Vulnerabilities
Vulnerable Software
Redhat:  >> Syndesis  Security Vulnerabilities
It was found that the Syndesis configuration for Cross-Origin Resource Sharing was set to allow all origins. An attacker could use this lack of protection to conduct phishing attacks and further access unauthorized information.
CVSS Score
7.4
EPSS Score
0.003
Published
2019-11-08


Contact Us

Shodan ® - All rights reserved