info
discussion
exploit
solution
references
Cisco SSL/TLS Certificate and SSH Public Key Validation Vulnerability
To exploit this issue, attackers require access to a network using the vulnerable applications.
Privacy Statement
Copyright 2010, SecurityFocus