Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2011-3389

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-06 Sep, 2011 | 19:00
Updated At-06 Aug, 2024 | 23:29
Rejected At-
Credits

The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:06 Sep, 2011 | 19:00
Updated At:06 Aug, 2024 | 23:29
Rejected At:
â–¼CVE Numbering Authority (CNA)

The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://osvdb.org/74829
vdb-entry
x_refsource_OSVDB
http://eprint.iacr.org/2004/111
x_refsource_MISC
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
x_refsource_CONFIRM
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
x_refsource_MISC
http://security.gentoo.org/glsa/glsa-201406-32.xml
vendor-advisory
x_refsource_GENTOO
http://secunia.com/advisories/48692
third-party-advisory
x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=134254866602253&w=2
vendor-advisory
x_refsource_HP
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=133365109612558&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/55322
third-party-advisory
x_refsource_SECUNIA
http://support.apple.com/kb/HT5130
x_refsource_CONFIRM
https://bugzilla.redhat.com/show_bug.cgi?id=737506
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=132750579901589&w=2
vendor-advisory
x_refsource_HP
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
vendor-advisory
x_refsource_SUSE
http://www.securitytracker.com/id?1025997
vdb-entry
x_refsource_SECTRACK
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
third-party-advisory
x_refsource_CERT
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
vendor-advisory
x_refsource_APPLE
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
vendor-advisory
x_refsource_SUSE
http://www.securityfocus.com/bid/49388
vdb-entry
x_refsource_BID
http://ekoparty.org/2011/juliano-rizzo.php
x_refsource_MISC
http://downloads.asterisk.org/pub/security/AST-2016-001.html
x_refsource_CONFIRM
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
x_refsource_CONFIRM
http://rhn.redhat.com/errata/RHSA-2013-1455.html
vendor-advisory
x_refsource_REDHAT
http://secunia.com/advisories/55351
third-party-advisory
x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=132750579901589&w=2
vendor-advisory
x_refsource_HP
http://www.kb.cert.org/vuls/id/864643
third-party-advisory
x_refsource_CERT-VN
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
vendor-advisory
x_refsource_APPLE
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
x_refsource_CONFIRM
http://www.securityfocus.com/bid/49778
vdb-entry
x_refsource_BID
http://www.debian.org/security/2012/dsa-2398
vendor-advisory
x_refsource_DEBIAN
http://secunia.com/advisories/48948
third-party-advisory
x_refsource_SECUNIA
http://support.apple.com/kb/HT6150
x_refsource_CONFIRM
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
vendor-advisory
x_refsource_APPLE
http://technet.microsoft.com/security/advisory/2588513
x_refsource_CONFIRM
https://hermes.opensuse.org/messages/13155432
vendor-advisory
x_refsource_SUSE
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
x_refsource_CONFIRM
http://www.redhat.com/support/errata/RHSA-2011-1384.html
vendor-advisory
x_refsource_REDHAT
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
x_refsource_CONFIRM
http://www.opera.com/docs/changelogs/windows/1151/
x_refsource_CONFIRM
https://hermes.opensuse.org/messages/13154861
vendor-advisory
x_refsource_SUSE
http://eprint.iacr.org/2006/136
x_refsource_MISC
http://secunia.com/advisories/48915
third-party-advisory
x_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-201203-02.xml
vendor-advisory
x_refsource_GENTOO
http://marc.info/?l=bugtraq&m=132872385320240&w=2
vendor-advisory
x_refsource_HP
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
x_refsource_MISC
http://secunia.com/advisories/48256
third-party-advisory
x_refsource_SECUNIA
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
vendor-advisory
x_refsource_APPLE
http://www.securitytracker.com/id?1026103
vdb-entry
x_refsource_SECTRACK
http://support.apple.com/kb/HT4999
x_refsource_CONFIRM
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
x_refsource_CONFIRM
http://support.apple.com/kb/HT5501
x_refsource_CONFIRM
http://www.insecure.cl/Beast-SSL.rar
x_refsource_MISC
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
x_refsource_MISC
http://support.apple.com/kb/HT5001
x_refsource_CONFIRM
http://www.opera.com/docs/changelogs/mac/1160/
x_refsource_CONFIRM
http://curl.haxx.se/docs/adv_20120124B.html
x_refsource_CONFIRM
http://www.opera.com/support/kb/view/1004/
x_refsource_CONFIRM
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
x_refsource_CONFIRM
http://www.securitytracker.com/id?1026704
vdb-entry
x_refsource_SECTRACK
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
vendor-advisory
x_refsource_APPLE
http://marc.info/?l=bugtraq&m=132872385320240&w=2
vendor-advisory
x_refsource_HP
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
x_refsource_CONFIRM
http://rhn.redhat.com/errata/RHSA-2012-0508.html
vendor-advisory
x_refsource_REDHAT
http://secunia.com/advisories/45791
third-party-advisory
x_refsource_SECUNIA
http://www.securitytracker.com/id/1029190
vdb-entry
x_refsource_SECTRACK
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
vendor-advisory
x_refsource_MANDRIVA
http://secunia.com/advisories/47998
third-party-advisory
x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=134254957702612&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/49198
third-party-advisory
x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2012-0006.html
vendor-advisory
x_refsource_REDHAT
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
x_refsource_CONFIRM
http://www.opera.com/docs/changelogs/windows/1160/
x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
vendor-advisory
x_refsource_SUSE
http://marc.info/?l=bugtraq&m=133728004526190&w=2
vendor-advisory
x_refsource_HP
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
vdb-entry
signature
x_refsource_OVAL
http://www.opera.com/docs/changelogs/unix/1151/
x_refsource_CONFIRM
http://www.opera.com/docs/changelogs/mac/1151/
x_refsource_CONFIRM
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
vendor-advisory
x_refsource_MS
http://marc.info/?l=bugtraq&m=133365109612558&w=2
vendor-advisory
x_refsource_HP
http://www.opera.com/docs/changelogs/unix/1160/
x_refsource_CONFIRM
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
x_refsource_CONFIRM
http://support.apple.com/kb/HT5281
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=133728004526190&w=2
vendor-advisory
x_refsource_HP
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
vendor-advisory
x_refsource_APPLE
https://bugzilla.novell.com/show_bug.cgi?id=719047
x_refsource_CONFIRM
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
vendor-advisory
x_refsource_HP
http://vnhacker.blogspot.com/2011/09/beast.html
x_refsource_MISC
http://www.ubuntu.com/usn/USN-1263-1
vendor-advisory
x_refsource_UBUNTU
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
vendor-advisory
x_refsource_APPLE
http://secunia.com/advisories/55350
third-party-advisory
x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=134254957702612&w=2
vendor-advisory
x_refsource_HP
http://www.ibm.com/developerworks/java/jdk/alerts/
x_refsource_CONFIRM
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
vendor-advisory
x_refsource_SUSE
Hyperlink: http://osvdb.org/74829
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://eprint.iacr.org/2004/111
Resource:
x_refsource_MISC
Hyperlink: http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
Resource:
x_refsource_MISC
Hyperlink: http://security.gentoo.org/glsa/glsa-201406-32.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://secunia.com/advisories/48692
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://marc.info/?l=bugtraq&m=134254866602253&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=133365109612558&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/55322
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://support.apple.com/kb/HT5130
Resource:
x_refsource_CONFIRM
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=737506
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=132750579901589&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://www.securitytracker.com/id?1025997
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA12-010A.html
Resource:
third-party-advisory
x_refsource_CERT
Hyperlink: http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://www.securityfocus.com/bid/49388
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://ekoparty.org/2011/juliano-rizzo.php
Resource:
x_refsource_MISC
Hyperlink: http://downloads.asterisk.org/pub/security/AST-2016-001.html
Resource:
x_refsource_CONFIRM
Hyperlink: https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
Resource:
x_refsource_CONFIRM
Hyperlink: http://rhn.redhat.com/errata/RHSA-2013-1455.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://secunia.com/advisories/55351
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://marc.info/?l=bugtraq&m=132750579901589&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.kb.cert.org/vuls/id/864643
Resource:
third-party-advisory
x_refsource_CERT-VN
Hyperlink: http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.securityfocus.com/bid/49778
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://www.debian.org/security/2012/dsa-2398
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://secunia.com/advisories/48948
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://support.apple.com/kb/HT6150
Resource:
x_refsource_CONFIRM
Hyperlink: http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: http://technet.microsoft.com/security/advisory/2588513
Resource:
x_refsource_CONFIRM
Hyperlink: https://hermes.opensuse.org/messages/13155432
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.redhat.com/support/errata/RHSA-2011-1384.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.opera.com/docs/changelogs/windows/1151/
Resource:
x_refsource_CONFIRM
Hyperlink: https://hermes.opensuse.org/messages/13154861
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://eprint.iacr.org/2006/136
Resource:
x_refsource_MISC
Hyperlink: http://secunia.com/advisories/48915
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://security.gentoo.org/glsa/glsa-201203-02.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://marc.info/?l=bugtraq&m=132872385320240&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
Resource:
x_refsource_MISC
Hyperlink: http://secunia.com/advisories/48256
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: http://www.securitytracker.com/id?1026103
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://support.apple.com/kb/HT4999
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://support.apple.com/kb/HT5501
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.insecure.cl/Beast-SSL.rar
Resource:
x_refsource_MISC
Hyperlink: https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
Resource:
x_refsource_MISC
Hyperlink: http://support.apple.com/kb/HT5001
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.opera.com/docs/changelogs/mac/1160/
Resource:
x_refsource_CONFIRM
Hyperlink: http://curl.haxx.se/docs/adv_20120124B.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.opera.com/support/kb/view/1004/
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.securitytracker.com/id?1026704
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: http://marc.info/?l=bugtraq&m=132872385320240&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
Resource:
x_refsource_CONFIRM
Hyperlink: http://rhn.redhat.com/errata/RHSA-2012-0508.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://secunia.com/advisories/45791
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securitytracker.com/id/1029190
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: http://secunia.com/advisories/47998
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://marc.info/?l=bugtraq&m=134254957702612&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/49198
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.redhat.com/support/errata/RHSA-2012-0006.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.opera.com/docs/changelogs/windows/1160/
Resource:
x_refsource_CONFIRM
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://marc.info/?l=bugtraq&m=133728004526190&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://www.opera.com/docs/changelogs/unix/1151/
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.opera.com/docs/changelogs/mac/1151/
Resource:
x_refsource_CONFIRM
Hyperlink: https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
Resource:
vendor-advisory
x_refsource_MS
Hyperlink: http://marc.info/?l=bugtraq&m=133365109612558&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.opera.com/docs/changelogs/unix/1160/
Resource:
x_refsource_CONFIRM
Hyperlink: http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://support.apple.com/kb/HT5281
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=133728004526190&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: https://bugzilla.novell.com/show_bug.cgi?id=719047
Resource:
x_refsource_CONFIRM
Hyperlink: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://vnhacker.blogspot.com/2011/09/beast.html
Resource:
x_refsource_MISC
Hyperlink: http://www.ubuntu.com/usn/USN-1263-1
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: http://secunia.com/advisories/55350
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://marc.info/?l=bugtraq&m=134254957702612&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.ibm.com/developerworks/java/jdk/alerts/
Resource:
x_refsource_CONFIRM
Hyperlink: https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
Resource:
x_refsource_CONFIRM
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
Resource:
vendor-advisory
x_refsource_SUSE
â–¼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://osvdb.org/74829
vdb-entry
x_refsource_OSVDB
x_transferred
http://eprint.iacr.org/2004/111
x_refsource_MISC
x_transferred
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
x_refsource_CONFIRM
x_transferred
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
x_refsource_MISC
x_transferred
http://security.gentoo.org/glsa/glsa-201406-32.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://secunia.com/advisories/48692
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://marc.info/?l=bugtraq&m=134254866602253&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=133365109612558&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/55322
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://support.apple.com/kb/HT5130
x_refsource_CONFIRM
x_transferred
https://bugzilla.redhat.com/show_bug.cgi?id=737506
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=132750579901589&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://www.securitytracker.com/id?1025997
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
third-party-advisory
x_refsource_CERT
x_transferred
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
vendor-advisory
x_refsource_APPLE
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://www.securityfocus.com/bid/49388
vdb-entry
x_refsource_BID
x_transferred
http://ekoparty.org/2011/juliano-rizzo.php
x_refsource_MISC
x_transferred
http://downloads.asterisk.org/pub/security/AST-2016-001.html
x_refsource_CONFIRM
x_transferred
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
x_refsource_CONFIRM
x_transferred
http://rhn.redhat.com/errata/RHSA-2013-1455.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://secunia.com/advisories/55351
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://marc.info/?l=bugtraq&m=132750579901589&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www.kb.cert.org/vuls/id/864643
third-party-advisory
x_refsource_CERT-VN
x_transferred
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
vendor-advisory
x_refsource_APPLE
x_transferred
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
x_refsource_CONFIRM
x_transferred
http://www.securityfocus.com/bid/49778
vdb-entry
x_refsource_BID
x_transferred
http://www.debian.org/security/2012/dsa-2398
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://secunia.com/advisories/48948
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://support.apple.com/kb/HT6150
x_refsource_CONFIRM
x_transferred
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
vendor-advisory
x_refsource_APPLE
x_transferred
http://technet.microsoft.com/security/advisory/2588513
x_refsource_CONFIRM
x_transferred
https://hermes.opensuse.org/messages/13155432
vendor-advisory
x_refsource_SUSE
x_transferred
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
x_refsource_CONFIRM
x_transferred
http://www.redhat.com/support/errata/RHSA-2011-1384.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
x_refsource_CONFIRM
x_transferred
http://www.opera.com/docs/changelogs/windows/1151/
x_refsource_CONFIRM
x_transferred
https://hermes.opensuse.org/messages/13154861
vendor-advisory
x_refsource_SUSE
x_transferred
http://eprint.iacr.org/2006/136
x_refsource_MISC
x_transferred
http://secunia.com/advisories/48915
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://security.gentoo.org/glsa/glsa-201203-02.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://marc.info/?l=bugtraq&m=132872385320240&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
x_refsource_MISC
x_transferred
http://secunia.com/advisories/48256
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
vendor-advisory
x_refsource_APPLE
x_transferred
http://www.securitytracker.com/id?1026103
vdb-entry
x_refsource_SECTRACK
x_transferred
http://support.apple.com/kb/HT4999
x_refsource_CONFIRM
x_transferred
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
x_refsource_CONFIRM
x_transferred
http://support.apple.com/kb/HT5501
x_refsource_CONFIRM
x_transferred
http://www.insecure.cl/Beast-SSL.rar
x_refsource_MISC
x_transferred
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
x_refsource_MISC
x_transferred
http://support.apple.com/kb/HT5001
x_refsource_CONFIRM
x_transferred
http://www.opera.com/docs/changelogs/mac/1160/
x_refsource_CONFIRM
x_transferred
http://curl.haxx.se/docs/adv_20120124B.html
x_refsource_CONFIRM
x_transferred
http://www.opera.com/support/kb/view/1004/
x_refsource_CONFIRM
x_transferred
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
x_refsource_CONFIRM
x_transferred
http://www.securitytracker.com/id?1026704
vdb-entry
x_refsource_SECTRACK
x_transferred
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
vendor-advisory
x_refsource_APPLE
x_transferred
http://marc.info/?l=bugtraq&m=132872385320240&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
x_refsource_CONFIRM
x_transferred
http://rhn.redhat.com/errata/RHSA-2012-0508.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://secunia.com/advisories/45791
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securitytracker.com/id/1029190
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
vendor-advisory
x_refsource_MANDRIVA
x_transferred
http://secunia.com/advisories/47998
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://marc.info/?l=bugtraq&m=134254957702612&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/49198
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.redhat.com/support/errata/RHSA-2012-0006.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
x_refsource_CONFIRM
x_transferred
http://www.opera.com/docs/changelogs/windows/1160/
x_refsource_CONFIRM
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://marc.info/?l=bugtraq&m=133728004526190&w=2
vendor-advisory
x_refsource_HP
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://www.opera.com/docs/changelogs/unix/1151/
x_refsource_CONFIRM
x_transferred
http://www.opera.com/docs/changelogs/mac/1151/
x_refsource_CONFIRM
x_transferred
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
vendor-advisory
x_refsource_MS
x_transferred
http://marc.info/?l=bugtraq&m=133365109612558&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www.opera.com/docs/changelogs/unix/1160/
x_refsource_CONFIRM
x_transferred
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
x_refsource_CONFIRM
x_transferred
http://support.apple.com/kb/HT5281
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=133728004526190&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
vendor-advisory
x_refsource_APPLE
x_transferred
https://bugzilla.novell.com/show_bug.cgi?id=719047
x_refsource_CONFIRM
x_transferred
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
vendor-advisory
x_refsource_HP
x_transferred
http://vnhacker.blogspot.com/2011/09/beast.html
x_refsource_MISC
x_transferred
http://www.ubuntu.com/usn/USN-1263-1
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
vendor-advisory
x_refsource_APPLE
x_transferred
http://secunia.com/advisories/55350
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://marc.info/?l=bugtraq&m=134254957702612&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www.ibm.com/developerworks/java/jdk/alerts/
x_refsource_CONFIRM
x_transferred
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
x_refsource_CONFIRM
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://osvdb.org/74829
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://eprint.iacr.org/2004/111
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://security.gentoo.org/glsa/glsa-201406-32.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://secunia.com/advisories/48692
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=134254866602253&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=133365109612558&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/55322
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://support.apple.com/kb/HT5130
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=737506
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=132750579901589&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://www.securitytracker.com/id?1025997
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA12-010A.html
Resource:
third-party-advisory
x_refsource_CERT
x_transferred
Hyperlink: http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://www.securityfocus.com/bid/49388
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://ekoparty.org/2011/juliano-rizzo.php
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://downloads.asterisk.org/pub/security/AST-2016-001.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://rhn.redhat.com/errata/RHSA-2013-1455.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://secunia.com/advisories/55351
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=132750579901589&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.kb.cert.org/vuls/id/864643
Resource:
third-party-advisory
x_refsource_CERT-VN
x_transferred
Hyperlink: http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securityfocus.com/bid/49778
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://www.debian.org/security/2012/dsa-2398
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://secunia.com/advisories/48948
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://support.apple.com/kb/HT6150
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: http://technet.microsoft.com/security/advisory/2588513
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://hermes.opensuse.org/messages/13155432
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2011-1384.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.opera.com/docs/changelogs/windows/1151/
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://hermes.opensuse.org/messages/13154861
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://eprint.iacr.org/2006/136
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://secunia.com/advisories/48915
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://security.gentoo.org/glsa/glsa-201203-02.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=132872385320240&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://secunia.com/advisories/48256
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: http://www.securitytracker.com/id?1026103
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://support.apple.com/kb/HT4999
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://support.apple.com/kb/HT5501
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.insecure.cl/Beast-SSL.rar
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://support.apple.com/kb/HT5001
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.opera.com/docs/changelogs/mac/1160/
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://curl.haxx.se/docs/adv_20120124B.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.opera.com/support/kb/view/1004/
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securitytracker.com/id?1026704
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=132872385320240&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://rhn.redhat.com/errata/RHSA-2012-0508.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://secunia.com/advisories/45791
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securitytracker.com/id/1029190
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: http://secunia.com/advisories/47998
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=134254957702612&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/49198
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2012-0006.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.opera.com/docs/changelogs/windows/1160/
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=133728004526190&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://www.opera.com/docs/changelogs/unix/1151/
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.opera.com/docs/changelogs/mac/1151/
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
Resource:
vendor-advisory
x_refsource_MS
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=133365109612558&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.opera.com/docs/changelogs/unix/1160/
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://support.apple.com/kb/HT5281
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=133728004526190&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: https://bugzilla.novell.com/show_bug.cgi?id=719047
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://vnhacker.blogspot.com/2011/09/beast.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.ubuntu.com/usn/USN-1263-1
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: http://secunia.com/advisories/55350
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=134254957702612&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.ibm.com/developerworks/java/jdk/alerts/
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:06 Sep, 2011 | 19:55
Updated At:11 Apr, 2025 | 00:51

The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.04.3MEDIUM
AV:N/AC:M/Au:N/C:P/I:N/A:N
Type: Primary
Version: 2.0
Base score: 4.3
Base severity: MEDIUM
Vector:
AV:N/AC:M/Au:N/C:P/I:N/A:N
CPE Matches

Google LLC
google
>>chrome>>-
cpe:2.3:a:google:chrome:-:*:*:*:*:*:*:*
Microsoft Corporation
microsoft
>>internet_explorer>>-
cpe:2.3:a:microsoft:internet_explorer:-:*:*:*:*:*:*:*
Mozilla Corporation
mozilla
>>firefox>>-
cpe:2.3:a:mozilla:firefox:-:*:*:*:*:*:*:*
Opera
opera
>>opera_browser>>-
cpe:2.3:a:opera:opera_browser:-:*:*:*:*:*:*:*
Microsoft Corporation
microsoft
>>windows>>-
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_rf68xr_firmware>>Versions before 3.2.1(exclusive)
cpe:2.3:o:siemens:simatic_rf68xr_firmware:*:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_rf68xr>>-
cpe:2.3:h:siemens:simatic_rf68xr:-:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_rf615r_firmware>>Versions before 3.2.1(exclusive)
cpe:2.3:o:siemens:simatic_rf615r_firmware:*:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_rf615r>>-
cpe:2.3:h:siemens:simatic_rf615r:-:*:*:*:*:*:*:*
CURL
haxx
>>curl>>Versions from 7.10.6(inclusive) to 7.23.1(inclusive)
cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_desktop>>5.0
cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_desktop>>6.0
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_eus>>6.2
cpe:2.3:o:redhat:enterprise_linux_eus:6.2:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_server>>5.0
cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_server>>6.0
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_server_aus>>6.2
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_workstation>>5.0
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_workstation>>6.0
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
Debian GNU/Linux
debian
>>debian_linux>>5.0
cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
Debian GNU/Linux
debian
>>debian_linux>>6.0
cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
Canonical Ltd.
canonical
>>ubuntu_linux>>10.04
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
Canonical Ltd.
canonical
>>ubuntu_linux>>10.10
cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
Canonical Ltd.
canonical
>>ubuntu_linux>>11.04
cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*
Canonical Ltd.
canonical
>>ubuntu_linux>>11.10
cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-326Primarynvd@nist.gov
CWE ID: CWE-326
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/cve@mitre.org
Third Party Advisory
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspxcve@mitre.org
Third Party Advisory
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspxcve@mitre.org
Third Party Advisory
http://curl.haxx.se/docs/adv_20120124B.htmlcve@mitre.org
Third Party Advisory
http://downloads.asterisk.org/pub/security/AST-2016-001.htmlcve@mitre.org
Third Party Advisory
http://ekoparty.org/2011/juliano-rizzo.phpcve@mitre.org
Broken Link
http://eprint.iacr.org/2004/111cve@mitre.org
Third Party Advisory
http://eprint.iacr.org/2006/136cve@mitre.org
Third Party Advisory
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.htmlcve@mitre.org
Not Applicable
Vendor Advisory
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635cve@mitre.org
Third Party Advisory
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.htmlcve@mitre.org
Broken Link
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.htmlcve@mitre.org
Broken Link
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.htmlcve@mitre.org
Broken Link
Mailing List
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.htmlcve@mitre.org
Broken Link
Mailing List
http://lists.apple.com/archives/security-announce/2012/May/msg00001.htmlcve@mitre.org
Broken Link
Mailing List
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.htmlcve@mitre.org
Broken Link
Mailing List
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.htmlcve@mitre.org
Broken Link
Mailing List
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.htmlcve@mitre.org
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.htmlcve@mitre.org
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.htmlcve@mitre.org
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.htmlcve@mitre.org
Broken Link
http://marc.info/?l=bugtraq&m=132750579901589&w=2cve@mitre.org
Issue Tracking
Mailing List
Third Party Advisory
http://marc.info/?l=bugtraq&m=132750579901589&w=2cve@mitre.org
Issue Tracking
Mailing List
Third Party Advisory
http://marc.info/?l=bugtraq&m=132872385320240&w=2cve@mitre.org
Issue Tracking
Mailing List
Third Party Advisory
http://marc.info/?l=bugtraq&m=132872385320240&w=2cve@mitre.org
Issue Tracking
Mailing List
Third Party Advisory
http://marc.info/?l=bugtraq&m=133365109612558&w=2cve@mitre.org
Issue Tracking
Mailing List
Third Party Advisory
http://marc.info/?l=bugtraq&m=133365109612558&w=2cve@mitre.org
Issue Tracking
Mailing List
Third Party Advisory
http://marc.info/?l=bugtraq&m=133728004526190&w=2cve@mitre.org
Issue Tracking
Mailing List
Third Party Advisory
http://marc.info/?l=bugtraq&m=133728004526190&w=2cve@mitre.org
Issue Tracking
Mailing List
Third Party Advisory
http://marc.info/?l=bugtraq&m=134254866602253&w=2cve@mitre.org
Issue Tracking
Mailing List
Third Party Advisory
http://marc.info/?l=bugtraq&m=134254957702612&w=2cve@mitre.org
Issue Tracking
Mailing List
Third Party Advisory
http://marc.info/?l=bugtraq&m=134254957702612&w=2cve@mitre.org
Issue Tracking
Mailing List
Third Party Advisory
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issuecve@mitre.org
Third Party Advisory
http://osvdb.org/74829cve@mitre.org
Broken Link
http://rhn.redhat.com/errata/RHSA-2012-0508.htmlcve@mitre.org
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-1455.htmlcve@mitre.org
Broken Link
http://secunia.com/advisories/45791cve@mitre.org
Not Applicable
http://secunia.com/advisories/47998cve@mitre.org
Not Applicable
http://secunia.com/advisories/48256cve@mitre.org
Not Applicable
http://secunia.com/advisories/48692cve@mitre.org
Not Applicable
http://secunia.com/advisories/48915cve@mitre.org
Not Applicable
http://secunia.com/advisories/48948cve@mitre.org
Not Applicable
http://secunia.com/advisories/49198cve@mitre.org
Not Applicable
http://secunia.com/advisories/55322cve@mitre.org
Not Applicable
http://secunia.com/advisories/55350cve@mitre.org
Not Applicable
http://secunia.com/advisories/55351cve@mitre.org
Not Applicable
http://security.gentoo.org/glsa/glsa-201203-02.xmlcve@mitre.org
Third Party Advisory
http://security.gentoo.org/glsa/glsa-201406-32.xmlcve@mitre.org
Third Party Advisory
http://support.apple.com/kb/HT4999cve@mitre.org
Third Party Advisory
http://support.apple.com/kb/HT5001cve@mitre.org
Third Party Advisory
http://support.apple.com/kb/HT5130cve@mitre.org
Third Party Advisory
http://support.apple.com/kb/HT5281cve@mitre.org
Broken Link
http://support.apple.com/kb/HT5501cve@mitre.org
Third Party Advisory
http://support.apple.com/kb/HT6150cve@mitre.org
Third Party Advisory
http://technet.microsoft.com/security/advisory/2588513cve@mitre.org
Patch
Vendor Advisory
http://vnhacker.blogspot.com/2011/09/beast.htmlcve@mitre.org
Third Party Advisory
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdfcve@mitre.org
Third Party Advisory
http://www.debian.org/security/2012/dsa-2398cve@mitre.org
Third Party Advisory
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.htmlcve@mitre.org
Broken Link
http://www.ibm.com/developerworks/java/jdk/alerts/cve@mitre.org
Third Party Advisory
http://www.imperialviolet.org/2011/09/23/chromeandbeast.htmlcve@mitre.org
Third Party Advisory
http://www.insecure.cl/Beast-SSL.rarcve@mitre.org
Broken Link
Patch
http://www.kb.cert.org/vuls/id/864643cve@mitre.org
Third Party Advisory
US Government Resource
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058cve@mitre.org
Broken Link
http://www.opera.com/docs/changelogs/mac/1151/cve@mitre.org
Third Party Advisory
http://www.opera.com/docs/changelogs/mac/1160/cve@mitre.org
Third Party Advisory
http://www.opera.com/docs/changelogs/unix/1151/cve@mitre.org
Third Party Advisory
http://www.opera.com/docs/changelogs/unix/1160/cve@mitre.org
Third Party Advisory
http://www.opera.com/docs/changelogs/windows/1151/cve@mitre.org
Third Party Advisory
http://www.opera.com/docs/changelogs/windows/1160/cve@mitre.org
Third Party Advisory
http://www.opera.com/support/kb/view/1004/cve@mitre.org
Third Party Advisory
Vendor Advisory
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.htmlcve@mitre.org
Third Party Advisory
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.htmlcve@mitre.org
Third Party Advisory
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.htmlcve@mitre.org
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2011-1384.htmlcve@mitre.org
Third Party Advisory
Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2012-0006.htmlcve@mitre.org
Third Party Advisory
http://www.securityfocus.com/bid/49388cve@mitre.org
Third Party Advisory
VDB Entry
http://www.securityfocus.com/bid/49778cve@mitre.org
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1029190cve@mitre.org
Broken Link
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1025997cve@mitre.org
Broken Link
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1026103cve@mitre.org
Broken Link
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1026704cve@mitre.org
Broken Link
Third Party Advisory
VDB Entry
http://www.ubuntu.com/usn/USN-1263-1cve@mitre.org
Third Party Advisory
http://www.us-cert.gov/cas/techalerts/TA12-010A.htmlcve@mitre.org
Third Party Advisory
US Government Resource
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmailcve@mitre.org
Third Party Advisory
https://bugzilla.novell.com/show_bug.cgi?id=719047cve@mitre.org
Issue Tracking
Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=737506cve@mitre.org
Issue Tracking
Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdfcve@mitre.org
Third Party Advisory
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006cve@mitre.org
Patch
Vendor Advisory
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862cve@mitre.org
Broken Link
https://hermes.opensuse.org/messages/13154861cve@mitre.org
Broken Link
https://hermes.opensuse.org/messages/13155432cve@mitre.org
Broken Link
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02cve@mitre.org
Third Party Advisory
US Government Resource
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752cve@mitre.org
Third Party Advisory
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspxaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspxaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://curl.haxx.se/docs/adv_20120124B.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://downloads.asterisk.org/pub/security/AST-2016-001.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://ekoparty.org/2011/juliano-rizzo.phpaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://eprint.iacr.org/2004/111af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://eprint.iacr.org/2006/136af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.htmlaf854a3a-2127-422b-91ae-364da2661108
Not Applicable
Vendor Advisory
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
Mailing List
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
Mailing List
http://lists.apple.com/archives/security-announce/2012/May/msg00001.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
Mailing List
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
Mailing List
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
Mailing List
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://marc.info/?l=bugtraq&m=132750579901589&w=2af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
Mailing List
Third Party Advisory
http://marc.info/?l=bugtraq&m=132750579901589&w=2af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
Mailing List
Third Party Advisory
http://marc.info/?l=bugtraq&m=132872385320240&w=2af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
Mailing List
Third Party Advisory
http://marc.info/?l=bugtraq&m=132872385320240&w=2af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
Mailing List
Third Party Advisory
http://marc.info/?l=bugtraq&m=133365109612558&w=2af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
Mailing List
Third Party Advisory
http://marc.info/?l=bugtraq&m=133365109612558&w=2af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
Mailing List
Third Party Advisory
http://marc.info/?l=bugtraq&m=133728004526190&w=2af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
Mailing List
Third Party Advisory
http://marc.info/?l=bugtraq&m=133728004526190&w=2af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
Mailing List
Third Party Advisory
http://marc.info/?l=bugtraq&m=134254866602253&w=2af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
Mailing List
Third Party Advisory
http://marc.info/?l=bugtraq&m=134254957702612&w=2af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
Mailing List
Third Party Advisory
http://marc.info/?l=bugtraq&m=134254957702612&w=2af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
Mailing List
Third Party Advisory
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issueaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://osvdb.org/74829af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://rhn.redhat.com/errata/RHSA-2012-0508.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-1455.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/45791af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/47998af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/48256af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/48692af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/48915af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/48948af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/49198af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/55322af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/55350af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/55351af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://security.gentoo.org/glsa/glsa-201203-02.xmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://security.gentoo.org/glsa/glsa-201406-32.xmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://support.apple.com/kb/HT4999af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://support.apple.com/kb/HT5001af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://support.apple.com/kb/HT5130af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://support.apple.com/kb/HT5281af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://support.apple.com/kb/HT5501af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://support.apple.com/kb/HT6150af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://technet.microsoft.com/security/advisory/2588513af854a3a-2127-422b-91ae-364da2661108
Patch
Vendor Advisory
http://vnhacker.blogspot.com/2011/09/beast.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdfaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.debian.org/security/2012/dsa-2398af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.ibm.com/developerworks/java/jdk/alerts/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.imperialviolet.org/2011/09/23/chromeandbeast.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.insecure.cl/Beast-SSL.raraf854a3a-2127-422b-91ae-364da2661108
Broken Link
Patch
http://www.kb.cert.org/vuls/id/864643af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
US Government Resource
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.opera.com/docs/changelogs/mac/1151/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.opera.com/docs/changelogs/mac/1160/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.opera.com/docs/changelogs/unix/1151/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.opera.com/docs/changelogs/unix/1160/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.opera.com/docs/changelogs/windows/1151/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.opera.com/docs/changelogs/windows/1160/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.opera.com/support/kb/view/1004/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
Vendor Advisory
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2011-1384.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2012-0006.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.securityfocus.com/bid/49388af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
http://www.securityfocus.com/bid/49778af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1029190af854a3a-2127-422b-91ae-364da2661108
Broken Link
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1025997af854a3a-2127-422b-91ae-364da2661108
Broken Link
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1026103af854a3a-2127-422b-91ae-364da2661108
Broken Link
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1026704af854a3a-2127-422b-91ae-364da2661108
Broken Link
Third Party Advisory
VDB Entry
http://www.ubuntu.com/usn/USN-1263-1af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.us-cert.gov/cas/techalerts/TA12-010A.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
US Government Resource
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmailaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://bugzilla.novell.com/show_bug.cgi?id=719047af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=737506af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdfaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006af854a3a-2127-422b-91ae-364da2661108
Patch
Vendor Advisory
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862af854a3a-2127-422b-91ae-364da2661108
Broken Link
https://hermes.opensuse.org/messages/13154861af854a3a-2127-422b-91ae-364da2661108
Broken Link
https://hermes.opensuse.org/messages/13155432af854a3a-2127-422b-91ae-364da2661108
Broken Link
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
US Government Resource
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
Hyperlink: http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://curl.haxx.se/docs/adv_20120124B.html
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://downloads.asterisk.org/pub/security/AST-2016-001.html
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://ekoparty.org/2011/juliano-rizzo.php
Source: cve@mitre.org
Resource:
Broken Link
Hyperlink: http://eprint.iacr.org/2004/111
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://eprint.iacr.org/2006/136
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
Source: cve@mitre.org
Resource:
Not Applicable
Vendor Advisory
Hyperlink: http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
Source: cve@mitre.org
Resource:
Broken Link
Hyperlink: http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
Source: cve@mitre.org
Resource:
Broken Link
Hyperlink: http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
Source: cve@mitre.org
Resource:
Broken Link
Mailing List
Hyperlink: http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
Source: cve@mitre.org
Resource:
Broken Link
Mailing List
Hyperlink: http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
Source: cve@mitre.org
Resource:
Broken Link
Mailing List
Hyperlink: http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
Source: cve@mitre.org
Resource:
Broken Link
Mailing List
Hyperlink: http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
Source: cve@mitre.org
Resource:
Broken Link
Mailing List
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
Source: cve@mitre.org
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
Source: cve@mitre.org
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
Source: cve@mitre.org
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
Source: cve@mitre.org
Resource:
Broken Link
Hyperlink: http://marc.info/?l=bugtraq&m=132750579901589&w=2
Source: cve@mitre.org
Resource:
Issue Tracking
Mailing List
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=132750579901589&w=2
Source: cve@mitre.org
Resource:
Issue Tracking
Mailing List
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=132872385320240&w=2
Source: cve@mitre.org
Resource:
Issue Tracking
Mailing List
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=132872385320240&w=2
Source: cve@mitre.org
Resource:
Issue Tracking
Mailing List
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=133365109612558&w=2
Source: cve@mitre.org
Resource:
Issue Tracking
Mailing List
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=133365109612558&w=2
Source: cve@mitre.org
Resource:
Issue Tracking
Mailing List
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=133728004526190&w=2
Source: cve@mitre.org
Resource:
Issue Tracking
Mailing List
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=133728004526190&w=2
Source: cve@mitre.org
Resource:
Issue Tracking
Mailing List
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=134254866602253&w=2
Source: cve@mitre.org
Resource:
Issue Tracking
Mailing List
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=134254957702612&w=2
Source: cve@mitre.org
Resource:
Issue Tracking
Mailing List
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=134254957702612&w=2
Source: cve@mitre.org
Resource:
Issue Tracking
Mailing List
Third Party Advisory
Hyperlink: http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://osvdb.org/74829
Source: cve@mitre.org
Resource:
Broken Link
Hyperlink: http://rhn.redhat.com/errata/RHSA-2012-0508.html
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://rhn.redhat.com/errata/RHSA-2013-1455.html
Source: cve@mitre.org
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/45791
Source: cve@mitre.org
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/47998
Source: cve@mitre.org
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/48256
Source: cve@mitre.org
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/48692
Source: cve@mitre.org
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/48915
Source: cve@mitre.org
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/48948
Source: cve@mitre.org
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/49198
Source: cve@mitre.org
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/55322
Source: cve@mitre.org
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/55350
Source: cve@mitre.org
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/55351
Source: cve@mitre.org
Resource:
Not Applicable
Hyperlink: http://security.gentoo.org/glsa/glsa-201203-02.xml
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://security.gentoo.org/glsa/glsa-201406-32.xml
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://support.apple.com/kb/HT4999
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://support.apple.com/kb/HT5001
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://support.apple.com/kb/HT5130
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://support.apple.com/kb/HT5281
Source: cve@mitre.org
Resource:
Broken Link
Hyperlink: http://support.apple.com/kb/HT5501
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://support.apple.com/kb/HT6150
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://technet.microsoft.com/security/advisory/2588513
Source: cve@mitre.org
Resource:
Patch
Vendor Advisory
Hyperlink: http://vnhacker.blogspot.com/2011/09/beast.html
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://www.debian.org/security/2012/dsa-2398
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
Source: cve@mitre.org
Resource:
Broken Link
Hyperlink: http://www.ibm.com/developerworks/java/jdk/alerts/
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://www.insecure.cl/Beast-SSL.rar
Source: cve@mitre.org
Resource:
Broken Link
Patch
Hyperlink: http://www.kb.cert.org/vuls/id/864643
Source: cve@mitre.org
Resource:
Third Party Advisory
US Government Resource
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
Source: cve@mitre.org
Resource:
Broken Link
Hyperlink: http://www.opera.com/docs/changelogs/mac/1151/
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://www.opera.com/docs/changelogs/mac/1160/
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://www.opera.com/docs/changelogs/unix/1151/
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://www.opera.com/docs/changelogs/unix/1160/
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://www.opera.com/docs/changelogs/windows/1151/
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://www.opera.com/docs/changelogs/windows/1160/
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://www.opera.com/support/kb/view/1004/
Source: cve@mitre.org
Resource:
Third Party Advisory
Vendor Advisory
Hyperlink: http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://www.redhat.com/support/errata/RHSA-2011-1384.html
Source: cve@mitre.org
Resource:
Third Party Advisory
Vendor Advisory
Hyperlink: http://www.redhat.com/support/errata/RHSA-2012-0006.html
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://www.securityfocus.com/bid/49388
Source: cve@mitre.org
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securityfocus.com/bid/49778
Source: cve@mitre.org
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id/1029190
Source: cve@mitre.org
Resource:
Broken Link
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id?1025997
Source: cve@mitre.org
Resource:
Broken Link
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id?1026103
Source: cve@mitre.org
Resource:
Broken Link
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id?1026704
Source: cve@mitre.org
Resource:
Broken Link
Third Party Advisory
VDB Entry
Hyperlink: http://www.ubuntu.com/usn/USN-1263-1
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA12-010A.html
Source: cve@mitre.org
Resource:
Third Party Advisory
US Government Resource
Hyperlink: https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: https://bugzilla.novell.com/show_bug.cgi?id=719047
Source: cve@mitre.org
Resource:
Issue Tracking
Third Party Advisory
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=737506
Source: cve@mitre.org
Resource:
Issue Tracking
Third Party Advisory
Hyperlink: https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
Source: cve@mitre.org
Resource:
Patch
Vendor Advisory
Hyperlink: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
Source: cve@mitre.org
Resource:
Broken Link
Hyperlink: https://hermes.opensuse.org/messages/13154861
Source: cve@mitre.org
Resource:
Broken Link
Hyperlink: https://hermes.opensuse.org/messages/13155432
Source: cve@mitre.org
Resource:
Broken Link
Hyperlink: https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
Source: cve@mitre.org
Resource:
Third Party Advisory
US Government Resource
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://curl.haxx.se/docs/adv_20120124B.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://downloads.asterisk.org/pub/security/AST-2016-001.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://ekoparty.org/2011/juliano-rizzo.php
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://eprint.iacr.org/2004/111
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://eprint.iacr.org/2006/136
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Vendor Advisory
Hyperlink: http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Mailing List
Hyperlink: http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Mailing List
Hyperlink: http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Mailing List
Hyperlink: http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Mailing List
Hyperlink: http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Mailing List
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://marc.info/?l=bugtraq&m=132750579901589&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Mailing List
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=132750579901589&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Mailing List
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=132872385320240&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Mailing List
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=132872385320240&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Mailing List
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=133365109612558&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Mailing List
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=133365109612558&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Mailing List
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=133728004526190&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Mailing List
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=133728004526190&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Mailing List
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=134254866602253&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Mailing List
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=134254957702612&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Mailing List
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=134254957702612&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Mailing List
Third Party Advisory
Hyperlink: http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://osvdb.org/74829
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://rhn.redhat.com/errata/RHSA-2012-0508.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://rhn.redhat.com/errata/RHSA-2013-1455.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/45791
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/47998
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/48256
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/48692
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/48915
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/48948
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/49198
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/55322
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/55350
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/55351
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://security.gentoo.org/glsa/glsa-201203-02.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://security.gentoo.org/glsa/glsa-201406-32.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://support.apple.com/kb/HT4999
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://support.apple.com/kb/HT5001
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://support.apple.com/kb/HT5130
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://support.apple.com/kb/HT5281
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://support.apple.com/kb/HT5501
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://support.apple.com/kb/HT6150
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://technet.microsoft.com/security/advisory/2588513
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Vendor Advisory
Hyperlink: http://vnhacker.blogspot.com/2011/09/beast.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.debian.org/security/2012/dsa-2398
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://www.ibm.com/developerworks/java/jdk/alerts/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.insecure.cl/Beast-SSL.rar
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Patch
Hyperlink: http://www.kb.cert.org/vuls/id/864643
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
US Government Resource
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://www.opera.com/docs/changelogs/mac/1151/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.opera.com/docs/changelogs/mac/1160/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.opera.com/docs/changelogs/unix/1151/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.opera.com/docs/changelogs/unix/1160/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.opera.com/docs/changelogs/windows/1151/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.opera.com/docs/changelogs/windows/1160/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.opera.com/support/kb/view/1004/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Vendor Advisory
Hyperlink: http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.redhat.com/support/errata/RHSA-2011-1384.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Vendor Advisory
Hyperlink: http://www.redhat.com/support/errata/RHSA-2012-0006.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.securityfocus.com/bid/49388
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securityfocus.com/bid/49778
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id/1029190
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id?1025997
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id?1026103
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id?1026704
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Third Party Advisory
VDB Entry
Hyperlink: http://www.ubuntu.com/usn/USN-1263-1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA12-010A.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
US Government Resource
Hyperlink: https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://bugzilla.novell.com/show_bug.cgi?id=719047
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Third Party Advisory
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=737506
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Third Party Advisory
Hyperlink: https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Vendor Advisory
Hyperlink: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: https://hermes.opensuse.org/messages/13154861
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: https://hermes.opensuse.org/messages/13155432
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
US Government Resource
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

