Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
man-in-the-middle vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2013-1051
apt 0.8.16, 0.9.7, and possibly other versions does not properly handle InRelease files, which allows man-in-the-middle malicious users to modify packages before installation via unknown vectors, possibly related to integrity checking and the use of third-party repositories.
Debian Advanced Package Tool 0.8.16
Debian Apt 0.9.7
Canonical Ubuntu Linux 11.10
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 12.10
4.3
CVSSv2
CVE-2016-6805
Apache Ignite prior to 1.9 allows man-in-the-middle malicious users to read arbitrary files via XXE in modified update-notifier documents.
Apache Ignite
5.8
CVSSv2
CVE-2013-0243
haskell-tls-extra prior to 0.6.1 has Basic Constraints attribute vulnerability may lead to Man in the Middle attacks on TLS connections
Haskell Hs-tls
4.4
CVSSv2
CVE-2021-25465
An improper scheme check vulnerability in Samsung Themes prior to version 5.2.01 allows malicious users to perform Man-in-the-middle attack.
Samsung Themes
4.3
CVSSv2
CVE-2020-15047
MSA/SMTP.cpp in Trojita prior to 0.8 ignores certificate-verification errors, which allows man-in-the-middle malicious users to spoof SMTP servers.
Trojita Project Trojita
5.8
CVSSv2
CVE-2012-2125
RubyGems prior to 1.8.23 can redirect HTTPS connections to HTTP, which makes it easier for remote malicious users to observe or modify a gem during installation via a man-in-the-middle attack.
Rubygems Rubygems 1.8.19
Rubygems Rubygems 1.8.18
Rubygems Rubygems 1.8.10
Rubygems Rubygems 1.8.9
Rubygems Rubygems 1.8.2
Rubygems Rubygems 1.8.1
Rubygems Rubygems 1.8.17
Rubygems Rubygems 1.8.16
Rubygems Rubygems 1.8.15
Rubygems Rubygems 1.8.8
Rubygems Rubygems 1.8.7
Rubygems Rubygems 1.8.0
Rubygems Rubygems 1.8.21
Rubygems Rubygems 1.8.20
Rubygems Rubygems 1.8.12
Rubygems Rubygems 1.8.11
Rubygems Rubygems 1.8.4
Rubygems Rubygems 1.8.3
Rubygems Rubygems
Rubygems Rubygems 1.8.14
Rubygems Rubygems 1.8.13
Rubygems Rubygems 1.8.6
4.3
CVSSv2
CVE-2015-0799
The HTTP Alternative Services feature in Mozilla Firefox prior to 37.0.1 allows man-in-the-middle malicious users to bypass an intended X.509 certificate-verification step for an SSL server by specifying that server in the uri-host field of an Alt-Svc HTTP/2 response header.
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 14.10
Opensuse Opensuse 13.2
Opensuse Opensuse 13.1
Mozilla Firefox
1 Article
6.8
CVSSv2
CVE-2019-5729
Splunk-SDK-Python prior to 1.6.6 does not properly verify untrusted TLS server certificates, which could result in man-in-the-middle attacks.
Splunk Software Development Kit
6.8
CVSSv2
CVE-2020-2185
Jenkins Amazon EC2 Plugin 1.50.1 and previous versions does not validate SSH host keys when connecting agents, enabling man-in-the-middle attacks.
Jenkins Amazon Ec2
4.3
CVSSv2
CVE-2021-31399
On 2N Access Unit 2.0 2.31.0.40.5 devices, an attacker can pose as the web relay for a man-in-the-middle attack.
2n Access Unit 2.0 Firmware 2.31.0.40.5
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2023-52689
CVE-2024-23803
client side
CVE-2023-52696
information disclosure
CVE-2024-35843
CVE-2024-27130
CVE-2023-52697
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
6
7
8
9
10
NEXT »