CVE-2008-2233

The client in Openwsman 1.2.0 and 2.0.0, in unknown configurations, allows remote Openwsman servers to replay SSL sessions via unspecified vectors.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openwsman:openwsman:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:openwsman:openwsman:2.0.0:*:*:*:*:*:*:*

History

21 Nov 2024, 00:46

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00003.html - Patch () http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00003.html - Patch
References () http://secunia.com/advisories/31429 - () http://secunia.com/advisories/31429 -
References () http://www.securityfocus.com/bid/30694 - () http://www.securityfocus.com/bid/30694 -
References () http://www.vupen.com/english/advisories/2008/2397 - () http://www.vupen.com/english/advisories/2008/2397 -

Information

Published : 2008-08-18 17:41

Updated : 2024-11-21 00:46


NVD link : CVE-2008-2233

Mitre link : CVE-2008-2233

CVE.ORG link : CVE-2008-2233


JSON object : View

Products Affected

openwsman

  • openwsman
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')