The W3C XML Signature Syntax and Processing (XMLDsig) is vulnerable to HMAC Truncation Length Spoofin
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | Microsoft XML Signature HMAC Truncation Bypass (MS10-041) - Ver2 (CVE-2009-0217) | 26 Mar 201500:00 | – | checkpoint_advisories |
![]() | Microsoft XML Signature HMAC Truncation Bypass (MS10-041; CVE-2009-0217) | 8 Jun 201000:00 | – | checkpoint_advisories |
![]() | CVE-2009-0217 | 14 Jul 200923:00 | – | cvelist |
![]() | CVE-2013-2155 | 20 Aug 201322:00 | – | cvelist |
![]() | Apache XML Security For Java vulnerable to authentication bypass by HMAC truncation | 2 May 202203:13 | – | github |
![]() | Mandriva Linux Security Advisory : mono (MDVSA-2009:269) | 30 Jul 201000:00 | – | nessus |
![]() | Oracle Linux 5 : xmlsec1 (ELSA-2009-1428) | 12 Jul 201300:00 | – | nessus |
![]() | Solaris 9 (x86) : 141710-03 | 3 Jun 200900:00 | – | nessus |
![]() | Debian DSA-1849-1 : xml-security-c - design flaw | 24 Feb 201000:00 | – | nessus |
![]() | Mandriva Linux Security Advisory : xmlsec1 (MDVSA-2009:267) | 12 Oct 200900:00 | – | nessus |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | mono | 2.4.2.3+dfsg-1 | mono_2.4.2.3+dfsg-1_all.deb |
Debian | 11 | all | mono | 2.4.2.3+dfsg-1 | mono_2.4.2.3+dfsg-1_all.deb |
Debian | 999 | all | mono | 2.4.2.3+dfsg-1 | mono_2.4.2.3+dfsg-1_all.deb |
Debian | 13 | all | mono | 2.4.2.3+dfsg-1 | mono_2.4.2.3+dfsg-1_all.deb |
Debian | 12 | all | xml-security-c | 1.4.0-4 | xml-security-c_1.4.0-4_all.deb |
Debian | 11 | all | xml-security-c | 1.4.0-4 | xml-security-c_1.4.0-4_all.deb |
Debian | 999 | all | xml-security-c | 1.4.0-4 | xml-security-c_1.4.0-4_all.deb |
Debian | 13 | all | xml-security-c | 1.4.0-4 | xml-security-c_1.4.0-4_all.deb |
Debian | 12 | all | xmlsec1 | 1.2.12-1 | xmlsec1_1.2.12-1_all.deb |
Debian | 11 | all | xmlsec1 | 1.2.12-1 | xmlsec1_1.2.12-1_all.deb |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo