Логотип exploitDog
bind:CVE-2020-24619
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-24619

Количество 3

Количество 3

ubuntu логотип

CVE-2020-24619

больше 5 лет назад

In mainwindow.cpp in Shotcut before 20.09.13, the upgrade check misuses TLS because of setPeerVerifyMode(QSslSocket::VerifyNone). A man-in-the-middle attacker could offer a spoofed download resource.

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2020-24619

больше 5 лет назад

In mainwindow.cpp in Shotcut before 20.09.13, the upgrade check misuses TLS because of setPeerVerifyMode(QSslSocket::VerifyNone). A man-in-the-middle attacker could offer a spoofed download resource.

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-7m8h-2ghm-554f

больше 3 лет назад

In mainwindow.cpp in Shotcut before 20.09.13, the upgrade check misuses TLS because of setPeerVerifyMode(QSslSocket::VerifyNone). A man-in-the-middle attacker could offer a spoofed download resource.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2020-24619

In mainwindow.cpp in Shotcut before 20.09.13, the upgrade check misuses TLS because of setPeerVerifyMode(QSslSocket::VerifyNone). A man-in-the-middle attacker could offer a spoofed download resource.

CVSS3: 5.9
0%
Низкий
больше 5 лет назад
nvd логотип
CVE-2020-24619

In mainwindow.cpp in Shotcut before 20.09.13, the upgrade check misuses TLS because of setPeerVerifyMode(QSslSocket::VerifyNone). A man-in-the-middle attacker could offer a spoofed download resource.

CVSS3: 5.9
0%
Низкий
больше 5 лет назад
github логотип
GHSA-7m8h-2ghm-554f

In mainwindow.cpp in Shotcut before 20.09.13, the upgrade check misuses TLS because of setPeerVerifyMode(QSslSocket::VerifyNone). A man-in-the-middle attacker could offer a spoofed download resource.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу