Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2011-3389

EPSS 3.83% · P88
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2011-3389

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Opera 输入验证错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Opera是挪威欧朋(Opera Software)公司所开发的一款Web浏览器,它支持多窗口浏览、可定制用户界面等。 Opera 11.51之前版本中存在未明安全漏洞,该漏洞具有未知攻击向量和“low severity”影响。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2011-3389

#POC DescriptionSource LinkShenlong Link
1:muscle: Proof Of Concept of the BEAST attack against SSL/TLS CVE-2011-3389 :muscle:https://github.com/mpgn/BEAST-PoCPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2011-3389

登录查看更多情报信息。

Same Patch Batch · n/a · 2011-09-06 · 18 CVEs total

CVE-2010-4831GTK+ gdk/win32/gdkinput-win32.c不可信搜索路径漏洞
CVE-2011-3390IBM OpenAdmin Tool index.php多个跨站脚本攻击漏洞
CVE-2011-3205Squid 安全漏洞
CVE-2011-2723Linux Kernel GRO 'skb_gro_header_slow()'拒绝服务漏洞
CVE-2011-2700Linux Kernel drivers/media/radio/si4713-i2c.c si4713_write_econtrol_string函数多个缓冲区错误漏洞
CVE-2011-2654Novell Cloud Manager RPC会话初始化任意代码执行漏洞
CVE-2011-1359IBM WebSphere Application Server管理控制台目录遍历漏洞
CVE-2011-0258Apple QuickTime 'mp4v'解码器信息处理任意代码执行漏洞
CVE-2010-4833GTK+ modules/engines/ms-windows/xp_theme.c不可信搜索路径漏洞
CVE-2011-3388Opera不安全站点信息漏洞
CVE-2011-3204Hammerhead hammerhead.cc后置链接漏洞
CVE-2011-3200RSyslog 'parseLegacySyslogMsg()'函数缓冲区错误漏洞
CVE-2011-2724Samba 输入验证错误漏洞
CVE-2011-2660SUSE Linux Enterprise Desktop vpnc包modify_resolvconf_suse脚本输入验证漏洞
CVE-2011-2184Linux Kernel security/keys/process_keys.c key_replace_session_keyring函数拒绝服务漏洞
CVE-2011-1776Linux kernel 缓冲区错误漏洞
CVE-2011-1771Linux Kernel fs/cifs/file.c cifs_close函数拒绝服务漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2011-3389

No comments yet


Leave a comment