CVE-2013-2073

EUVD-2013-2052
Transifex command-line client before 0.9 does not validate X.509 certificates, which allows man-in-the-middle attackers to spoof a Transifex server via an arbitrary certificate.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
4.3 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 35%
Affected Products (NVD)
VendorProductVersion
transifextransifex
𝑥
≤ 0.8
transifextransifex
0.1
transifextransifex
0.2
transifextransifex
0.3
transifextransifex
0.4
transifextransifex
0.5
transifextransifex
0.6
transifextransifex
0.7
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
transifex-client
bullseye
0.14.2-1
fixed
wheezy
no-dsa
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
transifex-client
lucid
dne
precise
ignored
quantal
ignored
raring
ignored
saucy
not-affected
trusty
dne
utopic
not-affected
vivid
not-affected
wily
not-affected
xenial
not-affected
yakkety
not-affected
zesty
not-affected