2045Records found

CVE-2005-4900
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.22% / 44.22%
||
7 Day CHG~0.00%
Published-14 Oct, 2016 | 16:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SHA-1 is not collision resistant, which makes it easier for context-dependent attackers to conduct spoofing attacks, as demonstrated by attacks on the use of SHA-1 in TLS 1.2. NOTE: this CVE exists to provide a common identifier for referencing this SHA-1 issue; the existence of an identifier is not, by itself, a technology recommendation.

Action-Not Available
Vendor-n/aGoogle LLC
Product-chromen/a
CWE ID-CWE-326
Inadequate Encryption Strength
CVE-2014-1491
Matching Score-10
Assigner-Mozilla Corporation
ShareView Details
Matching Score-10
Assigner-Mozilla Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.59% / 68.65%
||
7 Day CHG-0.01%
Published-06 Feb, 2014 | 02:00
Updated-25 Nov, 2025 | 17:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Mozilla Network Security Services (NSS) before 3.15.4, as used in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, SeaMonkey before 2.24, and other products, does not properly restrict public values in Diffie-Hellman key exchanges, which makes it easier for remote attackers to bypass cryptographic protection mechanisms in ticket handling by leveraging use of a certain value.

Action-Not Available
Vendor-n/aMozilla CorporationOracle CorporationCanonical Ltd.SUSEFedora ProjectopenSUSEDebian GNU/Linux
Product-enterprise_manager_ops_centerthunderbirdvm_serverfedorafirefoxubuntu_linuxseamonkeynetwork_security_serviceslinux_enterprise_desktopdebian_linuxopensuselinux_enterprise_serverlinux_enterprise_software_development_kitn/a
CWE ID-CWE-326
Inadequate Encryption Strength
CVE-2013-4508
Matching Score-10
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-10
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-2.91% / 86.05%
||
7 Day CHG~0.00%
Published-08 Nov, 2013 | 02:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

lighttpd before 1.4.34, when SNI is enabled, configures weak SSL ciphers, which makes it easier for remote attackers to hijack sessions by inserting packets into the client-server data stream or obtain sensitive information by sniffing the network.

Action-Not Available
Vendor-lighttpdn/aDebian GNU/LinuxopenSUSE
Product-lighttpddebian_linuxopensusen/a
CWE ID-CWE-326
Inadequate Encryption Strength
CVE-2013-2566
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-90.32% / 99.59%
||
7 Day CHG~0.00%
Published-14 Mar, 2013 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The RC4 algorithm, as used in the TLS protocol and SSL protocol, has many single-byte biases, which makes it easier for remote attackers to conduct plaintext-recovery attacks via statistical analysis of ciphertext in a large number of sessions that use the same plaintext.

Action-Not Available
Vendor-n/aMozilla CorporationFujitsu LimitedOracle CorporationCanonical Ltd.
Product-sparc_enterprise_m5000sparc_enterprise_m3000m10-1_firmwarefirefoxm10-4s_firmwaresparc_enterprise_m5000_firmwarehttp_serverm10-1sparc_enterprise_m9000m10-4sparc_enterprise_m8000thunderbirdm10-4_firmwaresparc_enterprise_m9000_firmwarem10-4ssparc_enterprise_m8000_firmwaresparc_enterprise_m4000_firmwaresparc_enterprise_m4000communications_application_session_controllerthunderbird_esrseamonkeyubuntu_linuxintegrated_lights_out_manager_firmwaresparc_enterprise_m3000_firmwaren/a
CWE ID-CWE-326
Inadequate Encryption Strength
CVE-2017-1665
Matching Score-10
Assigner-IBM Corporation
ShareView Details
Matching Score-10
Assigner-IBM Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.14% / 34.42%
||
7 Day CHG~0.00%
Published-04 Jan, 2018 | 17:00
Updated-17 Sep, 2024 | 02:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM Tivoli Key Lifecycle Manager 2.5, 2.6, and 2.7 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 133559.

Action-Not Available
Vendor-Debian GNU/LinuxIBM Corporation
Product-security_key_lifecycle_managerdebian_linuxSecurity Key Lifecycle Manager
CWE ID-CWE-326
Inadequate Encryption Strength
CVE-2019-4102
Matching Score-10
Assigner-IBM Corporation
ShareView Details
Matching Score-10
Assigner-IBM Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.14% / 34.50%
||
7 Day CHG~0.00%
Published-01 Jul, 2019 | 15:05
Updated-17 Sep, 2024 | 04:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, and 11.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 158092.

Action-Not Available
Vendor-Microsoft CorporationHP Inc.IBM CorporationLinux Kernel Organization, IncOracle Corporation
Product-solarislinux_kerneldb2hp-uxwindowsaixDB2 for Linux, UNIX and Windows
CWE ID-CWE-326
Inadequate Encryption Strength
CVE-2019-13163
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.13% / 32.38%
||
7 Day CHG~0.00%
Published-07 Feb, 2020 | 22:45
Updated-04 Aug, 2024 | 23:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Fujitsu TLS library allows a man-in-the-middle attack. This affects Interstage Application Development Cycle Manager V10 and other versions, Interstage Application Server V12 and other versions, Interstage Business Application Manager V2 and other versions, Interstage Information Integrator V11 and other versions, Interstage Job Workload Server V8, Interstage List Works V10 and other versions, Interstage Studio V12 and other versions, Interstage Web Server Express V11, Linkexpress V5, Safeauthor V3, ServerView Resource Orchestrator V3, Systemwalker Cloud Business Service Management V1, Systemwalker Desktop Keeper V15, Systemwalker Desktop Patrol V15, Systemwalker IT Change Manager V14, Systemwalker Operation Manager V16 and other versions, Systemwalker Runbook Automation V15 and other versions, Systemwalker Security Control V1, and Systemwalker Software Configuration Manager V15.

Action-Not Available
Vendor-n/aRed Hat, Inc.Oracle CorporationMicrosoft CorporationFujitsu Limited
Product-granpower_5000_firmwareserverview_resource_orchestratorinterstage_application_development_cycle_managerwindows_small_business_server_2011linkexpresssystemwalker_runbook_automation_v14gsystemwalker_runbook_automationinterstage_application_serverprimepower_firmwaregp7000fgranpower_5000interstage_information_integrator_agentgp7000f_firmwaresparc_enterprise_m8000_firmwaresafeauthorsparc_enterprise_m3000celsius_firmwareenterprise_linuxprimergy_rx4770_m5sparc_enterprise_m3000_firmwaresystemwalker_operation_managerprimergy_rx2540_m5sparc_enterprise_m4000sparc_enterprise_m9000systemwalker_it_change_manager_v14gprimergy_tx2550_m5_firmwaresparc_enterprise_m8000sparc_m12-2primergy_rx2530_m5_firmwarewindows_server_2008primepowerinterstage_business_application_managerwindows_server_2016windows_server_2012solarissparc_enterprise_m9000_firmwaregpsprimergy_rx2540_m5_firmwaretriole_cloud_middle_set_b_setprimergy_rx2530_m5interstage_studiointerstage_list_workssparc_m12-1_firmwaresystemwalker_software_configuration_manager_expresssparc_enterprise_m4000_firmwaresparc_m12-1sparc_m12-2sinterstage_web_server_expresssystemwalker_desktop_patrolprimergy_rx4770_m5_firmwaresparc_enterprise_m5000_firmwareinterstage_information_integratorsparc_m12-2_firmwareprimergy_tx2550_m5systemwalker_security_controlprimequest_firmwaresparc_enterprise_m5000celsiusinterstage_job_workload_serversystemwalker_desktop_keepersystemwalker_software_configuration_managerprimequestgps_firmwarewindows_server_2019sparc_m12-2s_firmwaren/a
CWE ID-CWE-326
Inadequate Encryption Strength
CVE-2018-3837
Matching Score-8
Assigner-Talos
ShareView Details
Matching Score-8
Assigner-Talos
CVSS Score-5.3||MEDIUM
EPSS-0.35% / 57.20%
||
7 Day CHG~0.00%
Published-10 Apr, 2018 | 21:00
Updated-16 Sep, 2024 | 17:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An exploitable information disclosure vulnerability exists in the PCX image rendering functionality of Simple DirectMedia Layer SDL2_image-2.0.2. A specially crafted PCX image can cause an out-of-bounds read on the heap, resulting in information disclosure . An attacker can display a specially crafted image to trigger this vulnerability.

Action-Not Available
Vendor-libsdlstarwindsoftwareCisco Systems, Inc.Debian GNU/Linux
Product-sdl_imagedebian_linuxstarwind_virtual_sanSimple Direct Media
CWE ID-CWE-125
Out-of-bounds Read
CVE-2018-5001
Matching Score-8
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-8
Assigner-Adobe Systems Incorporated
CVSS Score-6.5||MEDIUM
EPSS-0.75% / 72.70%
||
7 Day CHG~0.00%
Published-09 Jul, 2018 | 19:00
Updated-05 Aug, 2024 | 05:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Adobe Flash Player versions 29.0.0.171 and earlier have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.

Action-Not Available
Vendor-n/aGoogle LLCAdobe Inc.Red Hat, Inc.Apple Inc.Microsoft CorporationLinux Kernel Organization, Inc
Product-enterprise_linux_serverlinux_kernelwindows_8.1enterprise_linux_workstationchrome_osmac_os_xwindowsflash_player_desktop_runtimewindows_10enterprise_linux_desktopflash_playerAdobe Flash Player 29.0.0.171 and earlier versions
CWE ID-CWE-125
Out-of-bounds Read
CVE-2018-5014
Matching Score-8
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-8
Assigner-Adobe Systems Incorporated
CVSS Score-6.5||MEDIUM
EPSS-8.31% / 92.08%
||
7 Day CHG~0.00%
Published-20 Jul, 2018 | 19:00
Updated-05 Aug, 2024 | 05:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.

Action-Not Available
Vendor-n/aApple Inc.Microsoft CorporationAdobe Inc.
Product-mac_os_xacrobat_dcwindowsacrobat_reader_dcAdobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions
CWE ID-CWE-125
Out-of-bounds Read
CVE-2018-5055
Matching Score-8
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-8
Assigner-Adobe Systems Incorporated
CVSS Score-6.5||MEDIUM
EPSS-8.31% / 92.08%
||
7 Day CHG~0.00%
Published-20 Jul, 2018 | 19:00
Updated-05 Aug, 2024 | 05:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.

Action-Not Available
Vendor-n/aApple Inc.Microsoft CorporationAdobe Inc.
Product-mac_os_xacrobat_dcwindowsacrobat_reader_dcAdobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions
CWE ID-CWE-125
Out-of-bounds Read
CVE-2018-5056
Matching Score-8
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-8
Assigner-Adobe Systems Incorporated
CVSS Score-6.5||MEDIUM
EPSS-8.31% / 92.08%
||
7 Day CHG~0.00%
Published-20 Jul, 2018 | 19:00
Updated-05 Aug, 2024 | 05:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.

Action-Not Available
Vendor-n/aApple Inc.Microsoft CorporationAdobe Inc.
Product-mac_os_xacrobat_dcwindowsacrobat_reader_dcAdobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions
CWE ID-CWE-125
Out-of-bounds Read
CVE-2018-18495
Matching Score-8
Assigner-Mozilla Corporation
ShareView Details
Matching Score-8
Assigner-Mozilla Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.33% / 55.30%
||
7 Day CHG~0.00%
Published-28 Feb, 2019 | 18:00
Updated-05 Aug, 2024 | 11:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

WebExtension content scripts can be loaded into about: pages in some circumstances, in violation of the permissions granted to extensions. This could allow an extension to interfere with the loading and usage of these pages and use capabilities that were intended to be restricted from extensions. This vulnerability affects Firefox < 64.

Action-Not Available
Vendor-Mozilla CorporationCanonical Ltd.
Product-firefoxubuntu_linuxFirefox
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2018-5061
Matching Score-8
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-8
Assigner-Adobe Systems Incorporated
CVSS Score-6.5||MEDIUM
EPSS-8.35% / 92.10%
||
7 Day CHG~0.00%
Published-20 Jul, 2018 | 19:00
Updated-05 Aug, 2024 | 05:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.

Action-Not Available
Vendor-n/aApple Inc.Microsoft CorporationAdobe Inc.
Product-mac_os_xacrobat_dcwindowsacrobat_reader_dcAdobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions
CWE ID-CWE-125
Out-of-bounds Read
CVE-2018-4972
Matching Score-8
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-8
Assigner-Adobe Systems Incorporated
CVSS Score-6.5||MEDIUM
EPSS-2.11% / 83.77%
||
7 Day CHG~0.00%
Published-09 Jul, 2018 | 19:00
Updated-05 Aug, 2024 | 05:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.

Action-Not Available
Vendor-n/aApple Inc.Microsoft CorporationAdobe Inc.
Product-mac_os_xacrobat_dcwindowsacrobat_reader_dcAdobe Acrobat and Reader 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier versions
CWE ID-CWE-125
Out-of-bounds Read
CVE-2018-5054
Matching Score-8
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-8
Assigner-Adobe Systems Incorporated
CVSS Score-6.5||MEDIUM
EPSS-8.31% / 92.08%
||
7 Day CHG~0.00%
Published-20 Jul, 2018 | 19:00
Updated-05 Aug, 2024 | 05:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.

Action-Not Available
Vendor-n/aApple Inc.Microsoft CorporationAdobe Inc.
Product-mac_os_xacrobat_dcwindowsacrobat_reader_dcAdobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions
CWE ID-CWE-125
Out-of-bounds Read
CVE-2018-4934
Matching Score-8
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-8
Assigner-Adobe Systems Incorporated
CVSS Score-6.5||MEDIUM
EPSS-29.32% / 96.47%
||
7 Day CHG~0.00%
Published-19 May, 2018 | 17:00
Updated-05 Aug, 2024 | 05:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.

Action-Not Available
Vendor-n/aGoogle LLCAdobe Inc.Apple Inc.Microsoft CorporationLinux Kernel Organization, Inc
Product-linux_kernelwindows_8.1chrome_osmac_os_xwindowsflash_player_desktop_runtimewindows_10flash_playerAdobe Flash Player 29.0.0.113 and earlier versions
CWE ID-CWE-125
Out-of-bounds Read
CVE-2018-5000
Matching Score-8
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-8
Assigner-Adobe Systems Incorporated
CVSS Score-6.5||MEDIUM
EPSS-0.75% / 72.70%
||
7 Day CHG~0.00%
Published-09 Jul, 2018 | 19:00
Updated-05 Aug, 2024 | 05:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Adobe Flash Player versions 29.0.0.171 and earlier have an Integer Overflow vulnerability. Successful exploitation could lead to information disclosure.

Action-Not Available
Vendor-n/aGoogle LLCAdobe Inc.Red Hat, Inc.Apple Inc.Microsoft CorporationLinux Kernel Organization, Inc
Product-enterprise_linux_serverlinux_kernelwindows_8.1enterprise_linux_workstationchrome_osmac_os_xwindowsflash_player_desktop_runtimewindows_10enterprise_linux_desktopflash_playerAdobe Flash Player 29.0.0.171 and earlier versions
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2018-4933
Matching Score-8
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-8
Assigner-Adobe Systems Incorporated
CVSS Score-6.5||MEDIUM
EPSS-3.26% / 86.83%
||
7 Day CHG~0.00%
Published-19 May, 2018 | 17:00
Updated-05 Aug, 2024 | 05:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.

Action-Not Available
Vendor-n/aGoogle LLCAdobe Inc.Apple Inc.Microsoft CorporationLinux Kernel Organization, Inc
Product-linux_kernelwindows_8.1chrome_osmac_os_xwindowsflash_player_desktop_runtimewindows_10flash_playerAdobe Flash Player 29.0.0.113 and earlier versions
CWE ID-CWE-125
Out-of-bounds Read
CVE-2018-5031
Matching Score-8
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-8
Assigner-Adobe Systems Incorporated
CVSS Score-6.5||MEDIUM
EPSS-8.31% / 92.08%
||
7 Day CHG~0.00%
Published-20 Jul, 2018 | 19:00
Updated-05 Aug, 2024 | 05:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.

