Логотип exploitDog
bind:"GHSA-84h7-rjj3-6jx4" OR bind:"CVE-2025-67735"
Консоль
Логотип exploitDog

exploitDog

bind:"GHSA-84h7-rjj3-6jx4" OR bind:"CVE-2025-67735"

Количество 8

Количество 8

github логотип

GHSA-84h7-rjj3-6jx4

4 месяца назад

Netty has a CRLF Injection vulnerability in io.netty.handler.codec.http.HttpRequestEncoder

CVSS3: 6.5
EPSS: Низкий
ubuntu логотип

CVE-2025-67735

4 месяца назад

Netty is an asynchronous, event-driven network application framework. In versions prior to 4.1.129.Final and 4.2.8.Final, the `io.netty.handler.codec.http.HttpRequestEncoder` has a CRLF injection with the request URI when constructing a request. This leads to request smuggling when `HttpRequestEncoder` is used without proper sanitization of the URI. Any application / framework using `HttpRequestEncoder` can be subject to be abused to perform request smuggling using CRLF injection. Versions 4.1.129.Final and 4.2.8.Final fix the issue.

CVSS3: 6.5
EPSS: Низкий
redhat логотип

CVE-2025-67735

4 месяца назад

Netty is an asynchronous, event-driven network application framework. In versions prior to 4.1.129.Final and 4.2.8.Final, the `io.netty.handler.codec.http.HttpRequestEncoder` has a CRLF injection with the request URI when constructing a request. This leads to request smuggling when `HttpRequestEncoder` is used without proper sanitization of the URI. Any application / framework using `HttpRequestEncoder` can be subject to be abused to perform request smuggling using CRLF injection. Versions 4.1.129.Final and 4.2.8.Final fix the issue.

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2025-67735

4 месяца назад

Netty is an asynchronous, event-driven network application framework. In versions prior to 4.1.129.Final and 4.2.8.Final, the `io.netty.handler.codec.http.HttpRequestEncoder` has a CRLF injection with the request URI when constructing a request. This leads to request smuggling when `HttpRequestEncoder` is used without proper sanitization of the URI. Any application / framework using `HttpRequestEncoder` can be subject to be abused to perform request smuggling using CRLF injection. Versions 4.1.129.Final and 4.2.8.Final fix the issue.

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2025-67735

4 месяца назад

Netty is an asynchronous, event-driven network application framework. ...

CVSS3: 6.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:4489-1

4 месяца назад

Security update for netty

EPSS: Низкий
fstec логотип

BDU:2026-01632

4 месяца назад

Уязвимость компонента io.netty.handler.codec.http.HttpRequestEncoder сетевого программного средства Netty, позволяющая нарушителю осуществить подмену URL-адреса

CVSS3: 6.5
EPSS: Низкий
redos логотип

ROS-20260216-73-0011

около 2 месяцев назад

Уязвимость netty

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-84h7-rjj3-6jx4

Netty has a CRLF Injection vulnerability in io.netty.handler.codec.http.HttpRequestEncoder

CVSS3: 6.5
0%
Низкий
4 месяца назад
ubuntu логотип
CVE-2025-67735

Netty is an asynchronous, event-driven network application framework. In versions prior to 4.1.129.Final and 4.2.8.Final, the `io.netty.handler.codec.http.HttpRequestEncoder` has a CRLF injection with the request URI when constructing a request. This leads to request smuggling when `HttpRequestEncoder` is used without proper sanitization of the URI. Any application / framework using `HttpRequestEncoder` can be subject to be abused to perform request smuggling using CRLF injection. Versions 4.1.129.Final and 4.2.8.Final fix the issue.

CVSS3: 6.5
0%
Низкий
4 месяца назад
redhat логотип
CVE-2025-67735

Netty is an asynchronous, event-driven network application framework. In versions prior to 4.1.129.Final and 4.2.8.Final, the `io.netty.handler.codec.http.HttpRequestEncoder` has a CRLF injection with the request URI when constructing a request. This leads to request smuggling when `HttpRequestEncoder` is used without proper sanitization of the URI. Any application / framework using `HttpRequestEncoder` can be subject to be abused to perform request smuggling using CRLF injection. Versions 4.1.129.Final and 4.2.8.Final fix the issue.

CVSS3: 6.5
0%
Низкий
4 месяца назад
nvd логотип
CVE-2025-67735

Netty is an asynchronous, event-driven network application framework. In versions prior to 4.1.129.Final and 4.2.8.Final, the `io.netty.handler.codec.http.HttpRequestEncoder` has a CRLF injection with the request URI when constructing a request. This leads to request smuggling when `HttpRequestEncoder` is used without proper sanitization of the URI. Any application / framework using `HttpRequestEncoder` can be subject to be abused to perform request smuggling using CRLF injection. Versions 4.1.129.Final and 4.2.8.Final fix the issue.

CVSS3: 6.5
0%
Низкий
4 месяца назад
debian логотип
CVE-2025-67735

Netty is an asynchronous, event-driven network application framework. ...

CVSS3: 6.5
0%
Низкий
4 месяца назад
suse-cvrf логотип
SUSE-SU-2025:4489-1

Security update for netty

0%
Низкий
4 месяца назад
fstec логотип
BDU:2026-01632

Уязвимость компонента io.netty.handler.codec.http.HttpRequestEncoder сетевого программного средства Netty, позволяющая нарушителю осуществить подмену URL-адреса

CVSS3: 6.5
0%
Низкий
4 месяца назад
redos логотип
ROS-20260216-73-0011

Уязвимость netty

CVSS3: 6.5
0%
Низкий
около 2 месяцев назад

Уязвимостей на страницу