Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2010-4532
offlineimap before 6.3.2 does not check for SSL server certificate validation when "ssl = yes" option is specified which can allow man-in-the-middle attacks.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.002
EPSS Ranking
45.9%
CVSS Severity
CVSS v3 Score
5.9
CVSS v2 Score
4.3
References
https://access.redhat.com/security/cve/cve-2010-4532
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=603450
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4532
https://security-tracker.debian.org/tracker/CVE-2010-4532
https://www.openwall.com/lists/oss-security/2010/12/23/2
https://access.redhat.com/security/cve/cve-2010-4532
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=603450
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4532
https://security-tracker.debian.org/tracker/CVE-2010-4532
https://www.openwall.com/lists/oss-security/2010/12/23/2
Products affected by CVE-2010-4532
Offlineimap
»
Offlineimap
»
Version:
6.3.0
cpe:2.3:a:offlineimap:offlineimap:6.3.0
Offlineimap
»
Offlineimap
»
Version:
6.3.1
cpe:2.3:a:offlineimap:offlineimap:6.3.1
Debian
»
Debian Linux
»
Version:
10.0
cpe:2.3:o:debian:debian_linux:10.0
Debian
»
Debian Linux
»
Version:
8.0
cpe:2.3:o:debian:debian_linux:8.0
Debian
»
Debian Linux
»
Version:
9.0
cpe:2.3:o:debian:debian_linux:9.0
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved