Логотип exploitDog
bind:CVE-2021-41067
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-41067

Количество 2

Количество 2

nvd логотип

CVE-2021-41067

около 4 лет назад

An issue was discovered in Listary through 6. Improper implementation of the update process leads to the download of software updates with a /check-update HTTP-based connection. This can be exploited with MITM techniques. Together with the lack of package validation, it can lead to manipulation of update packages that can cause an installation of malicious content.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-hcmw-22rw-4v9j

около 4 лет назад

An issue was discovered in Listary through 6. Improper implementation of the update process leads to the download of software updates with a /check-update HTTP-based connection. This can be exploited with MITM techniques. Together with the lack of package validation, it can lead to manipulation of update packages that can cause an installation of malicious content.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-41067

An issue was discovered in Listary through 6. Improper implementation of the update process leads to the download of software updates with a /check-update HTTP-based connection. This can be exploited with MITM techniques. Together with the lack of package validation, it can lead to manipulation of update packages that can cause an installation of malicious content.

CVSS3: 7.5
0%
Низкий
около 4 лет назад
github логотип
GHSA-hcmw-22rw-4v9j

An issue was discovered in Listary through 6. Improper implementation of the update process leads to the download of software updates with a /check-update HTTP-based connection. This can be exploited with MITM techniques. Together with the lack of package validation, it can lead to manipulation of update packages that can cause an installation of malicious content.

0%
Низкий
около 4 лет назад

Уязвимостей на страницу