cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2020-13956,https://securityvulnerability.io/vulnerability/CVE-2020-13956,,Apache HttpClient versions prior to version 4.5.13 and 5.0.3 can misinterpret malformed authority component in request URIs passed to the library as java.net.URI object and pick the wrong target host for request execution.,Apache,Apache Httpclient,5.3,MEDIUM,0.0038499999791383743,false,,false,false,false,,,false,false,,2020-12-02T16:20:12.000Z,0 CVE-2013-4366,https://securityvulnerability.io/vulnerability/CVE-2013-4366,,"http/impl/client/HttpClientBuilder.java in Apache HttpClient 4.3.x before 4.3.1 does not ensure that X509HostnameVerifier is not null, which allows attackers to have unspecified impact via vectors involving hostname verification.",Apache,Httpclient,9.8,CRITICAL,0.0007399999885819852,false,,false,false,false,,,false,false,,2017-10-30T19:00:00.000Z,0 CVE-2012-6153,https://securityvulnerability.io/vulnerability/CVE-2012-6153,,"http/conn/ssl/AbstractVerifier.java in Apache Commons HttpClient before 4.2.3 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5783.",Apache,Commons-httpclient,,,0.008259999565780163,false,,false,false,false,,,false,false,,2014-09-04T17:00:00.000Z,0 CVE-2014-3577,https://securityvulnerability.io/vulnerability/CVE-2014-3577,,"org.apache.http.conn.ssl.AbstractVerifier in Apache HttpComponents HttpClient before 4.3.5 and HttpAsyncClient before 4.0.2 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a ""CN="" string in a field in the distinguished name (DN) of a certificate, as demonstrated by the ""foo,CN=www.apache.org"" string in the O field.",Apache,Httpclient,,,0.015209999866783619,false,,false,false,false,,,false,false,,2014-08-21T00:00:00.000Z,0 CVE-2012-5783,https://securityvulnerability.io/vulnerability/CVE-2012-5783,,"Apache Commons HttpClient 3.x, as used in Amazon Flexible Payments Service (FPS) merchant Java SDK and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.",Apache,Httpclient,,,0.001500000013038516,false,,false,false,false,,,false,false,,2012-11-04T22:00:00.000Z,0 CVE-2011-1498,https://securityvulnerability.io/vulnerability/CVE-2011-1498,,"Apache HttpClient 4.x before 4.1.1 in Apache HttpComponents, when used with an authenticating proxy server, sends the Proxy-Authorization header to the origin server, which allows remote web servers to obtain sensitive information by logging this header.",Apache,Httpclient,,,0.006039999891072512,false,,false,false,false,,,false,false,,2011-07-07T21:00:00.000Z,0