Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2026-3634

Опубликовано: 21 мар. 2026
Источник: msrc
CVSS3: 3.9
EPSS Низкий

Описание

Libsoup: libsoup: http header injection and response splitting via crlf injection in content-type header

EPSS

Процентиль: 8%
0.0003
Низкий

3.9 Low

CVSS3

Связанные уязвимости

CVSS3: 3.9
ubuntu
18 дней назад

CRLF injection in soup_message_headers_set_content_type()

CVSS3: 3.9
redhat
20 дней назад

A flaw was found in libsoup. An attacker controlling the value used to set the Content-Type header can inject a Carriage Return Line Feed (CRLF) sequence due to improper input sanitization in the `soup_message_headers_set_content_type()` function. This vulnerability allows for the injection of arbitrary header-value pairs, potentially leading to HTTP header injection and response splitting attacks.

CVSS3: 3.9
nvd
9 дней назад

A flaw was found in libsoup. An attacker controlling the value used to set the Content-Type header can inject a Carriage Return Line Feed (CRLF) sequence due to improper input sanitization in the `soup_message_headers_set_content_type()` function. This vulnerability allows for the injection of arbitrary header-value pairs, potentially leading to HTTP header injection and response splitting attacks.

CVSS3: 3.9
debian
9 дней назад

A flaw was found in libsoup. An attacker controlling the value used to ...

CVSS3: 3.9
github
9 дней назад

A flaw was found in libsoup. An attacker controlling the value used to set the Content-Type header can inject a Carriage Return Line Feed (CRLF) sequence due to improper input sanitization in the `soup_message_headers_set_content_type()` function. This vulnerability allows for the injection of arbitrary header-value pairs, potentially leading to HTTP header injection and response splitting attacks.

EPSS

Процентиль: 8%
0.0003
Низкий

3.9 Low

CVSS3