Логотип exploitDog
bind:CVE-2021-38142
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-38142

Количество 2

Количество 2

nvd логотип

CVE-2021-38142

больше 4 лет назад

Barco MirrorOp Windows Sender before 2.5.3.65 uses cleartext HTTP and thus allows rogue software upgrades. An attacker on the local network can achieve remote code execution on any computer that tries to update Windows Sender due to the fact that the upgrade mechanism is not secured (is not protected with TLS).

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-pc5x-fvx9-jf5h

больше 3 лет назад

Barco MirrorOp Windows Sender before 2.5.3.65 uses cleartext HTTP and thus allows rogue software upgrades. An attacker on the local network can achieve remote code execution on any computer that tries to update Windows Sender due to the fact that the upgrade mechanism is not secured (is not protected with TLS).

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-38142

Barco MirrorOp Windows Sender before 2.5.3.65 uses cleartext HTTP and thus allows rogue software upgrades. An attacker on the local network can achieve remote code execution on any computer that tries to update Windows Sender due to the fact that the upgrade mechanism is not secured (is not protected with TLS).

CVSS3: 8.8
0%
Низкий
больше 4 лет назад
github логотип
GHSA-pc5x-fvx9-jf5h

Barco MirrorOp Windows Sender before 2.5.3.65 uses cleartext HTTP and thus allows rogue software upgrades. An attacker on the local network can achieve remote code execution on any computer that tries to update Windows Sender due to the fact that the upgrade mechanism is not secured (is not protected with TLS).

CVSS3: 8.8
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу