Количество 3
Количество 3
CVE-2015-5887
The TLS Handshake Protocol implementation in Secure Transport in Apple OS X before 10.11 accepts a Certificate Request message within a session in which no Server Key Exchange message has been sent, which allows remote attackers to have an unspecified impact via crafted TLS data.
GHSA-2x8v-355v-69p5
The TLS Handshake Protocol implementation in Secure Transport in Apple OS X before 10.11 accepts a Certificate Request message within a session in which no Server Key Exchange message has been sent, which allows remote attackers to have an unspecified impact via crafted TLS data.
BDU:2015-11639
Уязвимость операционной системы Mac OS X, позволяющая нарушителю нарушить безопасность информации
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2015-5887 The TLS Handshake Protocol implementation in Secure Transport in Apple OS X before 10.11 accepts a Certificate Request message within a session in which no Server Key Exchange message has been sent, which allows remote attackers to have an unspecified impact via crafted TLS data. | CVSS2: 10 | 1% Низкий | больше 10 лет назад | |
GHSA-2x8v-355v-69p5 The TLS Handshake Protocol implementation in Secure Transport in Apple OS X before 10.11 accepts a Certificate Request message within a session in which no Server Key Exchange message has been sent, which allows remote attackers to have an unspecified impact via crafted TLS data. | 1% Низкий | больше 3 лет назад | ||
BDU:2015-11639 Уязвимость операционной системы Mac OS X, позволяющая нарушителю нарушить безопасность информации | CVSS2: 10 | 1% Низкий | больше 10 лет назад |
Уязвимостей на страницу