Language:
http://www-01.ibm.com/support/docview.wss?uid=swg21681114
http://www-01.ibm.com/support/docview.wss?uid=swg24037141
http://www.nessus.org/u?eb873351
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00
Severity: Low
ID: 77811
File Name: ibm_domino_9_0_1_fp2.nasl
Version: 1.12
Type: local
Agent: windows
Family: Windows
Published: 9/23/2014
Updated: 6/23/2023
Supported Sensors: Nessus Agent, Nessus
Risk Factor: High
Score: 7.3
Risk Factor: Critical
Base Score: 10
Temporal Score: 7.8
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2014-2421
Risk Factor: Low
Base Score: 3.4
Temporal Score: 3.1
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CVSS Score Source: CVE-2014-3566
CPE: cpe:/a:ibm:domino
Required KB Items: installed_sw/IBM Domino
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 8/19/2014
Vulnerability Publication Date: 4/15/2014
CVE: CVE-2013-6629, CVE-2013-6954, CVE-2014-0429, CVE-2014-0446, CVE-2014-0448, CVE-2014-0449, CVE-2014-0451, CVE-2014-0452, CVE-2014-0453, CVE-2014-0454, CVE-2014-0455, CVE-2014-0457, CVE-2014-0458, CVE-2014-0459, CVE-2014-0460, CVE-2014-0461, CVE-2014-0963, CVE-2014-1876, CVE-2014-2398, CVE-2014-2401, CVE-2014-2402, CVE-2014-2409, CVE-2014-2412, CVE-2014-2414, CVE-2014-2420, CVE-2014-2421, CVE-2014-2423, CVE-2014-2427, CVE-2014-2428, CVE-2014-3566
BID: 63676, 64493, 65568, 66856, 66866, 66870, 66873, 66879, 66881, 66883, 66887, 66891, 66894, 66898, 66899, 66902, 66903, 66904, 66905, 66907, 66909, 66910, 66911, 66914, 66915, 66916, 66919, 66920, 67238, 70574
CERT: 577193