Логотип exploitDog
bind:CVE-2014-3691
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2014-3691

Количество 3

Количество 3

redhat логотип

CVE-2014-3691

больше 11 лет назад

Smart Proxy (aka Smart-Proxy and foreman-proxy) in Foreman before 1.5.4 and 1.6.x before 1.6.2 does not validate SSL certificates, which allows remote attackers to bypass intended authentication and execute arbitrary API requests via a request without a certificate.

CVSS2: 5.8
EPSS: Низкий
nvd логотип

CVE-2014-3691

почти 11 лет назад

Smart Proxy (aka Smart-Proxy and foreman-proxy) in Foreman before 1.5.4 and 1.6.x before 1.6.2 does not validate SSL certificates, which allows remote attackers to bypass intended authentication and execute arbitrary API requests via a request without a certificate.

CVSS2: 7.5
EPSS: Низкий
github логотип

GHSA-m4h9-hcv2-hw6h

больше 3 лет назад

Smart Proxy (aka Smart-Proxy and foreman-proxy) in Foreman before 1.5.4 and 1.6.x before 1.6.2 does not validate SSL certificates, which allows remote attackers to bypass intended authentication and execute arbitrary API requests via a request without a certificate.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2014-3691

Smart Proxy (aka Smart-Proxy and foreman-proxy) in Foreman before 1.5.4 and 1.6.x before 1.6.2 does not validate SSL certificates, which allows remote attackers to bypass intended authentication and execute arbitrary API requests via a request without a certificate.

CVSS2: 5.8
0%
Низкий
больше 11 лет назад
nvd логотип
CVE-2014-3691

Smart Proxy (aka Smart-Proxy and foreman-proxy) in Foreman before 1.5.4 and 1.6.x before 1.6.2 does not validate SSL certificates, which allows remote attackers to bypass intended authentication and execute arbitrary API requests via a request without a certificate.

CVSS2: 7.5
0%
Низкий
почти 11 лет назад
github логотип
GHSA-m4h9-hcv2-hw6h

Smart Proxy (aka Smart-Proxy and foreman-proxy) in Foreman before 1.5.4 and 1.6.x before 1.6.2 does not validate SSL certificates, which allows remote attackers to bypass intended authentication and execute arbitrary API requests via a request without a certificate.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу