Логотип exploitDog
bind:CVE-2018-21029
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-21029

Количество 6

Количество 6

ubuntu логотип

CVE-2018-21029

почти 6 лет назад

systemd 239 through 245 accepts any certificate signed by a trusted certificate authority for DNS Over TLS. Server Name Indication (SNI) is not sent, and there is no hostname validation with the GnuTLS backend. NOTE: This has been disputed by the developer as not a vulnerability since hostname validation does not have anything to do with this issue (i.e. there is no hostname to be sent)

CVSS3: 9.8
EPSS: Низкий
redhat логотип

CVE-2018-21029

около 7 лет назад

systemd 239 through 245 accepts any certificate signed by a trusted certificate authority for DNS Over TLS. Server Name Indication (SNI) is not sent, and there is no hostname validation with the GnuTLS backend. NOTE: This has been disputed by the developer as not a vulnerability since hostname validation does not have anything to do with this issue (i.e. there is no hostname to be sent)

CVSS3: 6.3
EPSS: Низкий
nvd логотип

CVE-2018-21029

почти 6 лет назад

systemd 239 through 245 accepts any certificate signed by a trusted certificate authority for DNS Over TLS. Server Name Indication (SNI) is not sent, and there is no hostname validation with the GnuTLS backend. NOTE: This has been disputed by the developer as not a vulnerability since hostname validation does not have anything to do with this issue (i.e. there is no hostname to be sent)

CVSS3: 9.8
EPSS: Низкий
msrc логотип

CVE-2018-21029

почти 5 лет назад

CVSS3: 9.8
EPSS: Низкий
debian логотип

CVE-2018-21029

почти 6 лет назад

systemd 239 through 245 accepts any certificate signed by a trusted ce ...

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-h2fw-qh29-9jv7

больше 3 лет назад

systemd 239 through 243 accepts any certificate signed by a trusted certificate authority for DNS Over TLS. Server Name Indication (SNI) is not sent, and there is no hostname validation with the GnuTLS backend.

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2018-21029

systemd 239 through 245 accepts any certificate signed by a trusted certificate authority for DNS Over TLS. Server Name Indication (SNI) is not sent, and there is no hostname validation with the GnuTLS backend. NOTE: This has been disputed by the developer as not a vulnerability since hostname validation does not have anything to do with this issue (i.e. there is no hostname to be sent)

CVSS3: 9.8
2%
Низкий
почти 6 лет назад
redhat логотип
CVE-2018-21029

systemd 239 through 245 accepts any certificate signed by a trusted certificate authority for DNS Over TLS. Server Name Indication (SNI) is not sent, and there is no hostname validation with the GnuTLS backend. NOTE: This has been disputed by the developer as not a vulnerability since hostname validation does not have anything to do with this issue (i.e. there is no hostname to be sent)

CVSS3: 6.3
2%
Низкий
около 7 лет назад
nvd логотип
CVE-2018-21029

systemd 239 through 245 accepts any certificate signed by a trusted certificate authority for DNS Over TLS. Server Name Indication (SNI) is not sent, and there is no hostname validation with the GnuTLS backend. NOTE: This has been disputed by the developer as not a vulnerability since hostname validation does not have anything to do with this issue (i.e. there is no hostname to be sent)

CVSS3: 9.8
2%
Низкий
почти 6 лет назад
msrc логотип
CVSS3: 9.8
2%
Низкий
почти 5 лет назад
debian логотип
CVE-2018-21029

systemd 239 through 245 accepts any certificate signed by a trusted ce ...

CVSS3: 9.8
2%
Низкий
почти 6 лет назад
github логотип
GHSA-h2fw-qh29-9jv7

systemd 239 through 243 accepts any certificate signed by a trusted certificate authority for DNS Over TLS. Server Name Indication (SNI) is not sent, and there is no hostname validation with the GnuTLS backend.

CVSS3: 9.8
2%
Низкий
больше 3 лет назад

Уязвимостей на страницу