Логотип exploitDog
bind:CVE-2021-23207
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-23207

Количество 2

Количество 2

nvd логотип

CVE-2021-23207

около 4 лет назад

An attacker with physical access to the host can extract the secrets from the registry and create valid JWT tokens for the Fresenius Kabi Vigilant MasterMed version 2.0.1.3 application and impersonate arbitrary users. An attacker could manipulate RabbitMQ queues and messages by impersonating users.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-4r23-36c8-4wg2

около 4 лет назад

An attacker with physical access to the host can extract the secrets from the registry and create valid JWT tokens for the Fresenius Kabi Vigilant MasterMed version 2.0.1.3 application and impersonate arbitrary users. An attacker could manipulate RabbitMQ queues and messages by impersonating users.

CVSS3: 5.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-23207

An attacker with physical access to the host can extract the secrets from the registry and create valid JWT tokens for the Fresenius Kabi Vigilant MasterMed version 2.0.1.3 application and impersonate arbitrary users. An attacker could manipulate RabbitMQ queues and messages by impersonating users.

CVSS3: 6.5
0%
Низкий
около 4 лет назад
github логотип
GHSA-4r23-36c8-4wg2

An attacker with physical access to the host can extract the secrets from the registry and create valid JWT tokens for the Fresenius Kabi Vigilant MasterMed version 2.0.1.3 application and impersonate arbitrary users. An attacker could manipulate RabbitMQ queues and messages by impersonating users.

CVSS3: 5.5
0%
Низкий
около 4 лет назад

Уязвимостей на страницу