Total vulnerabilities in the database
It was found that the Syndesis configuration for Cross-Origin Resource Sharing was set to allow all origins. An attacker could use this lack of protection to conduct phishing attacks and further access unauthorized information.
Software | From | Fixed in |
---|---|---|
redhat / fuse | - | 7.5.0 |