Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3w38-w685-6793

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Stunnel 5.00 through 5.13, when using the redirect option, does not redirect client connections to the expected server after the initial connection, which allows remote attackers to bypass authentication.

Stunnel 5.00 through 5.13, when using the redirect option, does not redirect client connections to the expected server after the initial connection, which allows remote attackers to bypass authentication.

EPSS

Процентиль: 48%
0.00248
Низкий

Дефекты

CWE-284

Связанные уязвимости

ubuntu
больше 10 лет назад

Stunnel 5.00 through 5.13, when using the redirect option, does not redirect client connections to the expected server after the initial connection, which allows remote attackers to bypass authentication.

redhat
больше 10 лет назад

Stunnel 5.00 through 5.13, when using the redirect option, does not redirect client connections to the expected server after the initial connection, which allows remote attackers to bypass authentication.

nvd
больше 10 лет назад

Stunnel 5.00 through 5.13, when using the redirect option, does not redirect client connections to the expected server after the initial connection, which allows remote attackers to bypass authentication.

debian
больше 10 лет назад

Stunnel 5.00 through 5.13, when using the redirect option, does not re ...

suse-cvrf
больше 10 лет назад

Security update for stunnel

EPSS

Процентиль: 48%
0.00248
Низкий

Дефекты

CWE-284