The ROS Javascript Library fork, roslib-socketio, is vulnerable to MITM attacks due to downloading binary resources over HTTP
Reporter | Title | Published | Views | Family All 8 |
---|---|---|---|---|
![]() | CVE-2016-10681 | 29 May 201820:00 | – | cvelist |
![]() | CVE-2016-10681 | 29 May 201820:29 | – | cve |
![]() | GHSA-XQ8R-R72R-PQWM Downloads Resources over HTTP in roslib-socketio | 1 Sep 202016:13 | – | osv |
![]() | CVE-2016-10681 | 29 May 201820:29 | – | osv |
![]() | Man-in-the-Middle (MitM) | 30 May 201802:41 | – | veracode |
![]() | Downloads Resources over HTTP in roslib-socketio | 1 Sep 202016:13 | – | github |
![]() | Remote code execution | 29 May 201820:29 | – | prion |
![]() | Downloads Resources over HTTP | 2 Dec 201604:51 | – | nodejs |
Source | Link |
---|---|
nodesecurity | www.nodesecurity.io/advisories/292 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo