- Home
- CVEs with nessus.description==The remote Solaris system is missing necessary patches to address
security updates :
- The SSL protocol, as used in certain configurations in
Microsoft Windows and Microsoft Internet Explorer,
Mozilla Firefox, Google Chrome, Opera, and other
products, encrypts data by using CBC mode with chained
initialization vectors, which allows man-in-the-middle
attackers to obtain plaintext HTTP headers via a
blockwise chosen-boundary attack (BCBA) on an HTTPS
session, in conjunction with JavaScript code that uses
(1) the HTML5 WebSocket API, (2) the Java URLConnection
API, or (3) the Silverlight WebClient API, aka a 'BEAST'
attack. (CVE-2011-3389)
- Fetchmail 5.0.8 through 6.3.21, when using NTLM
authentication in debug mode, allows remote NTLM servers
to (1) cause a denial of service (crash and delayed
delivery of inbound mail) via a crafted NTLM response
that triggers an out-of-bounds read in the base64
decoder, or (2) obtain sensitive information from memory
via an NTLM Type 2 message with a crafted Target Name
structure, which triggers an out-of-bounds read.
(CVE-2012-3482)
Max CVSS | 0 |
Min CVSS | 0 |
Total Count | 2 |
| ID | CVSS | Summary | Last (major) update | Published |
Back to Top
Mark selected
Back to Top