The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation allows attackers to spoof HMAC-based signatures and bypass authentication
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | RedHat Security Advisory RHSA-2009:1428 | 9 Sep 200900:00 | – | openvas |
![]() | Fedora Core 11 FEDORA-2009-8157 (xml-security-c) | 17 Aug 200900:00 | – | openvas |
![]() | Microsoft .NET Framework XML HMAC Truncation Vulnerability (981343) | 9 Jun 201000:00 | – | openvas |
![]() | Debian Security Advisory DSA 1849-1 (xml-security-c) | 17 Aug 200900:00 | – | openvas |
![]() | Mandrake Security Advisory MDVSA-2009:267 (xmlsec1) | 19 Oct 200900:00 | – | openvas |
![]() | Fedora Core 11 FEDORA-2009-8473 (xmlsec1) | 17 Aug 200900:00 | – | openvas |
![]() | Microsoft .NET Framework XML HMAC Truncation Vulnerability (981343) | 9 Jun 201000:00 | – | openvas |
![]() | CentOS Update for xmlsec1 CESA-2009:1428 centos4 i386 | 9 Aug 201100:00 | – | openvas |
![]() | Fedora Core 10 FEDORA-2009-8456 (xmlsec1) | 17 Aug 200900:00 | – | openvas |
![]() | RedHat Security Advisory RHSA-2009:1428 | 9 Sep 200900:00 | – | openvas |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo