Описание
Transifex command-line client before 0.9 does not validate X.509 certificates, which allows man-in-the-middle attackers to spoof a Transifex server via an arbitrary certificate.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 0.10-1 |
| esm-apps/xenial | not-affected | 0.10-1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected [0.10-1]] |
| lucid | DNE | |
| precise | ignored | end of life |
| precise/esm | DNE | precise was needed |
| quantal | ignored | end of life |
| raring | ignored | end of life |
| saucy | not-affected | 0.9.1-1 |
| trusty | not-affected | 0.10-1 |
Показывать по
10
4.3 Medium
CVSS2
Связанные уязвимости
nvd
почти 12 лет назад
Transifex command-line client before 0.9 does not validate X.509 certificates, which allows man-in-the-middle attackers to spoof a Transifex server via an arbitrary certificate.
debian
почти 12 лет назад
Transifex command-line client before 0.9 does not validate X.509 certi ...
github
больше 3 лет назад
Transifex command-line client before 0.9 does not validate X.509 certificates, which allows man-in-the-middle attackers to spoof a Transifex server via an arbitrary certificate.
4.3 Medium
CVSS2