Логотип exploitDog
bind:CVE-2025-5087
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-5087

Количество 2

Количество 2

nvd логотип

CVE-2025-5087

8 месяцев назад

Kaleris NAVIS N4 ULC (Ultra Light Client) communicates insecurely using zlib-compressed data over HTTP. An attacker capable of observing network traffic between Ultra Light Clients and N4 servers can extract sensitive information, including plaintext credentials.

EPSS: Низкий
github логотип

GHSA-wq9q-jvph-86fj

8 месяцев назад

Kaleris NAVIS N4 ULC (Ultra Light Client) communicates insecurely using zlib-compressed data over HTTP. An attacker capable of observing network traffic between Ultra Light Clients and N4 servers can extract sensitive information, including plaintext credentials.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-5087

Kaleris NAVIS N4 ULC (Ultra Light Client) communicates insecurely using zlib-compressed data over HTTP. An attacker capable of observing network traffic between Ultra Light Clients and N4 servers can extract sensitive information, including plaintext credentials.

0%
Низкий
8 месяцев назад
github логотип
GHSA-wq9q-jvph-86fj

Kaleris NAVIS N4 ULC (Ultra Light Client) communicates insecurely using zlib-compressed data over HTTP. An attacker capable of observing network traffic between Ultra Light Clients and N4 servers can extract sensitive information, including plaintext credentials.

0%
Низкий
8 месяцев назад

Уязвимостей на страницу