Логотип exploitDog
bind:CVE-2024-37015
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-37015

Количество 3

Количество 3

ubuntu логотип

CVE-2024-37015

больше 1 года назад

An issue was discovered in Ada Web Server 20.0. When configured to use SSL (which is not the default setting), the SSL/TLS used to establish connections to external services is done without proper hostname validation. This is exploitable by man-in-the-middle attackers.

CVSS3: 7.4
EPSS: Низкий
nvd логотип

CVE-2024-37015

больше 1 года назад

An issue was discovered in Ada Web Server 20.0. When configured to use SSL (which is not the default setting), the SSL/TLS used to establish connections to external services is done without proper hostname validation. This is exploitable by man-in-the-middle attackers.

CVSS3: 7.4
EPSS: Низкий
github логотип

GHSA-frc3-7x76-jwp8

больше 1 года назад

An issue was discovered in Ada Web Server 20.0. When configured to use SSL (which is not the default setting), the SSL/TLS used to establish connections to external services is done without proper hostname validation. This is exploitable by man-in-the-middle attackers.

CVSS3: 7.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-37015

An issue was discovered in Ada Web Server 20.0. When configured to use SSL (which is not the default setting), the SSL/TLS used to establish connections to external services is done without proper hostname validation. This is exploitable by man-in-the-middle attackers.

CVSS3: 7.4
0%
Низкий
больше 1 года назад
nvd логотип
CVE-2024-37015

An issue was discovered in Ada Web Server 20.0. When configured to use SSL (which is not the default setting), the SSL/TLS used to establish connections to external services is done without proper hostname validation. This is exploitable by man-in-the-middle attackers.

CVSS3: 7.4
0%
Низкий
больше 1 года назад
github логотип
GHSA-frc3-7x76-jwp8

An issue was discovered in Ada Web Server 20.0. When configured to use SSL (which is not the default setting), the SSL/TLS used to establish connections to external services is done without proper hostname validation. This is exploitable by man-in-the-middle attackers.

CVSS3: 7.4
0%
Низкий
больше 1 года назад

Уязвимостей на страницу