Vulnerabilities
Vulnerable Software
The application fails to prevent users from connecting to it over unencrypted connections. An attacker able to modify a legitimate user's network traffic could bypass the application's use of SSL/TLS encryption and use the application as a platform for attacks against its users.
CVSS Score
5.3
EPSS Score
0.002
Published
2022-11-23


Contact Us

Shodan ® - All rights reserved