Логотип exploitDog
bind:CVE-2021-22138
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-22138

Количество 4

Количество 4

nvd логотип

CVE-2021-22138

больше 4 лет назад

In Logstash versions after 6.4.0 and before 6.8.15 and 7.12.0 a TLS certificate validation flaw was found in the monitoring feature. When specifying a trusted server CA certificate Logstash would not properly verify the certificate returned by the monitoring server. This could result in a man in the middle style attack against the Logstash monitoring data.

CVSS3: 3.7
EPSS: Низкий
debian логотип

CVE-2021-22138

больше 4 лет назад

In Logstash versions after 6.4.0 and before 6.8.15 and 7.12.0 a TLS ce ...

CVSS3: 3.7
EPSS: Низкий
redos логотип

ROS-20230928-01

около 2 лет назад

Уязвимость Logstash

CVSS3: 3.7
EPSS: Низкий
github логотип

GHSA-56cm-rmmq-hqpv

больше 3 лет назад

In Logstash versions after 6.4.0 and before 6.8.15 and 7.12.0 a TLS certificate validation flaw was found in the monitoring feature. When specifying a trusted server CA certificate Logstash would not properly verify the certificate returned by the monitoring server. This could result in a man in the middle style attack against the Logstash monitoring data.

CVSS3: 3.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-22138

In Logstash versions after 6.4.0 and before 6.8.15 and 7.12.0 a TLS certificate validation flaw was found in the monitoring feature. When specifying a trusted server CA certificate Logstash would not properly verify the certificate returned by the monitoring server. This could result in a man in the middle style attack against the Logstash monitoring data.

CVSS3: 3.7
0%
Низкий
больше 4 лет назад
debian логотип
CVE-2021-22138

In Logstash versions after 6.4.0 and before 6.8.15 and 7.12.0 a TLS ce ...

CVSS3: 3.7
0%
Низкий
больше 4 лет назад
redos логотип
ROS-20230928-01

Уязвимость Logstash

CVSS3: 3.7
0%
Низкий
около 2 лет назад
github логотип
GHSA-56cm-rmmq-hqpv

In Logstash versions after 6.4.0 and before 6.8.15 and 7.12.0 a TLS certificate validation flaw was found in the monitoring feature. When specifying a trusted server CA certificate Logstash would not properly verify the certificate returned by the monitoring server. This could result in a man in the middle style attack against the Logstash monitoring data.

CVSS3: 3.1
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу