Pion WebRTC didn't properly tear down DTLS Connection if certificate verification faile
Reporter | Title | Published | Views | Family All 9 |
---|---|---|---|---|
![]() | In github.com/pion/webrtc, failed DTLS certificate verification doesn't stop data channel communication | 25 May 202118:42 | – | github |
![]() | Insecure Certificate Validation | 27 May 202106:04 | – | veracode |
![]() | CVE-2021-28681 | 18 Mar 202104:15 | – | cve |
![]() | GHSA-74XM-QJ29-CQ8P In github.com/pion/webrtc, failed DTLS certificate verification doesn't stop data channel communication | 25 May 202118:42 | – | osv |
![]() | GO-2021-0104 Authorization bypass in github.com/pion/webrtc/v3 | 28 Jul 202118:08 | – | osv |
![]() | CVE-2021-28681 | 18 Mar 202104:15 | – | osv |
![]() | CVE-2021-28681 | 18 Mar 202103:20 | – | cvelist |
![]() | Code injection | 18 Mar 202104:15 | – | prion |
![]() | CVE-2021-28681 | 22 May 202519:34 | – | redhatcve |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo