This HTML5 document contains 4 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

PrefixNamespace IRI
isaphttp://webisa.webdatacommons.org/prov/
n4cvedetails.
isahttp://webisa.webdatacommons.org/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
provhttp://www.w3.org/ns/prov#
xsdhhttp://www.w3.org/2001/XMLSchema#
Subject Item
isa:239752004
rdf:type
prov:Entity
prov:value
ting connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a plaintext injection attack, aka the Project Mogul issue. 7 CVE-2009-2699
prov:wasQuotedFrom
n4:com
Subject Item
isap:449611050
prov:wasDerivedFrom
isa:239752004