Количество 4
Количество 4
CVE-2010-3292
The update{_bad,}_phishing_sites scripts in mailscanner 4.79.11-2 downloads files and trusts them without using encryption (e.g., https) or digital signature checking which could allow an attacker to replace certain configuration files (e.g., phishing whitelist) via dns/packet spoofing.
CVE-2010-3292
The update{_bad,}_phishing_sites scripts in mailscanner 4.79.11-2 downloads files and trusts them without using encryption (e.g., https) or digital signature checking which could allow an attacker to replace certain configuration files (e.g., phishing whitelist) via dns/packet spoofing.
CVE-2010-3292
The update{_bad,}_phishing_sites scripts in mailscanner 4.79.11-2 down ...
GHSA-j6hx-4cv9-wrj8
The update{_bad,}_phishing_sites scripts in mailscanner 4.79.11-2 downloads files and trusts them without using encryption (e.g., https) or digital signature checking which could allow an attacker to replace certain configuration files (e.g., phishing whitelist) via dns/packet spoofing.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2010-3292 The update{_bad,}_phishing_sites scripts in mailscanner 4.79.11-2 downloads files and trusts them without using encryption (e.g., https) or digital signature checking which could allow an attacker to replace certain configuration files (e.g., phishing whitelist) via dns/packet spoofing. | CVSS3: 5.5 | 0% Низкий | около 6 лет назад | |
CVE-2010-3292 The update{_bad,}_phishing_sites scripts in mailscanner 4.79.11-2 downloads files and trusts them without using encryption (e.g., https) or digital signature checking which could allow an attacker to replace certain configuration files (e.g., phishing whitelist) via dns/packet spoofing. | CVSS3: 5.5 | 0% Низкий | около 6 лет назад | |
CVE-2010-3292 The update{_bad,}_phishing_sites scripts in mailscanner 4.79.11-2 down ... | CVSS3: 5.5 | 0% Низкий | около 6 лет назад | |
GHSA-j6hx-4cv9-wrj8 The update{_bad,}_phishing_sites scripts in mailscanner 4.79.11-2 downloads files and trusts them without using encryption (e.g., https) or digital signature checking which could allow an attacker to replace certain configuration files (e.g., phishing whitelist) via dns/packet spoofing. | 0% Низкий | больше 3 лет назад |
Уязвимостей на страницу