Логотип exploitDog
bind:CVE-2015-2741
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2015-2741

Количество 7

Количество 7

ubuntu логотип

CVE-2015-2741

около 10 лет назад

Mozilla Firefox before 39.0, Firefox ESR 38.x before 38.1, and Thunderbird before 38.1 do not enforce key pinning upon encountering an X.509 certificate problem that generates a user dialog, which allows user-assisted man-in-the-middle attackers to bypass intended access restrictions by triggering a (1) expired certificate or (2) mismatched hostname for a domain with pinning enabled.

CVSS2: 4.3
EPSS: Низкий
redhat логотип

CVE-2015-2741

около 10 лет назад

Mozilla Firefox before 39.0, Firefox ESR 38.x before 38.1, and Thunderbird before 38.1 do not enforce key pinning upon encountering an X.509 certificate problem that generates a user dialog, which allows user-assisted man-in-the-middle attackers to bypass intended access restrictions by triggering a (1) expired certificate or (2) mismatched hostname for a domain with pinning enabled.

CVSS2: 4.3
EPSS: Низкий
nvd логотип

CVE-2015-2741

около 10 лет назад

Mozilla Firefox before 39.0, Firefox ESR 38.x before 38.1, and Thunderbird before 38.1 do not enforce key pinning upon encountering an X.509 certificate problem that generates a user dialog, which allows user-assisted man-in-the-middle attackers to bypass intended access restrictions by triggering a (1) expired certificate or (2) mismatched hostname for a domain with pinning enabled.

CVSS2: 4.3
EPSS: Низкий
debian логотип

CVE-2015-2741

около 10 лет назад

Mozilla Firefox before 39.0, Firefox ESR 38.x before 38.1, and Thunder ...

CVSS2: 4.3
EPSS: Низкий
github логотип

GHSA-7wmj-q9mp-9x7x

около 3 лет назад

Mozilla Firefox before 39.0, Firefox ESR 38.x before 38.1, and Thunderbird before 38.1 do not enforce key pinning upon encountering an X.509 certificate problem that generates a user dialog, which allows user-assisted man-in-the-middle attackers to bypass intended access restrictions by triggering a (1) expired certificate or (2) mismatched hostname for a domain with pinning enabled.

EPSS: Низкий
oracle-oval логотип

ELSA-2015-1455

около 10 лет назад

ELSA-2015-1455: thunderbird security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2015-1207

около 10 лет назад

ELSA-2015-1207: firefox security update (CRITICAL)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2015-2741

Mozilla Firefox before 39.0, Firefox ESR 38.x before 38.1, and Thunderbird before 38.1 do not enforce key pinning upon encountering an X.509 certificate problem that generates a user dialog, which allows user-assisted man-in-the-middle attackers to bypass intended access restrictions by triggering a (1) expired certificate or (2) mismatched hostname for a domain with pinning enabled.

CVSS2: 4.3
1%
Низкий
около 10 лет назад
redhat логотип
CVE-2015-2741

Mozilla Firefox before 39.0, Firefox ESR 38.x before 38.1, and Thunderbird before 38.1 do not enforce key pinning upon encountering an X.509 certificate problem that generates a user dialog, which allows user-assisted man-in-the-middle attackers to bypass intended access restrictions by triggering a (1) expired certificate or (2) mismatched hostname for a domain with pinning enabled.

CVSS2: 4.3
1%
Низкий
около 10 лет назад
nvd логотип
CVE-2015-2741

Mozilla Firefox before 39.0, Firefox ESR 38.x before 38.1, and Thunderbird before 38.1 do not enforce key pinning upon encountering an X.509 certificate problem that generates a user dialog, which allows user-assisted man-in-the-middle attackers to bypass intended access restrictions by triggering a (1) expired certificate or (2) mismatched hostname for a domain with pinning enabled.

CVSS2: 4.3
1%
Низкий
около 10 лет назад
debian логотип
CVE-2015-2741

Mozilla Firefox before 39.0, Firefox ESR 38.x before 38.1, and Thunder ...

CVSS2: 4.3
1%
Низкий
около 10 лет назад
github логотип
GHSA-7wmj-q9mp-9x7x

Mozilla Firefox before 39.0, Firefox ESR 38.x before 38.1, and Thunderbird before 38.1 do not enforce key pinning upon encountering an X.509 certificate problem that generates a user dialog, which allows user-assisted man-in-the-middle attackers to bypass intended access restrictions by triggering a (1) expired certificate or (2) mismatched hostname for a domain with pinning enabled.

1%
Низкий
около 3 лет назад
oracle-oval логотип
ELSA-2015-1455

ELSA-2015-1455: thunderbird security update (IMPORTANT)

около 10 лет назад
oracle-oval логотип
ELSA-2015-1207

ELSA-2015-1207: firefox security update (CRITICAL)

около 10 лет назад

Уязвимостей на страницу