Total
987 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2017-14806 | 1 Suse | 2 Studio Onsite, Susestudio-ui-server | 2023-11-07 | 4.3 MEDIUM | 5.9 MEDIUM |
A Improper Certificate Validation vulnerability in susestudio-common of SUSE Studio onsite allows remote attackers to MITM connections to the repositories, which allows the modification of packages received over these connections. This issue affects: SUSE Studio onsite susestudio-common version 1.3.17-56.6.3 and prior versions. | |||||
CVE-2017-11501 | 1 Nixos Project | 1 Nixos | 2023-11-07 | 4.3 MEDIUM | 5.9 MEDIUM |
NixOS 17.03 and earlier has an unintended default absence of SSL Certificate Validation for LDAP. The users.ldap NixOS module implements user authentication against LDAP servers via a PAM module. It was found that if TLS is enabled to connect to the LDAP server with users.ldap.useTLS, peer verification will be unconditionally disabled in /etc/ldap.conf. | |||||
CVE-2017-1000256 | 2 Debian, Redhat | 2 Debian Linux, Libvirt | 2023-11-07 | 6.8 MEDIUM | 8.1 HIGH |
libvirt version 2.3.0 and later is vulnerable to a bad default configuration of "verify-peer=no" passed to QEMU by libvirt resulting in a failure to validate SSL/TLS certificates by default. | |||||
CVE-2017-1000097 | 1 Golang | 1 Go | 2023-11-07 | 5.0 MEDIUM | 7.5 HIGH |
On Darwin, user's trust preferences for root certificates were not honored. If the user had a root certificate loaded in their Keychain that was explicitly not trusted, a Go program would still verify a connection using that root certificate. | |||||
CVE-2016-4467 | 1 Apache | 1 Qpid Proton | 2023-11-07 | 4.3 MEDIUM | 5.9 MEDIUM |
The C client and C-based client bindings in the Apache Qpid Proton library before 0.13.1 on Windows do not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate when using the SChannel-based security layer, which allows man-in-the-middle attackers to spoof servers via an arbitrary valid certificate. | |||||
CVE-2016-3083 | 1 Apache | 1 Hive | 2023-11-07 | 5.0 MEDIUM | 7.5 HIGH |
Apache Hive (JDBC + HiveServer2) implements SSL for plain TCP and HTTP connections (it supports both transport modes). While validating the server's certificate during the connection setup, the client in Apache Hive before 1.2.2 and 2.0.x before 2.0.1 doesn't seem to be verifying the common name attribute of the certificate. In this way, if a JDBC client sends an SSL request to server abc.com, and the server responds with a valid certificate (certified by CA) but issued to xyz.com, the client will accept that as a valid certificate and the SSL handshake will go through. | |||||
CVE-2016-2402 | 1 Squareup | 2 Okhttp, Okhttp3 | 2023-11-07 | 4.3 MEDIUM | 5.9 MEDIUM |
OkHttp before 2.7.4 and 3.x before 3.1.2 allows man-in-the-middle attackers to bypass certificate pinning by sending a certificate chain with a certificate from a non-pinned trusted CA and the pinned certificate. | |||||
CVE-2016-10937 | 4 Debian, Fedoraproject, Imapfilter Project and 1 more | 5 Debian Linux, Fedora, Imapfilter and 2 more | 2023-11-07 | 5.0 MEDIUM | 7.5 HIGH |
IMAPFilter through 2.6.12 does not validate the hostname in an SSL certificate. | |||||
CVE-2015-4017 | 1 Saltstack | 1 Salt | 2023-11-07 | 5.0 MEDIUM | 7.5 HIGH |
Salt before 2014.7.6 does not verify certificates when connecting via the aliyun, proxmox, and splunk modules. | |||||
CVE-2011-2874 | 1 Google | 1 Chrome | 2023-11-07 | 6.8 MEDIUM | N/A |
Google Chrome before 14.0.835.163 does not perform an expected pin operation for a self-signed certificate during a session, which has unspecified impact and remote attack vectors. | |||||
CVE-2022-38666 | 1 Jenkins | 1 Ns-nd Integration Performance Publisher | 2023-11-02 | N/A | 7.5 HIGH |
Jenkins NS-ND Integration Performance Publisher Plugin 4.8.0.146 and earlier unconditionally disables SSL/TLS certificate and hostname validation for several features. | |||||
CVE-2022-41244 | 1 Jenkins | 1 View26 Test-reporting | 2023-11-01 | N/A | 8.1 HIGH |
Jenkins View26 Test-Reporting Plugin 1.0.7 and earlier does not perform hostname validation when connecting to the configured View26 server that could be abused using a man-in-the-middle attack to intercept these connections. | |||||
CVE-2022-41243 | 1 Jenkins | 1 Smalltest | 2023-11-01 | N/A | 8.1 HIGH |
Jenkins SmallTest Plugin 1.0.4 and earlier does not perform hostname validation when connecting to the configured View26 server that could be abused using a man-in-the-middle attack to intercept these connections. | |||||
CVE-2022-45391 | 1 Jenkins | 1 Ns-nd Integration Performance Publisher | 2023-11-01 | N/A | 7.5 HIGH |
Jenkins NS-ND Integration Performance Publisher Plugin 4.8.0.143 and earlier globally and unconditionally disables SSL/TLS certificate and hostname validation for the entire Jenkins controller JVM. | |||||
CVE-2023-31580 | 1 Networknt | 1 Light-oauth2 | 2023-10-31 | N/A | 5.9 MEDIUM |
light-oauth2 before version 2.1.27 obtains the public key without any verification. This could allow attackers to authenticate to the application with a crafted JWT token. | |||||
CVE-2020-2253 | 1 Jenkins | 1 Email Extension | 2023-10-25 | 5.8 MEDIUM | 4.8 MEDIUM |
Jenkins Email Extension Plugin 2.75 and earlier does not perform hostname validation when connecting to the configured SMTP server. | |||||
CVE-2020-2252 | 1 Jenkins | 1 Mailer | 2023-10-25 | 5.8 MEDIUM | 4.8 MEDIUM |
Jenkins Mailer Plugin 1.32 and earlier does not perform hostname validation when connecting to the configured SMTP server. | |||||
CVE-2020-2187 | 1 Jenkins | 1 Amazon Ec2 | 2023-10-25 | 6.8 MEDIUM | 5.6 MEDIUM |
Jenkins Amazon EC2 Plugin 1.50.1 and earlier unconditionally accepts self-signed certificates and does not perform hostname validation, enabling man-in-the-middle attacks. | |||||
CVE-2019-16561 | 1 Jenkins | 1 Websphere Deployer | 2023-10-25 | 5.5 MEDIUM | 7.1 HIGH |
Jenkins WebSphere Deployer Plugin 1.6.1 and earlier allows users with Overall/Read access to disable SSL/TLS certificate and hostname validation for the entire Jenkins master JVM. | |||||
CVE-2019-16558 | 1 Jenkins | 1 Spira Importer | 2023-10-25 | 6.4 MEDIUM | 8.2 HIGH |
Jenkins Spira Importer Plugin 3.2.3 and earlier disables SSL/TLS certificate validation for the Jenkins master JVM. |