Total vulnerabilities in the database
ovirt-engine, as used in Red Hat MRG 3, allows man-in-the-middle attackers to spoof servers by leveraging failure to verify key attributes in vdsm X.509 certificates.
Software | From | Fixed in |
---|---|---|
redhat / enterprise_mrg | 3.0 | 3.0.x |