Insecure plugin update mechanism in tucan through 0.3.10 could allow remote attackers to perform man-in-the-middle attacks and execute arbitrary code ith the permissions of the user running tucan.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2012/01/19/5 | Mailing List Third Party Advisory |
https://access.redhat.com/security/cve/cve-2012-0063 | Broken Link Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-0063 | Issue Tracking Third Party Advisory |
https://security-tracker.debian.org/tracker/CVE-2012-0063 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2020-02-21 16:15
Updated : 2020-02-26 14:49
NVD link : CVE-2012-0063
Mitre link : CVE-2012-0063
CVE.ORG link : CVE-2012-0063
JSON object : View
Products Affected
tucaneando
- tucan
CWE