Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2009-0804

Опубликовано: 04 мар. 2009
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 5.4

Описание

Ziproxy 2.6.0, when transparent interception mode is enabled, uses the HTTP Host header to determine the remote endpoint, which allows remote attackers to bypass access controls for Flash, Java, Silverlight, and probably other technologies, and possibly communicate with restricted intranet sites, via a crafted web page that causes a client to send HTTP requests with a modified Host header.

РелизСтатусПримечание
dapper

DNE

devel

not-affected

2.7.2-1.1ubuntu1
gutsy

DNE

hardy

DNE

intrepid

ignored

end of life, was needs-triage
jaunty

ignored

end of life
karmic

ignored

end of life
lucid

not-affected

2.7.2-1.1ubuntu1
maverick

not-affected

2.7.2-1.1ubuntu1
natty

not-affected

2.7.2-1.1ubuntu1

Показывать по

Ссылки на источники

EPSS

Процентиль: 56%
0.0034
Низкий

5.4 Medium

CVSS2

Связанные уязвимости

nvd
почти 17 лет назад

Ziproxy 2.6.0, when transparent interception mode is enabled, uses the HTTP Host header to determine the remote endpoint, which allows remote attackers to bypass access controls for Flash, Java, Silverlight, and probably other technologies, and possibly communicate with restricted intranet sites, via a crafted web page that causes a client to send HTTP requests with a modified Host header.

debian
почти 17 лет назад

Ziproxy 2.6.0, when transparent interception mode is enabled, uses the ...

github
больше 3 лет назад

Ziproxy 2.6.0, when transparent interception mode is enabled, uses the HTTP Host header to determine the remote endpoint, which allows remote attackers to bypass access controls for Flash, Java, Silverlight, and probably other technologies, and possibly communicate with restricted intranet sites, via a crafted web page that causes a client to send HTTP requests with a modified Host header.

EPSS

Процентиль: 56%
0.0034
Низкий

5.4 Medium

CVSS2