Action-Not Available
Vendor-n/aApple Inc.Microsoft CorporationAdobe Inc.
Product-mac_os_xacrobat_dcwindowsacrobat_reader_dcAdobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions
CWE ID-CWE-125
Out-of-bounds Read
CVE-2008-6961
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.65% / 70.36%
||
7 Day CHG~0.00%
Published-13 Aug, 2009 | 16:00
Updated-07 Aug, 2024 | 11:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

mailnews in Mozilla Thunderbird before 2.0.0.18 and SeaMonkey before 1.1.13, when JavaScript is enabled in mail, allows remote attackers to obtain sensitive information about the recipient, or comments in forwarded mail, via script that reads the (1) .documentURI or (2) .textContent DOM properties.

Action-Not Available
Vendor-n/aMozilla Corporation
Product-seamonkeythunderbirdn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2018-5152
Matching Score-8
Assigner-Mozilla Corporation
ShareView Details
Matching Score-8
Assigner-Mozilla Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.46% / 63.40%
||
7 Day CHG~0.00%
Published-11 Jun, 2018 | 21:00
Updated-05 Aug, 2024 | 05:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

WebExtensions with the appropriate permissions can attach content scripts to Mozilla sites such as accounts.firefox.com and listen to network traffic to the site through the "webRequest" API. For example, this allows for the interception of username and an encrypted password during login to Firefox Accounts. This issue does not expose synchronization traffic directly and is limited to the process of user login to the website and the data displayed to the user once logged in. This vulnerability affects Firefox < 60.

Action-Not Available
Vendor-Mozilla CorporationCanonical Ltd.
Product-firefoxubuntu_linuxFirefox
CWE ID-CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CVE-2018-5016
Matching Score-8
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-8
Assigner-Adobe Systems Incorporated
CVSS Score-6.5||MEDIUM
EPSS-8.31% / 92.08%
||
7 Day CHG~0.00%
Published-20 Jul, 2018 | 19:00
Updated-05 Aug, 2024 | 05:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.

Action-Not Available
Vendor-n/aApple Inc.Microsoft CorporationAdobe Inc.
Product-mac_os_xacrobat_dcwindowsacrobat_reader_dcAdobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions
CWE ID-CWE-125
Out-of-bounds Read
CVE-2018-4999
Matching Score-8
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-8
Assigner-Adobe Systems Incorporated
CVSS Score-6.5||MEDIUM
EPSS-8.29% / 92.05%
||
7 Day CHG~0.00%
Published-09 Jul, 2018 | 19:00
Updated-05 Aug, 2024 | 05:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Adobe Acrobat and Reader versions 2018.009.20050 and earlier, 2017.011.30070 and earlier, and 2015.006.30394 and earlier have an Out-of-bounds read vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.

Action-Not Available
Vendor-n/aApple Inc.Microsoft CorporationAdobe Inc.
Product-acrobat_dcacrobat_readeracrobatacrobat_reader_dcmac_os_xwindowsAdobe Acrobat and Reader 2018.009.20050 and earlier, 2017.011.30070 and earlier, and 2015.006.30394 and earlier versions
CWE ID-CWE-125
Out-of-bounds Read
CVE-2018-5047
Matching Score-8
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-8
Assigner-Adobe Systems Incorporated
CVSS Score-6.5||MEDIUM
EPSS-8.31% / 92.08%
||
7 Day CHG~0.00%
Published-20 Jul, 2018 | 19:00
Updated-05 Aug, 2024 | 05:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.

Action-Not Available
Vendor-n/aApple Inc.Microsoft CorporationAdobe Inc.
Product-mac_os_xacrobat_dcwindowsacrobat_reader_dcAdobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions
CWE ID-CWE-125
Out-of-bounds Read
CVE-2018-5053
Matching Score-8
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-8
Assigner-Adobe Systems Incorporated
CVSS Score-6.5||MEDIUM
EPSS-8.31% / 92.08%
||
7 Day CHG~0.00%
Published-20 Jul, 2018 | 19:00
Updated-05 Aug, 2024 | 05:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.

Action-Not Available
Vendor-n/aApple Inc.Microsoft CorporationAdobe Inc.
Product-mac_os_xacrobat_dcwindowsacrobat_reader_dcAdobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions
CWE ID-CWE-125
Out-of-bounds Read
CVE-2018-5060
Matching Score-8
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-8
Assigner-Adobe Systems Incorporated
CVSS Score-6.5||MEDIUM
EPSS-8.31% / 92.08%
||
7 Day CHG~0.00%
Published-20 Jul, 2018 | 19:00
Updated-05 Aug, 2024 | 05:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.

Action-Not Available
Vendor-n/aApple Inc.Microsoft CorporationAdobe Inc.
Product-mac_os_xacrobat_dcwindowsacrobat_reader_dcAdobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-17411
Matching Score-8
Assigner-Zero Day Initiative
ShareView Details
Matching Score-8
Assigner-Zero Day Initiative
CVSS Score-3.3||LOW
EPSS-11.39% / 93.40%
||
7 Day CHG~0.00%
Published-13 Oct, 2020 | 17:10
Updated-04 Aug, 2024 | 13:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PhantomPDF 10.0.0.35798. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects embedded in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-11190.

Action-Not Available
Vendor-Microsoft CorporationFoxit Software Incorporated
Product-windows3dPhantomPDF
CWE ID-CWE-125
Out-of-bounds Read
CVE-2018-5033
Matching Score-8
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-8
Assigner-Adobe Systems Incorporated
CVSS Score-6.5||MEDIUM
EPSS-8.31% / 92.08%
||
7 Day CHG~0.00%
Published-20 Jul, 2018 | 19:00
Updated-05 Aug, 2024 | 05:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.

Action-Not Available
Vendor-n/aApple Inc.Microsoft CorporationAdobe Inc.
Product-mac_os_xacrobat_dcwindowsacrobat_reader_dcAdobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions
CWE ID-CWE-125
Out-of-bounds Read
CVE-2018-5063
Matching Score-8
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-8
Assigner-Adobe Systems Incorporated
CVSS Score-6.5||MEDIUM
EPSS-22.98% / 95.77%
||
7 Day CHG~0.00%
Published-20 Jul, 2018 | 19:00
Updated-05 Aug, 2024 | 05:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.

Action-Not Available
Vendor-n/aApple Inc.Microsoft CorporationAdobe Inc.
Product-mac_os_xacrobat_dcwindowsacrobat_reader_dcAdobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions
CWE ID-CWE-125
Out-of-bounds Read
CVE-2018-5035
Matching Score-8
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-8
Assigner-Adobe Systems Incorporated
CVSS Score-6.5||MEDIUM
EPSS-8.31% / 92.08%
||
7 Day CHG~0.00%
Published-20 Jul, 2018 | 19:00
Updated-05 Aug, 2024 | 05:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.

Action-Not Available
Vendor-n/aApple Inc.Microsoft CorporationAdobe Inc.
Product-mac_os_xacrobat_dcwindowsacrobat_reader_dcAdobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions
CWE ID-CWE-125
Out-of-bounds Read
CVE-2018-5019
Matching Score-8
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-8
Assigner-Adobe Systems Incorporated
CVSS Score-6.5||MEDIUM
EPSS-8.31% / 92.08%
||
7 Day CHG~0.00%
Published-20 Jul, 2018 | 19:00
Updated-05 Aug, 2024 | 05:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.

Action-Not Available
Vendor-n/aApple Inc.Microsoft CorporationAdobe Inc.
Product-mac_os_xacrobat_dcwindowsacrobat_reader_dcAdobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions
CWE ID-CWE-125
Out-of-bounds Read
CVE-2018-5029
Matching Score-8
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-8
Assigner-Adobe Systems Incorporated
CVSS Score-6.5||MEDIUM
EPSS-8.31% / 92.08%
||
7 Day CHG~0.00%
Published-20 Jul, 2018 | 19:00
Updated-05 Aug, 2024 | 05:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.

Action-Not Available
Vendor-n/aApple Inc.Microsoft CorporationAdobe Inc.
Product-mac_os_xacrobat_dcwindowsacrobat_reader_dcAdobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions
CWE ID-CWE-125
Out-of-bounds Read
CVE-2018-4979
Matching Score-8
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-8
Assigner-Adobe Systems Incorporated
CVSS Score-6.5||MEDIUM
EPSS-3.69% / 87.66%
||
7 Day CHG~0.00%
Published-09 Jul, 2018 | 19:00
Updated-05 Aug, 2024 | 05:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Security Bypass vulnerability. Successful exploitation could lead to information disclosure.

Action-Not Available
Vendor-n/aApple Inc.Microsoft CorporationAdobe Inc.
Product-mac_os_xacrobat_dcwindowsacrobat_reader_dcAdobe Acrobat and Reader 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier versions
CWE ID-CWE-125
Out-of-bounds Read
CVE-2018-5132
Matching Score-8
Assigner-Mozilla Corporation
ShareView Details
Matching Score-8
Assigner-Mozilla Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.91% / 75.46%
||
7 Day CHG~0.00%
Published-11 Jun, 2018 | 21:00
Updated-05 Aug, 2024 | 05:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Find API for WebExtensions can search some privileged pages, such as "about:debugging", if these pages are open in a tab. This could allow a malicious WebExtension to search for otherwise protected data if a user has it open. This vulnerability affects Firefox < 59.

Action-Not Available
Vendor-Mozilla CorporationCanonical Ltd.
Product-firefoxubuntu_linuxFirefox
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2018-5131
Matching Score-8
Assigner-Mozilla Corporation
ShareView Details
Matching Score-8
Assigner-Mozilla Corporation
CVSS Score-5.9||MEDIUM
EPSS-1.28% / 79.25%
||
7 Day CHG~0.00%
Published-11 Jun, 2018 | 21:00
Updated-25 Nov, 2025 | 17:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Under certain circumstances the "fetch()" API can return transient local copies of resources that were sent with a "no-store" or "no-cache" cache header instead of downloading a copy from the network as it should. This can result in previously stored, locally cached data of a website being accessible to users if they share a common profile while browsing. This vulnerability affects Firefox ESR < 52.7 and Firefox < 59.

