Valicert Enterprise Validation Authority 3.3

CPE Details

Valicert Enterprise Validation Authority 3.3
3.3
2024-04-29
09h53 +00:00
2024-04-29
09h53 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:valicert:enterprise_validation_authority:3.3:*:*:*:*:*:*:*

Informations

Vendor

valicert

Product

enterprise_validation_authority

Version

3.3

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2001-0947 2002-02-02
04h00 +00:00
Forms.exe CGI program in ValiCert Enterprise Validation Authority (EVA) 3.3 through 4.2.1 allows remote attackers to determine the real pathname of the server by requesting an invalid extension, which produces an error page that includes the path.
7.5
CVE-2001-0948 2002-02-02
04h00 +00:00
Cross-site scripting (CSS) vulnerability in ValiCert Enterprise Validation Authority (EVA) 3.3 through 4.2.1 allows remote attackers to execute arbitrary code or display false information by including HTML or script in the certificate's description, which is executed when the certificate is viewed.
7.5
CVE-2001-0949 2002-02-02
04h00 +00:00
Buffer overflows in forms.exe CGI program in ValiCert Enterprise Validation Authority (EVA) Administration Server 3.3 through 4.2.1 allows remote attackers to execute arbitrary code via long arguments to the parameters (1) Mode, (2) Certificate_File, (3) useExpiredCRLs, (4) listenLength, (5) maxThread, (6) maxConnPerSite, (7) maxMsgLen, (8) exitTime, (9) blockTime, (10) nextUpdatePeriod, (11) buildLocal, (12) maxOCSPValidityPeriod, (13) extension, and (14) a particular combination of parameters associated with private key generation that form a string of a certain length.
7.5
CVE-2001-0950 2002-02-02
04h00 +00:00
ValiCert Enterprise Validation Authority (EVA) Administration Server 3.3 through 4.2.1 uses insufficiently random data to (1) generate session tokens for HSMs using the C rand function, or (2) generate certificates or keys using /dev/urandom instead of another source which blocks when the entropy pool is low, which could make it easier for local or remote attackers to steal tokens or certificates via brute force guessing.
7.5
High