[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256040

 
 

909

 
 

199103

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2013-2073Date: (C)2014-05-09   (M)2023-12-22


Transifex command-line client before 0.9 does not validate X.509 certificates, which allows man-in-the-middle attackers to spoof a Transifex server via an arbitrary certificate.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 4.3
Exploit Score: 8.6
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: MEDIUM
Authentication: NONE
Confidentiality: NONE
Integrity: PARTIAL
Availability: NONE
  
Reference:
http://www.openwall.com/lists/oss-security/2013/05/22/14
http://blog.transifex.com/post/51072109836/new-version-of-the-transifex-client-has-been-released
https://bugzilla.redhat.com/show_bug.cgi?id=952194

CPE    7
cpe:/a:transifex:transifex:0.5
cpe:/a:transifex:transifex:0.4
cpe:/a:transifex:transifex:0.7
cpe:/a:transifex:transifex:0.6
...
CWE    1
CWE-20
OVAL    2
oval:org.secpod.oval:def:104948
oval:org.secpod.oval:def:104950

© SecPod Technologies