Total
1102 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2019-12496 | 1 Hybridgroup | 1 Gobot | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
An issue was discovered in Hybrid Group Gobot before 1.13.0. The mqtt subsystem skips verification of root CA certificates by default. | |||||
CVE-2019-12000 | 1 Hp | 1 Mse Msg Gw Application E-ltu | 2024-11-21 | 5.4 MEDIUM | 6.6 MEDIUM |
HPE has found a potential Remote Access Restriction Bypass in HPE MSE Msg Gw application E-LTU prior to version 3.2 when HTTPS is used between the USSD and an external USSD service logic application. Update to version 3.2 and update the HTTPS configuration as described in the HPE MSE Messaging Gateway Configuration and Operations Guide. | |||||
CVE-2019-11727 | 1 Mozilla | 1 Firefox | 2024-11-21 | 5.0 MEDIUM | 5.3 MEDIUM |
A vulnerability exists where it possible to force Network Security Services (NSS) to sign CertificateVerify with PKCS#1 v1.5 signatures when those are the only ones advertised by server in CertificateRequest in TLS 1.3. PKCS#1 v1.5 signatures should not be used for TLS 1.3 messages. This vulnerability affects Firefox < 68. | |||||
CVE-2019-11688 | 1 Asustor | 1 Exfat Driver | 2024-11-21 | 8.8 HIGH | 7.4 HIGH |
An issue was discovered in ASUSTOR exFAT Driver through 1.0.0.r20. When conducting license validation, exfat.cgi and exfatctl accept any certificate for asustornasapi.asustor.com. In other words, there is Missing SSL Certificate Validation. | |||||
CVE-2019-11674 | 1 Microfocus | 1 Netiq Self Service Password Reset | 2024-11-21 | 4.3 MEDIUM | 5.9 MEDIUM |
Man-in-the-middle vulnerability in Micro Focus Self Service Password Reset, affecting all versions prior to 4.4.0.4. The vulnerability could exploit invalid certificate validation and may result in a man-in-the-middle attack. | |||||
CVE-2019-11554 | 1 Amazon | 1 Audible | 2024-11-21 | 4.3 MEDIUM | 5.9 MEDIUM |
The Audible application through 2.34.0 for Android has Missing SSL Certificate Validation for Adobe SDKs, allowing MITM attackers to cause a denial of service. | |||||
CVE-2019-11550 | 1 Citrix | 2 Netscaler Sd-wan, Sd-wan | 2024-11-21 | 4.3 MEDIUM | 5.9 MEDIUM |
Citrix SD-WAN 10.2.x before 10.2.1 and NetScaler SD-WAN 10.0.x before 10.0.7 have Improper Certificate Validation. | |||||
CVE-2019-11497 | 1 Couchbase | 1 Couchbase Server | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
In Couchbase Server 5.0.0, when an invalid Remote Cluster Certificate was entered as part of the reference creation, XDCR did not parse and check the certificate signature. It then accepted the invalid certificate and attempted to use it to establish future connections to the remote cluster. This has been fixed in version 5.5.0. XDCR now checks the validity of the certificate thoroughly and prevents a remote cluster reference from being created with an invalid certificate. | |||||
CVE-2019-11324 | 2 Canonical, Python | 2 Ubuntu Linux, Urllib3 | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
The urllib3 library before 1.24.2 for Python mishandles certain cases where the desired set of CA certificates is different from the OS store of CA certificates, which results in SSL connections succeeding in situations where a verification failure is the correct outcome. This is related to use of the ssl_context, ca_certs, or ca_certs_dir argument. | |||||
CVE-2019-11242 | 1 Cohesity | 1 Dataplatform | 2024-11-21 | 4.3 MEDIUM | 8.1 HIGH |
A man-in-the-middle vulnerability related to vCenter access was found in Cohesity DataPlatform version 5.x and 6.x prior to 6.1.1c. Cohesity clusters did not verify TLS certificates presented by vCenter. This vulnerability could expose Cohesity user credentials configured to access vCenter. | |||||
CVE-2019-10914 | 1 Matrixssl | 1 Matrixssl | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
pubRsaDecryptSignedElementExt in MatrixSSL 4.0.1 Open, as used in Inside Secure TLS Toolkit, has a stack-based buffer overflow during X.509 certificate verification because of missing validation in psRsaDecryptPubExt in crypto/pubkey/rsa_pub.c. | |||||
CVE-2019-10446 | 1 Jenkins | 1 Cadence Vmanager | 2024-11-21 | 6.4 MEDIUM | 8.2 HIGH |
Jenkins Cadence vManager Plugin 2.7.0 and earlier disabled SSL/TLS and hostname verification globally for the Jenkins master JVM. | |||||
CVE-2019-10444 | 1 Jenkins | 1 Bumblebee Hp Alm | 2024-11-21 | 6.4 MEDIUM | 6.5 MEDIUM |
Jenkins Bumblebee HP ALM Plugin 4.1.3 and earlier unconditionally disabled SSL/TLS and hostname verification for connections to HP ALM. | |||||
CVE-2019-10382 | 1 Jenkins | 1 Vmware Lab Manager Slaves | 2024-11-21 | 5.8 MEDIUM | 6.5 MEDIUM |
Jenkins VMware Lab Manager Slaves Plugin 0.2.8 and earlier disables SSL/TLS and hostname verification globally for the Jenkins master JVM. | |||||
CVE-2019-10381 | 1 Jenkins | 1 Codefresh Integration | 2024-11-21 | 4.3 MEDIUM | 7.5 HIGH |
Jenkins Codefresh Integration Plugin 1.8 and earlier disables SSL/TLS and hostname verification globally for the Jenkins master JVM. | |||||
CVE-2019-10334 | 1 Jenkins | 1 Electricflow | 2024-11-21 | 5.8 MEDIUM | 6.5 MEDIUM |
Jenkins ElectricFlow Plugin 1.1.5 and earlier disabled SSL/TLS and hostname verification globally for the Jenkins master JVM when MultipartUtility.java is used to upload files. | |||||
CVE-2019-10317 | 1 Jenkins | 1 Sitemonitor | 2024-11-21 | 4.3 MEDIUM | 5.9 MEDIUM |
Jenkins SiteMonitor Plugin 0.5 and earlier disabled SSL/TLS and hostname verification globally for the Jenkins master JVM. | |||||
CVE-2019-10314 | 1 Jenkins | 1 Koji | 2024-11-21 | 4.3 MEDIUM | 5.9 MEDIUM |
Jenkins Koji Plugin disables SSL/TLS and hostname verification globally for the Jenkins master JVM. | |||||
CVE-2019-10091 | 1 Apache | 1 Geode | 2024-11-21 | 4.0 MEDIUM | 7.4 HIGH |
When TLS is enabled with ssl-endpoint-identification-enabled set to true, Apache Geode fails to perform hostname verification of the entries in the certificate SAN during the SSL handshake. This could compromise intra-cluster communication using a man-in-the-middle attack. | |||||
CVE-2019-1010275 | 1 Helm | 1 Helm | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
helm Before 2.7.2 is affected by: CWE-295: Improper Certificate Validation. The impact is: Unauthorized clients could connect to the server because self-signed client certs were aloowed. The component is: helm (many files updated, see https://github.com/helm/helm/pull/3152/files/1096813bf9a425e2aa4ac755b6c991b626dfab50). The attack vector is: A malicious client could connect to the server over the network. The fixed version is: 2.7.2. |