enforce key pinning upon encountering an X.509 certificate problem that generates a user dialog, which allows user-assisted man-in-the-middle attackers to bypass intended access restrictions by triggering a (1) expired certificate or (2) mismatched hostname for a domain with pinning enabled.

EPSS: Низкий
oracle-oval логотип

ELSA-2015-1455

больше 10 лет назад

ELSA-2015-1455: thunderbird security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2015-1207

почти 11 лет назад

ELSA-2015-1207: firefox security update (CRITICAL)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2015-2741

Mozilla Firefox before 39.0, Firefox ESR 38.x before 38.1, and Thunderbird before 38.1 do not enforce key pinning upon encountering an X.509 certificate problem that generates a user dialog, which allows user-assisted man-in-the-middle attackers to bypass intended access restrictions by triggering a (1) expired certificate or (2) mismatched hostname for a domain with pinning enabled.

CVSS2: 4.3
0%
Низкий
почти 11 лет назад
redhat логотип
CVE-2015-2741

Mozilla Firefox before 39.0, Firefox ESR 38.x before 38.1, and Thunderbird before 38.1 do not enforce key pinning upon encountering an X.509 certificate problem that generates a user dialog, which allows user-assisted man-in-the-middle attackers to bypass intended access restrictions by triggering a (1) expired certificate or (2) mismatched hostname for a domain with pinning enabled.

CVSS2: 4.3
0%
Низкий
почти 11 лет назад
nvd логотип
CVE-2015-2741

Mozilla Firefox before 39.0, Firefox ESR 38.x before 38.1, and Thunderbird before 38.1 do not enforce key pinning upon encountering an X.509 certificate problem that generates a user dialog, which allows user-assisted man-in-the-middle attackers to bypass intended access restrictions by triggering a (1) expired certificate or (2) mismatched hostname for a domain with pinning enabled.

CVSS2: 4.3
0%
Низкий
почти 11 лет назад
debian логотип
CVE-2015-2741

Mozilla Firefox before 39.0, Firefox ESR 38.x before 38.1, and Thunder ...

CVSS2: 4.3
0%
Низкий
почти 11 лет назад
github логотип
GHSA-7wmj-q9mp-9x7x

Mozilla Firefox before 39.0, Firefox ESR 38.x before 38.1, and Thunderbird before 38.1 do not enforce key pinning upon encountering an X.509 certificate problem that generates a user dialog, which allows user-assisted man-in-the-middle attackers to bypass intended access restrictions by triggering a (1) expired certificate or (2) mismatched hostname for a domain with pinning enabled.

0%
Низкий
почти 4 года назад
oracle-oval логотип
ELSA-2015-1455

ELSA-2015-1455: thunderbird security update (IMPORTANT)

больше 10 лет назад
oracle-oval логотип
ELSA-2015-1207

ELSA-2015-1207: firefox security update (CRITICAL)

почти 11 лет назад

Уязвимостей на страницу