Логотип exploitDog
bind:CVE-2021-34337
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-34337

Количество 5

Количество 5

ubuntu логотип

CVE-2021-34337

почти 3 года назад

An issue was discovered in Mailman Core before 3.3.5. An attacker with access to the REST API could use timing attacks to determine the value of the configured REST API password and then make arbitrary REST API calls. The REST API is bound to localhost by default, limiting the ability for attackers to exploit this, but can optionally be made to listen on other interfaces.

CVSS3: 6.3
EPSS: Низкий
redhat логотип

CVE-2021-34337

около 4 лет назад

An issue was discovered in Mailman Core before 3.3.5. An attacker with access to the REST API could use timing attacks to determine the value of the configured REST API password and then make arbitrary REST API calls. The REST API is bound to localhost by default, limiting the ability for attackers to exploit this, but can optionally be made to listen on other interfaces.

CVSS3: 7.4
EPSS: Низкий
nvd логотип

CVE-2021-34337

почти 3 года назад

An issue was discovered in Mailman Core before 3.3.5. An attacker with access to the REST API could use timing attacks to determine the value of the configured REST API password and then make arbitrary REST API calls. The REST API is bound to localhost by default, limiting the ability for attackers to exploit this, but can optionally be made to listen on other interfaces.

CVSS3: 6.3
EPSS: Низкий
debian логотип

CVE-2021-34337

почти 3 года назад

An issue was discovered in Mailman Core before 3.3.5. An attacker with ...

CVSS3: 6.3
EPSS: Низкий
github логотип

GHSA-2jg5-xgvv-4wq7

почти 3 года назад

Mailman Core vulnerable to timing attacks

CVSS3: 6.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2021-34337

An issue was discovered in Mailman Core before 3.3.5. An attacker with access to the REST API could use timing attacks to determine the value of the configured REST API password and then make arbitrary REST API calls. The REST API is bound to localhost by default, limiting the ability for attackers to exploit this, but can optionally be made to listen on other interfaces.

CVSS3: 6.3
1%
Низкий
почти 3 года назад
redhat логотип
CVE-2021-34337

An issue was discovered in Mailman Core before 3.3.5. An attacker with access to the REST API could use timing attacks to determine the value of the configured REST API password and then make arbitrary REST API calls. The REST API is bound to localhost by default, limiting the ability for attackers to exploit this, but can optionally be made to listen on other interfaces.

CVSS3: 7.4
1%
Низкий
около 4 лет назад
nvd логотип
CVE-2021-34337

An issue was discovered in Mailman Core before 3.3.5. An attacker with access to the REST API could use timing attacks to determine the value of the configured REST API password and then make arbitrary REST API calls. The REST API is bound to localhost by default, limiting the ability for attackers to exploit this, but can optionally be made to listen on other interfaces.

CVSS3: 6.3
1%
Низкий
почти 3 года назад
debian логотип
CVE-2021-34337

An issue was discovered in Mailman Core before 3.3.5. An attacker with ...

CVSS3: 6.3
1%
Низкий
почти 3 года назад
github логотип
GHSA-2jg5-xgvv-4wq7

Mailman Core vulnerable to timing attacks

CVSS3: 6.3
1%
Низкий
почти 3 года назад

Уязвимостей на страницу