Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-3230

Опубликовано: 28 янв. 2020
Источник: debian
EPSS Низкий

Описание

The libwww-perl LWP::Protocol::https module 6.04 through 6.06 for Perl, when using IO::Socket::SSL as the SSL socket class, allows attackers to disable server certificate validation via the (1) HTTPS_CA_DIR or (2) HTTPS_CA_FILE environment variable.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
liblwp-protocol-https-perlfixed6.04-3package
liblwp-protocol-https-perlnot-affectedwheezypackage

Примечания

  • Introduced by https://github.com/dagolden/lwp-protocol-https/commit/bcc46ce2dab53d2e2baa583f2243d6fc7d36dcc8

  • CVE assignment for https://github.com/libwww-perl/lwp-protocol-https/pull/14#issuecomment-42328818

EPSS

Процентиль: 56%
0.00344
Низкий

Связанные уязвимости

CVSS3: 5.9
ubuntu
около 6 лет назад

The libwww-perl LWP::Protocol::https module 6.04 through 6.06 for Perl, when using IO::Socket::SSL as the SSL socket class, allows attackers to disable server certificate validation via the (1) HTTPS_CA_DIR or (2) HTTPS_CA_FILE environment variable.

redhat
почти 12 лет назад

The libwww-perl LWP::Protocol::https module 6.04 through 6.06 for Perl, when using IO::Socket::SSL as the SSL socket class, allows attackers to disable server certificate validation via the (1) HTTPS_CA_DIR or (2) HTTPS_CA_FILE environment variable.

CVSS3: 5.9
nvd
около 6 лет назад

The libwww-perl LWP::Protocol::https module 6.04 through 6.06 for Perl, when using IO::Socket::SSL as the SSL socket class, allows attackers to disable server certificate validation via the (1) HTTPS_CA_DIR or (2) HTTPS_CA_FILE environment variable.

github
больше 3 лет назад

The libwww-perl LWP::Protocol::https module 6.04 through 6.06 for Perl, when using IO::Socket::SSL as the SSL socket class, allows attackers to disable server certificate validation via the (1) HTTPS_CA_DIR or (2) HTTPS_CA_FILE environment variable.

EPSS

Процентиль: 56%
0.00344
Низкий