Sliver from v1.5.x to v1.5.39 has an improper cryptographic implementation, which allows attackers to execute a man-in-the-middle attack via intercepted and crafted responses.
| Package (Ecosystem) | Introduced | Fixed | Limit |
|---|---|---|---|
| github.com/bishopfox/sliver(Go) | 1.5.0 | 1.5.40 | N/A |
CVSS Metrics