CVE-2013-7110

Transifex command-line client before 0.10 does not validate X.509 certificates for data transfer connections, which allows man-in-the-middle attackers to spoof a Transifex server via an arbitrary certificate.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-2073.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
4.3 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 38%
VendorProductVersion
transifextransifex
𝑥
≤ 0.9
transifextransifex
0.1
transifextransifex
0.2
transifextransifex
0.3
transifextransifex
0.4
transifextransifex
0.5
transifextransifex
0.6
transifextransifex
0.7
transifextransifex
0.8
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
transifex-client
bullseye
0.14.2-1
fixed
wheezy
not-affected
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
transifex-client
noble
dne
mantic
dne
lunar
dne
kinetic
ignored
jammy
needed
impish
ignored
hirsute
ignored
groovy
ignored
focal
needed
eoan
ignored
disco
ignored
cosmic
ignored
bionic
needed
artful
ignored
zesty
ignored
yakkety
ignored
xenial
needed
wily
ignored
vivid
ignored
utopic
ignored
trusty
dne
saucy
ignored
raring
ignored
quantal
ignored
precise
ignored
lucid
dne