Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
man-in-the-middle vulnerabilities and exploits
(subscribe to this query)
7.4
CVSSv3
CVE-2013-0243
haskell-tls-extra prior to 0.6.1 has Basic Constraints attribute vulnerability may lead to Man in the Middle attacks on TLS connections
Haskell Hs-tls
5.9
CVSSv3
CVE-2020-15047
MSA/SMTP.cpp in Trojita prior to 0.8 ignores certificate-verification errors, which allows man-in-the-middle malicious users to spoof SMTP servers.
Trojita Project Trojita
7
CVSSv3
CVE-2021-25465
An improper scheme check vulnerability in Samsung Themes prior to version 5.2.01 allows malicious users to perform Man-in-the-middle attack.
Samsung Themes
NA
CVE-2015-0799
The HTTP Alternative Services feature in Mozilla Firefox prior to 37.0.1 allows man-in-the-middle malicious users to bypass an intended X.509 certificate-verification step for an SSL server by specifying that server in the uri-host field of an Alt-Svc HTTP/2 response header.
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 14.10
Opensuse Opensuse 13.2
Opensuse Opensuse 13.1
Mozilla Firefox
1 Article
NA
CVE-2012-2125
RubyGems prior to 1.8.23 can redirect HTTPS connections to HTTP, which makes it easier for remote malicious users to observe or modify a gem during installation via a man-in-the-middle attack.
Rubygems Rubygems 1.8.19
Rubygems Rubygems 1.8.18
Rubygems Rubygems 1.8.10
Rubygems Rubygems 1.8.9
Rubygems Rubygems 1.8.2
Rubygems Rubygems 1.8.1
Rubygems Rubygems 1.8.17
Rubygems Rubygems 1.8.16
Rubygems Rubygems 1.8.15
Rubygems Rubygems 1.8.8
Rubygems Rubygems 1.8.7
Rubygems Rubygems 1.8.0
Rubygems Rubygems 1.8.21
Rubygems Rubygems 1.8.20
Rubygems Rubygems 1.8.12
Rubygems Rubygems 1.8.11
Rubygems Rubygems 1.8.4
Rubygems Rubygems 1.8.3
Rubygems Rubygems
Rubygems Rubygems 1.8.14
Rubygems Rubygems 1.8.13
Rubygems Rubygems 1.8.6
NA
CVE-2014-2216
The FortiManager protocol service in Fortinet FortiOS prior to 4.3.16 and 5.0.0 prior to 5.0.8 on FortiGate devices allows remote malicious users to cause a denial of service and possibly execute arbitrary code via a crafted request.
Fortinet Fortios 5.0.4
Fortinet Fortios 5.0.5
Fortinet Fortios 4.3.10
Fortinet Fortios 5.0.0
Fortinet Fortios 5.0.3
Fortinet Fortios 4.3.13
Fortinet Fortios 4.3.12
Fortinet Fortios
Fortinet Fortios 4.3.14
Fortinet Fortios 5.0.6
Fortinet Fortios 5.0.7
NA
CVE-2014-0351
The FortiManager protocol service in Fortinet FortiOS prior to 4.3.16 and 5.x prior to 5.0.8 on FortiGate devices does not prevent use of anonymous ciphersuites, which makes it easier for man-in-the-middle malicious users to obtain sensitive information or interfere with communic...
Fortinet Fortios 5.0.7
Fortinet Fortios 5.0.6
Fortinet Fortios 5.0.5
Fortinet Fortios 4.3.12
Fortinet Fortios 4.3.10
Fortinet Fortios 4.3.14
Fortinet Fortios 4.3.13
Fortinet Fortios 5.0.0
Fortinet Fortios
Fortinet Fortios 5.0.4
Fortinet Fortios 5.0.3
NA
CVE-2013-6396
The OpenStack Python client library for Swift (python-swiftclient) 1.0 up to and including 1.9.0 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle malicious users to spoof servers and obtain sensitive information via a crafted certificate.
Openstack Swift 1.0.0
Openstack Swift 1.0.2
Openstack Swift 1.11.0
Openstack Swift 1.2.0
Openstack Swift 1.4.2
Openstack Swift 1.4.4
Openstack Swift 1.7.0
Openstack Swift 1.7.4
Openstack Swift 1.8.0
Openstack Swift 1.3.0
Openstack Swift 1.4.0
Openstack Swift 1.7.5
Openstack Swift 1.7.6
Openstack Swift 1.1.0
Openstack Swift 1.10.0
Openstack Swift 1.4.6
Openstack Swift 1.4.7
Openstack Swift 1.4.8
Openstack Swift 1.5.0
Openstack Swift 1.0.1
Openstack Swift 1.4.1
Openstack Swift 1.4.3
NA
CVE-2011-3150
Software Center in Ubuntu 11.10, 11.04 10.10 does not properly validate server certificates, which allows remote malicious users to execute arbitrary code or obtain sensitive information via a man-in-the-middle (MITM) attack.
Canonical Ubuntu Linux 11.04
Canonical Ubuntu Linux 10.10
Canonical Ubuntu Linux 11.10
NA
CVE-2012-0962
Aptdaemon 0.43 in Ubuntu 11.10 and 12.04 LTS uses short IDs when importing PPA GPG keys from a keyserver, which allows remote malicious users to install arbitrary package repository GPG keys via a man-in-the-middle (MITM) attack.
Sebastian Heinlein Aptdaemon 0.43
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 11.10
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
inject
CVE-2024-34001
CVE-2024-37018
LFI
CVE-2024-1275
CVE-2024-1086
CSRF
CVE-2024-31030
CVE-2024-24919
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »