5.9
CVSSv3

CVE-2016-0149

Published: 11/05/2016 Updated: 12/10/2018
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.9 | Impact Score: 3.6 | Exploitability Score: 2.2
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

Microsoft .NET Framework 2.0 SP2, 3.0 SP2, 3.5, 3.5.1, 4.5.2, 4.6, and 4.6.1 allows man-in-the-middle malicious users to obtain sensitive cleartext information via vectors involving injection of cleartext data into the client-server data stream, aka "TLS/SSL Information Disclosure Vulnerability."

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft .net framework 3.5

microsoft .net framework 3.0

microsoft .net framework 2.0

microsoft .net framework 4.6

microsoft .net framework 4.5.2

microsoft .net framework 3.5.1

microsoft .net framework 4.6.1

Github Repositories

Ansible role (built for Windows) to configure more secure SCHANNEL settings for encrypted network services like IIS and winrm that use SSL or TLS.

SCHANNEL Makes changes to SCHANNEL settings of the Windows registry to serve more secure cryptographic communications for services like IIS and WinRM Ciphers: AES 128/128 AES 256/256 DES 56/56 NULL RC2 40/128 RC2 56/128 RC2 128/128 RC4 40/128 RC4 56/128 RC4 64/128 RC4 128/128 Triple DES 168/168 Protocols: PCT 10 SSLv2 SSLv3 TLS 10 TLS 11 TLS 12 Hashes: MD5 SHA-1 S