// For flags

CVE-2003-0370

 

Severity Score

7.5
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Konqueror Embedded and KDE 2.2.2 and earlier does not validate the Common Name (CN) field for X.509 Certificates, which could allow remote attackers to spoof certificates via a man-in-the-middle attack.

Konqueror Embedded y KDE 2.2.2 y anteriores no validan el campo Common Name (CN) en certificados X.509, lo que permitiría que atacantes remotos falsifiquen certificados mediante un ataque "man-in-the-middle".

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2003-06-03 CVE Reserved
  • 2003-06-05 CVE Published
  • 2023-03-07 EPSS Updated
  • 2024-08-08 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Apple
Search vendor "Apple"
Safari
Search vendor "Apple" for product "Safari"
1.0
Search vendor "Apple" for product "Safari" and version "1.0"
beta
Affected
Apple
Search vendor "Apple"
Safari
Search vendor "Apple" for product "Safari"
1.0
Search vendor "Apple" for product "Safari" and version "1.0"
beta2
Affected
Kde
Search vendor "Kde"
Konqueror Embedded
Search vendor "Kde" for product "Konqueror Embedded"
0.1
Search vendor "Kde" for product "Konqueror Embedded" and version "0.1"
-
Affected
Kde
Search vendor "Kde"
Kde
Search vendor "Kde" for product "Kde"
<= 2.2.2
Search vendor "Kde" for product "Kde" and version " <= 2.2.2"
-
Affected
Redhat
Search vendor "Redhat"
Linux
Search vendor "Redhat" for product "Linux"
7.1
Search vendor "Redhat" for product "Linux" and version "7.1"
-
Affected
Redhat
Search vendor "Redhat"
Linux
Search vendor "Redhat" for product "Linux"
7.2
Search vendor "Redhat" for product "Linux" and version "7.2"
-
Affected
Turbolinux
Search vendor "Turbolinux"
Turbolinux Server
Search vendor "Turbolinux" for product "Turbolinux Server"
7.0
Search vendor "Turbolinux" for product "Turbolinux Server" and version "7.0"
-
Affected
Turbolinux
Search vendor "Turbolinux"
Turbolinux Server
Search vendor "Turbolinux" for product "Turbolinux Server"
8.0
Search vendor "Turbolinux" for product "Turbolinux Server" and version "8.0"
-
Affected
Turbolinux
Search vendor "Turbolinux"
Turbolinux Workstation
Search vendor "Turbolinux" for product "Turbolinux Workstation"
7.0
Search vendor "Turbolinux" for product "Turbolinux Workstation" and version "7.0"
-
Affected
Turbolinux
Search vendor "Turbolinux"
Turbolinux Workstation
Search vendor "Turbolinux" for product "Turbolinux Workstation"
8.0
Search vendor "Turbolinux" for product "Turbolinux Workstation" and version "8.0"
-
Affected