|
|
CVE-ID | ||
---|---|---|
CVE-2002-0828 |
• CVSS Severity Rating • Fix Information • Vulnerable Software Versions • SCAP Mappings • CPE Information
|
|
Description | ||
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-0862. Reason: This is a duplicate of CVE-2002-0862. Notes: All CVE users should reference CVE-2002-0862 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage. | ||
References | ||
Note: References are provided for the convenience of the reader to help distinguish between vulnerabilities. The list is not intended to be complete. | ||
Assigning CNA | ||
MITRE Corporation | ||
Date Record Created | ||
20020806 | Disclaimer: The record creation date may reflect when the CVE ID was allocated or reserved, and does not necessarily indicate when this vulnerability was discovered, shared with the affected vendor, publicly disclosed, or updated in CVE. | |
Phase (Legacy) | ||
Modified (20050204) | ||
Votes (Legacy) | ||
MODIFY(1) Foat NOOP(3) Armstrong, Cole, Cox REJECT(3) Baker, Christey, Frech REVIEWING(1) Wall |
||
Comments (Legacy) | ||
Cox> Why isn't this sharing the same CVE name as CVE-2002-0970? Christey> BID:5410 URL:http://www.securityfocus.com/bid/5410 CHANGE> [Christey changed vote from NOOP to REJECT] Christey> This is an original report of a larger issue as described in CVE-2002-0862. This candidate will be REJECTED and CVE-2002-0862 will be used in its place, since CVE-2002-0862 comes from a more authoritative source, and is more accurate. Foat> This vulneraiblity is valid. It was discovered that the scope is much greater than indicated in the description, since certificate checking is an OS function in the Windows environment. A complete listing of the vulnerable platforms is available at http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bull etin/ms02-050.asp. Frech> Remains associated with XF:ssl-ca-certificate-spoofing(9776) |
||
Proposed (Legacy) | ||
20020830 | ||
This is an record on the CVE List, which provides common identifiers for publicly known cybersecurity vulnerabilities. | ||
You can also search by reference using the CVE Reference Maps.
|
||
For More Information: CVE Request Web Form (select "Other" from dropdown) |