Examples of using Man-in-the-middle in English and their translations into French
{-}
-
Colloquial
-
Official
not sufficiently validate TSIG signatures, allowing an attacker in position of man-in-the-middle to alter the content of an AXFR.
reducing the likelihood of"man-in-the-middle" attacks.
your data and DNS requests pass through an encrypted tunnel that defeats"man-in-the-middle" DNS attacks
communications run via an unauthorised intermediate point(= man-in-the-middle, attacker) eavesdropping on the diverted data traffic
The STARTTLS implementation does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place.
a secure VoIP application, to allow the two parties to verbally compare a short authentication string to detect a man-in-the-middle attack MiTM.
system's ARP table and thereby launch a denial-of-service or a man-in-the-middle attack.
various forms of man-in-the-middle attacks.
a so called BEAST attack allows man-in-the-middle attackers to obtain plaintext HTTP traffic via a blockwise chosen-boundary attack(BCBA) on an HTTPS session.
It was discovered that the STARTTLS implementation of the Kolab Cyrus IMAP server does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted IMAP,
William(B.J.) Snow Orvis discovered a vulnerability in the hostname checking in Ruby's SSL client that could allow man-in-the-middle attackers to spoof SSL servers via a crafted certificate issued by a trusted certification authority.
These included a man-in-the-middle attack on voice
If a man-in-the-middle attacker can control the NTP traffic since ntpd was started, they can prevent the client from
if the attacker can either control the specified proxy server or perform man-in-the-middle attacks on the tcp session between stunnel
Vulnerability allowing man-in-the-middle attack on API call to GitHub.
A man-in-the-middle attack in the addon update mechanism has been fixed.
This could allow remote attackers to perform a man-in-the-middle attack via crafted SSL certificates.
a malicious storage backend or man-in-the-middle attacker was able execute arbitrary code.
use of weak keys, resulting in potential man-in-the-middle attacks.
Stefan Metzmacher of SerNet and the Samba Team discovered that a man-in-the-middle attacker can downgrade LDAP connections to avoid integrity protection.