Количество 2
Количество 2
CVE-2021-28681
Pion WebRTC before 3.0.15 didn't properly tear down the DTLS Connection when certificate verification failed. The PeerConnectionState was set to failed, but a user could ignore that and continue to use the PeerConnection. )A WebRTC implementation shouldn't allow the user to continue if verification has failed.)
GHSA-74xm-qj29-cq8p
In github.com/pion/webrtc, failed DTLS certificate verification doesn't stop data channel communication
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2021-28681 Pion WebRTC before 3.0.15 didn't properly tear down the DTLS Connection when certificate verification failed. The PeerConnectionState was set to failed, but a user could ignore that and continue to use the PeerConnection. )A WebRTC implementation shouldn't allow the user to continue if verification has failed.) | CVSS3: 5.3 | 0% Низкий | почти 5 лет назад | |
GHSA-74xm-qj29-cq8p In github.com/pion/webrtc, failed DTLS certificate verification doesn't stop data channel communication | CVSS3: 5.3 | 0% Низкий | больше 4 лет назад |
Уязвимостей на страницу