Описание
Parallels 13 uses cleartext HTTP as part of the update process, allowing man-in-the-middle attacks. Users of out-of-date versions are presented with a pop-up window for a parallels_updates.xml file on the http://update.parallels.com web site.
Ссылки
- Third Party Advisory
- ExploitThird Party Advisory
- ProductVendor Advisory
- Third Party Advisory
- ExploitThird Party Advisory
- ProductVendor Advisory
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:parallels:parallels:13:*:*:*:*:*:*:*
EPSS
Процентиль: 48%
0.00248
Низкий
7.5 High
CVSS3
7.6 High
CVSS2
Дефекты
CWE-312
Связанные уязвимости
github
больше 3 лет назад
Parallels 13 uses cleartext HTTP as part of the update process, allowing man-in-the-middle attacks. Users of out-of-date versions are presented with a pop-up window for a parallels_updates.xml file on the http://update.parallels.com web site.
EPSS
Процентиль: 48%
0.00248
Низкий
7.5 High
CVSS3
7.6 High
CVSS2
Дефекты
CWE-312