CVE-2017-11770

CVSS v3 Score
7.5
High
CVSS v2 Score
5.0
Medium

Vulnerability Description

.NET Core 1.0, 1.1, and 2.0 allow an unauthenticated attacker to remotely cause a denial of service attack against a .NET Core web application by improperly parsing certificate data. A denial of service vulnerability exists when .NET Core improperly handles parsing certificate data, aka ".NET CORE Denial Of Service Vulnerability".

CVSS:7.5(High)

Opera before 10.00 does not check all intermediate X.509 certificates for revocation, which makes it easier for remote SSL servers to bypass validation of the certificate chain via a revoked certifica...

CVSS:7.5(High)

The jruby-openssl gem before 0.6 for JRuby mishandles SSL certificate validation.

CVSS:7.5(High)

vdsm: certificate generation upon node creation allowing vdsm to start and serve requests from anyone who has a matching key (and certificate)

CVSS:7.5(High)

nuSOAP before 0.7.3-5 does not properly check the hostname of a cert.

CVSS:7.5(High)

An import error was introduced in Cumin in the code refactoring in r5310. Server certificate validation is always disabled when connecting to Aviary servers, even if the installed packages on a system...

CVSS:7.5(High)

Pulp before 2.3.0 uses the same the same certificate authority key and certificate for all installations.