The TLS and SSL protocols are prone to plaintext injection attack, allowing man-in-the-middle attackers to insert data into HTTPS sessions as well as other TLS or SSL protected sessions
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | (RHSA-2010:0155) Moderate: java-1.4.2-ibm security and bug fix update | 17 Mar 201000:00 | – | redhat |
![]() | (RHSA-2010:0164) Moderate: openssl097a security update | 25 Mar 201000:00 | – | redhat |
![]() | Red Hat は、TLS 再ネゴシエーションの中間者 (MITM) 攻撃 (CVE-2009-3555) の影響を受けますか? | 2 Dec 201404:59 | – | redhat |
![]() | (RHSA-2010:0165) Moderate: nss security update | 25 Mar 201000:00 | – | redhat |
![]() | Mandriva Update for nss MDVSA-2010:069 (nss) | 9 Apr 201000:00 | – | openvas |
![]() | CentOS Update for openssl097a CESA-2010:0164 centos5 i386 | 9 Aug 201100:00 | – | openvas |
![]() | CentOS Update for nspr CESA-2010:0165 centos5 i386 | 9 Aug 201100:00 | – | openvas |
![]() | Fedora Update for nss FEDORA-2010-3905 | 31 Mar 201000:00 | – | openvas |
![]() | CentOS Update for nspr CESA-2010:0165 centos4 i386 | 31 Mar 201000:00 | – | openvas |
![]() | SuSE Security Advisory SUSE-SA:2009:057 (openssl) | 23 Nov 200900:00 | – | openvas |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | apache2 | 2.2.14-2 | apache2_2.2.14-2_all.deb |
Debian | 11 | all | apache2 | 2.2.14-2 | apache2_2.2.14-2_all.deb |
Debian | 999 | all | apache2 | 2.2.14-2 | apache2_2.2.14-2_all.deb |
Debian | 13 | all | apache2 | 2.2.14-2 | apache2_2.2.14-2_all.deb |
Debian | 12 | all | lighttpd | 1.4.30-1 | lighttpd_1.4.30-1_all.deb |
Debian | 11 | all | lighttpd | 1.4.30-1 | lighttpd_1.4.30-1_all.deb |
Debian | 999 | all | lighttpd | 1.4.30-1 | lighttpd_1.4.30-1_all.deb |
Debian | 13 | all | lighttpd | 1.4.30-1 | lighttpd_1.4.30-1_all.deb |
Debian | 12 | all | nginx | 0.7.64-1 | nginx_0.7.64-1_all.deb |
Debian | 11 | all | nginx | 0.7.64-1 | nginx_0.7.64-1_all.deb |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo