{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-30T03:10:41.591","vulnerabilities":[{"cve":{"id":"CVE-2021-44273","sourceIdentifier":"cve@mitre.org","published":"2021-12-23T12:15:07.387","lastModified":"2024-11-21T06:30:41.833","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"e2guardian v5.4.x <= v5.4.3r is affected by missing SSL certificate validation in the SSL MITM engine. In standalone mode (i.e., acting as a proxy or a transparent proxy), with SSL MITM enabled, e2guardian, if built with OpenSSL v1.1.x, did not validate hostnames in certificates of the web servers that it connected to, and thus was itself vulnerable to MITM attacks."},{"lang":"es","value":"e2guardian versiones v5.4.x versiones anteriores a v5.4.3r incluyéndola, está afectado por la falta de comprobación de certificados SSL en el motor SSL MITM. En modo autónomo (es decir, actuando como proxy o proxy transparente), con SSL MITM habilitado, e2guardian, si está construido con OpenSSL versión v1.1.x, no comprueba los nombres de host en los certificados de los servidores web a los que son conectados, y por lo tanto es vulnerable a los ataques de tipo MITM"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N","baseScore":7.4,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.2,"impactScore":5.2}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:N","baseScore":5.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-295"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:e2bn:e2guardian:*:*:*:*:*:*:*:*","versionStartIncluding":"5.4.0","versionEndIncluding":"5.4.3r","matchCriteriaId":"3215FB43-3E00-4B8F-B56A-15E689EB7464"}]}]}],"references":[{"url":"http://www.openwall.com/lists/oss-security/2021/12/23/2","source":"cve@mitre.org","tags":["Mailing List","Third Party Advisory"]},{"url":"https://github.com/e2guardian/e2guardian/commit/eae46a7e2a57103aadca903c4a24cca94dc502a2","source":"cve@mitre.org","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/e2guardian/e2guardian/issues/707","source":"cve@mitre.org","tags":["Exploit","Issue Tracking","Patch","Third Party Advisory"]},{"url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00010.html","source":"cve@mitre.org"},{"url":"http://www.openwall.com/lists/oss-security/2021/12/23/2","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"https://github.com/e2guardian/e2guardian/commit/eae46a7e2a57103aadca903c4a24cca94dc502a2","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/e2guardian/e2guardian/issues/707","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Issue Tracking","Patch","Third Party Advisory"]},{"url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00010.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}