CVE-2013-2073

Transifex command-line client before 0.9 does not validate X.509 certificates, which allows man-in-the-middle attackers to spoof a Transifex server via an arbitrary certificate.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
4.3 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 36%
VendorProductVersion
transifextransifex
𝑥
≤ 0.8
transifextransifex
0.1
transifextransifex
0.2
transifextransifex
0.3
transifextransifex
0.4
transifextransifex
0.5
transifextransifex
0.6
transifextransifex
0.7
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
transifex-client
bullseye
0.14.2-1
fixed
wheezy
no-dsa
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
transifex-client
zesty
not-affected
yakkety
not-affected
xenial
not-affected
wily
not-affected
vivid
not-affected
utopic
not-affected
trusty
dne
saucy
not-affected
raring
ignored
quantal
ignored
precise
ignored
lucid
dne