Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7266-wh6x-6jjw

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The OCSP functionality in stunnel before 4.24 does not properly search certificate revocation lists (CRL), which allows remote attackers to bypass intended access restrictions by using revoked certificates.

The OCSP functionality in stunnel before 4.24 does not properly search certificate revocation lists (CRL), which allows remote attackers to bypass intended access restrictions by using revoked certificates.

EPSS

Процентиль: 64%
0.00488
Низкий

Связанные уязвимости

ubuntu
больше 17 лет назад

The OCSP functionality in stunnel before 4.24 does not properly search certificate revocation lists (CRL), which allows remote attackers to bypass intended access restrictions by using revoked certificates.

redhat
больше 17 лет назад

The OCSP functionality in stunnel before 4.24 does not properly search certificate revocation lists (CRL), which allows remote attackers to bypass intended access restrictions by using revoked certificates.

nvd
больше 17 лет назад

The OCSP functionality in stunnel before 4.24 does not properly search certificate revocation lists (CRL), which allows remote attackers to bypass intended access restrictions by using revoked certificates.

debian
больше 17 лет назад

The OCSP functionality in stunnel before 4.24 does not properly search ...

fstec
около 17 лет назад

Уязвимость операционной системы Gentoo Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 64%
0.00488
Низкий