Action-Not Available
Vendor-Mozilla CorporationCanonical Ltd.Debian GNU/LinuxRed Hat, Inc.
Product-firefoxubuntu_linuxenterprise_linux_desktopenterprise_linux_serverdebian_linuxenterprise_linux_server_eusenterprise_linux_workstationenterprise_linux_server_ausFirefoxFirefox ESR
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2018-5108
Matching Score-8
Assigner-Mozilla Corporation
ShareView Details
Matching Score-8
Assigner-Mozilla Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.30% / 53.22%
||
7 Day CHG~0.00%
Published-11 Jun, 2018 | 21:00
Updated-05 Aug, 2024 | 05:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Blob URL can violate origin attribute segregation, allowing it to be accessed from a private browsing tab and for data to be passed between the private browsing tab and a normal tab. This could allow for the leaking of private information specific to the private browsing context. This issue is mitigated by the requirement that the user enter the Blob URL manually in order for the access violation to occur. This vulnerability affects Firefox < 58.

Action-Not Available
Vendor-Mozilla CorporationCanonical Ltd.
Product-firefoxubuntu_linuxFirefox
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2018-4951
Matching Score-8
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-8
Assigner-Adobe Systems Incorporated
CVSS Score-6.5||MEDIUM
EPSS-2.10% / 83.72%
||
7 Day CHG~0.00%
Published-09 Jul, 2018 | 19:00
Updated-05 Aug, 2024 | 05:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.

Action-Not Available
Vendor-n/aApple Inc.Microsoft CorporationAdobe Inc.
Product-mac_os_xacrobat_dcwindowsacrobat_reader_dcAdobe Acrobat and Reader 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier versions
CWE ID-CWE-125
Out-of-bounds Read
CVE-2018-5039
Matching Score-8
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-8
Assigner-Adobe Systems Incorporated
CVSS Score-6.5||MEDIUM
EPSS-8.31% / 92.08%
||
7 Day CHG~0.00%
Published-20 Jul, 2018 | 19:00
Updated-05 Aug, 2024 | 05:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.

Action-Not Available
Vendor-n/aApple Inc.Microsoft CorporationAdobe Inc.
Product-mac_os_xacrobat_dcwindowsacrobat_reader_dcAdobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions
CWE ID-CWE-125
Out-of-bounds Read
CVE-2018-3838
Matching Score-8
Assigner-Talos
ShareView Details
Matching Score-8
Assigner-Talos
CVSS Score-5.3||MEDIUM
EPSS-0.42% / 61.66%
||
7 Day CHG~0.00%
Published-10 Apr, 2018 | 21:00
Updated-16 Sep, 2024 | 18:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An exploitable information vulnerability exists in the XCF image rendering functionality of Simple DirectMedia Layer SDL2_image-2.0.2. A specially crafted XCF image can cause an out-of-bounds read on the heap, resulting in information disclosure. An attacker can display a specially crafted image to trigger this vulnerability.

Action-Not Available
Vendor-libsdlCisco Systems, Inc.Debian GNU/Linux
Product-sdl_imagedebian_linuxSimple DirectMedia
CWE ID-CWE-125
Out-of-bounds Read
CVE-2018-5185
Matching Score-8
Assigner-Mozilla Corporation
ShareView Details
Matching Score-8
Assigner-Mozilla Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.33% / 55.42%
||
7 Day CHG~0.00%
Published-11 Jun, 2018 | 21:00
Updated-05 Aug, 2024 | 05:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Plaintext of decrypted emails can leak through by user submitting an embedded form. This vulnerability affects Thunderbird ESR < 52.8 and Thunderbird < 52.8.

Action-Not Available
Vendor-Canonical Ltd.Red Hat, Inc.Mozilla CorporationDebian GNU/Linux
Product-enterprise_linux_serverubuntu_linuxdebian_linuxthunderbirdenterprise_linux_server_eusenterprise_linux_server_ausenterprise_linux_workstationenterprise_linux_server_tusenterprise_linux_desktopthunderbird_esrThunderbird ESRThunderbird
CWE ID-CWE-311
Missing Encryption of Sensitive Data
CVE-2018-4936
Matching Score-8
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-8
Assigner-Adobe Systems Incorporated
CVSS Score-6.5||MEDIUM
EPSS-41.84% / 97.32%
||
7 Day CHG~0.00%
Published-19 May, 2018 | 17:00
Updated-05 Aug, 2024 | 05:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable Heap Overflow vulnerability. Successful exploitation could lead to information disclosure.

Action-Not Available
Vendor-n/aGoogle LLCAdobe Inc.Apple Inc.Microsoft CorporationLinux Kernel Organization, Inc
Product-linux_kernelwindows_8.1chrome_osmac_os_xwindowsflash_player_desktop_runtimewindows_10flash_playerAdobe Flash Player 29.0.0.113 and earlier versions
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2021-31936
Matching Score-8
Assigner-Microsoft Corporation
ShareView Details
Matching Score-8
Assigner-Microsoft Corporation
CVSS Score-7.4||HIGH
EPSS-7.37% / 91.52%
||
7 Day CHG-2.31%
Published-11 May, 2021 | 19:11
Updated-03 Aug, 2024 | 23:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Microsoft Accessibility Insights for Web Information Disclosure Vulnerability

Microsoft Accessibility Insights for Web Information Disclosure Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-accessibility_insights_for_webMicrosoft Accessibility Insights for Web
CVE-2018-5050
Matching Score-8
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-8
Assigner-Adobe Systems Incorporated
CVSS Score-6.5||MEDIUM
EPSS-8.31% / 92.08%
||
7 Day CHG~0.00%
Published-20 Jul, 2018 | 19:00
Updated-05 Aug, 2024 | 05:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.

Action-Not Available
Vendor-n/aApple Inc.Microsoft CorporationAdobe Inc.
Product-mac_os_xacrobat_dcwindowsacrobat_reader_dcAdobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions
CWE ID-CWE-125
Out-of-bounds Read
CVE-2018-5017
Matching Score-8
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-8
Assigner-Adobe Systems Incorporated
CVSS Score-6.5||MEDIUM
EPSS-8.31% / 92.08%
||
7 Day CHG~0.00%
Published-20 Jul, 2018 | 19:00
Updated-05 Aug, 2024 | 05:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.

Action-Not Available
Vendor-n/aApple Inc.Microsoft CorporationAdobe Inc.
Product-mac_os_xacrobat_dcwindowsacrobat_reader_dcAdobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions
CWE ID-CWE-125
Out-of-bounds Read
CVE-2018-2581
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-4.7||MEDIUM
EPSS-0.49% / 65.08%
||
7 Day CHG~0.00%
Published-18 Jan, 2018 | 02:00
Updated-03 Oct, 2024 | 20:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JavaFX). Supported versions that are affected are Java SE: 7u161, 8u152 and 9.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N).

Action-Not Available
Vendor-n/aRed Hat, Inc.NetApp, Inc.Oracle Corporation
Product-virtual_storage_consolecloud_backupe-series_santricity_management_plug-insactive_iq_unified_managersatellitejdkoncommand_workflow_automationoncommand_shiftstoragegridplug-in_for_symantec_netbackupstorage_replication_adapter_for_clustered_data_ontapsnapmanagerjree-series_santricity_os_controllere-series_santricity_storage_managervasa_provider_for_clustered_data_ontapsantricity_cloud_connectore-series_santricity_web_servicesoncommand_unified_manageroncommand_insightn/a
CVE-2008-6063
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-17.41% / 94.90%
||
7 Day CHG~0.00%
Published-05 Feb, 2009 | 01:00
Updated-07 Aug, 2024 | 11:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Microsoft Word 2007, when the "Save as PDF" add-on is enabled, places an absolute pathname in the Subject field during an "Email as PDF" operation, which allows remote attackers to obtain sensitive information such as the sender's account name and a Temporary Internet Files subdirectory name.

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-wordn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2018-2940
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-4.3||MEDIUM
EPSS-0.27% / 50.15%
||
7 Day CHG~0.00%
Published-18 Jul, 2018 | 13:00
Updated-02 Oct, 2024 | 20:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).

Action-Not Available
Vendor-HP Inc.NetApp, Inc.Oracle CorporationRed Hat, Inc.
Product-enterprise_linux_servervirtual_storage_consolexp7_command_viewcloud_backupactive_iq_unified_managersatellitejdkoncommand_workflow_automationsteelstore_cloud_integrated_storageplug-in_for_symantec_netbackupstorage_replication_adapter_for_clustered_data_ontapsnapmanagerjreenterprise_linux_workstatione-series_santricity_os_controllere-series_santricity_storage_managervasa_provider_for_clustered_data_ontaponcommand_unified_managerenterprise_linux_desktoponcommand_insightJava
CVE-2018-2634
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-6.8||MEDIUM
EPSS-0.16% / 37.21%
||
7 Day CHG~0.00%
Published-18 Jan, 2018 | 02:00
Updated-03 Oct, 2024 | 20:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JGSS). Supported versions that are affected are Java SE: 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).

Action-Not Available
Vendor-Canonical Ltd.Debian GNU/LinuxHP Inc.Oracle CorporationRed Hat, Inc.
Product-enterprise_linux_serverubuntu_linuxxp_command_viewdebian_linuxxp7_command_viewenterprise_linux_server_eusxp_p9000_command_viewjreenterprise_linux_server_ausenterprise_linux_workstationsatellitejdkenterprise_linux_server_tusenterprise_linux_desktopstruxureware_data_center_expertJava
CVE-2013-1301
Matching Score-8
Assigner-Microsoft Corporation
ShareView Details
Matching Score-8
Assigner-Microsoft Corporation
CVSS Score-4.3||MEDIUM
EPSS-27.83% / 96.34%
||
7 Day CHG~0.00%
Published-15 May, 2013 | 01:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Microsoft Visio 2003 SP3 2007 SP3, and 2010 SP1 allows remote attackers to read arbitrary files via an XML document containing an external entity declaration in conjunction with an entity reference, aka "XML External Entities Resolution Vulnerability."

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-vision/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
  • Previous
  • 1
  • 2
  • 3
  • ...
  • 40
  • 41
  • Next
Details not found