Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
man-in-the-middle vulnerabilities and exploits
(subscribe to this query)
383
VMScore
CVE-2020-5812
Nessus AMI versions 8.12.0 and previous versions were found to either not validate, or incorrectly validate, a certificate which could allow an malicious user to spoof a trusted entity by using a man-in-the-middle (MITM) attack.
Tenable Nessus Amazon Machine Image
383
VMScore
CVE-2020-15047
MSA/SMTP.cpp in Trojita prior to 0.8 ignores certificate-verification errors, which allows man-in-the-middle malicious users to spoof SMTP servers.
Trojita Project Trojita
516
VMScore
CVE-2013-0243
haskell-tls-extra prior to 0.6.1 has Basic Constraints attribute vulnerability may lead to Man in the Middle attacks on TLS connections
Haskell Hs-tls
383
VMScore
CVE-2016-6805
Apache Ignite prior to 1.9 allows man-in-the-middle malicious users to read arbitrary files via XXE in modified update-notifier documents.
Apache Ignite
392
VMScore
CVE-2021-25465
An improper scheme check vulnerability in Samsung Themes prior to version 5.2.01 allows malicious users to perform Man-in-the-middle attack.
Samsung Themes
383
VMScore
CVE-2015-0799
The HTTP Alternative Services feature in Mozilla Firefox prior to 37.0.1 allows man-in-the-middle malicious users to bypass an intended X.509 certificate-verification step for an SSL server by specifying that server in the uri-host field of an Alt-Svc HTTP/2 response header.
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 14.10
Opensuse Opensuse 13.2
Opensuse Opensuse 13.1
Mozilla Firefox
1 Article
516
VMScore
CVE-2012-2125
RubyGems prior to 1.8.23 can redirect HTTPS connections to HTTP, which makes it easier for remote malicious users to observe or modify a gem during installation via a man-in-the-middle attack.
Rubygems Rubygems 1.8.19
Rubygems Rubygems 1.8.18
Rubygems Rubygems 1.8.10
Rubygems Rubygems 1.8.9
Rubygems Rubygems 1.8.2
Rubygems Rubygems 1.8.1
Rubygems Rubygems 1.8.17
Rubygems Rubygems 1.8.16
Rubygems Rubygems 1.8.15
Rubygems Rubygems 1.8.8
Rubygems Rubygems 1.8.7
Rubygems Rubygems 1.8.0
Rubygems Rubygems 1.8.21
Rubygems Rubygems 1.8.20
Rubygems Rubygems 1.8.12
Rubygems Rubygems 1.8.11
Rubygems Rubygems 1.8.4
Rubygems Rubygems 1.8.3
Rubygems Rubygems
Rubygems Rubygems 1.8.14
Rubygems Rubygems 1.8.13
Rubygems Rubygems 1.8.6
516
VMScore
CVE-2011-4968
nginx http proxy module does not verify peer identity of https origin server which could facilitate man-in-the-middle attack (MITM)
F5 Nginx 0.7.61
F5 Nginx 0.7.62
F5 Nginx 0.7.64
F5 Nginx 0.7.65
F5 Nginx 0.7.66
F5 Nginx 0.8.33
F5 Nginx 0.8.35
F5 Nginx 0.8.36
F5 Nginx 0.8.40
F5 Nginx 1.2.6
Debian Debian Linux 8.0
294
VMScore
CVE-2015-5853
AirScan in Apple OS X prior to 10.11 allows man-in-the-middle malicious users to obtain eSCL packet payload data via unspecified vectors.
Apple Mac Os X
605
VMScore
CVE-2014-2680
The update process in Xmind 3.4.1 and previous versions allow remote malicious users to execute arbitrary code via a man-in-the-middle attack.
Xmind Xmind
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7028
memory leak
log injection
CVE-2024-3400
CVE-2022-48695
CVE-2022-48675
CVE-2024-34487
CVE-2024-33792
spoof
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »