Search for vulnerabilities
Vulnerability ID | VCID-m67w-mzaf-duch |
Aliases |
CVE-2014-3566
|
Summary | |
Status | Published |
Exploitability | 2.0 |
Weighted Severity | 2.9 |
Risk | 5.8 |
Affected and Fixed Packages | Package Details |
System | Score | Found at |
---|---|---|
epss | 0.94084 | https://api.first.org/data/v1/epss?cve=CVE-2014-3566 |
epss | 0.94084 | https://api.first.org/data/v1/epss?cve=CVE-2014-3566 |
epss | 0.9413 | https://api.first.org/data/v1/epss?cve=CVE-2014-3566 |
epss | 0.9413 | https://api.first.org/data/v1/epss?cve=CVE-2014-3566 |
cvssv2 | 5.8 | https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml |
Data source | Metasploit |
---|---|
Description | Check if a server supports a given version of SSL/TLS and cipher suites. The certificate is stored in loot, and any known vulnerabilities against that SSL version and cipher suite combination are checked. These checks include POODLE, deprecated protocols, expired/not valid certs, low key strength, null cipher suites, certificates signed with MD5, DROWN, RC4 ciphers, exportable ciphers, LOGJAM, and BEAST. |
Note | {} |
Ransomware campaign use | Unknown |
Source publication date | Oct. 14, 2014 |
Source URL | https://github.com/rapid7/metasploit-framework/tree/master/modules/auxiliary/scanner/ssl/ssl_version.rb |
Exploitability (E) | Access Vector (AV) | Access Complexity (AC) | Authentication (Au) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|
high functional unproven proof_of_concept not_defined |
local adjacent_network network |
high medium low |
multiple single none |
none partial complete |
none partial complete |
none partial complete |
Percentile | 0.99898 |
EPSS Score | 0.94084 |
Published At | Aug. 2, 2025, 12:55 p.m. |
Date | Actor | Action | Source | VulnerableCode Version |
---|---|---|---|---|
2025-07-31T08:35:36.063028+00:00 | Ubuntu USN Importer | Import | https://usn.ubuntu.com/2486-1/ | 37.0.0 |