Improper validation of the server’s certificate chain in secure traffic scanning feature considered intermediate certificate signed using the MD5 or SHA1 algorithm as trusted.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
eset internet security - |
||
eset nod32 antivirus - |
||
eset smart security - |
||
eset mail security - |
||
eset security - |
||
eset server security - |
||
eset server security |
||
eset file security - |
||
eset endpoint antivirus |
||
eset endpoint security - |
||
eset endpoint antivirus - |