Логотип exploitDog
bind: "CVE-2023-49082"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2023-49082"

Количество 8

Количество 8

ubuntu логотип

CVE-2023-49082

больше 1 года назад

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Improper validation makes it possible for an attacker to modify the HTTP request (e.g. insert a new header) or even create a new HTTP request if the attacker controls the HTTP method. The vulnerability occurs only if the attacker can control the HTTP method (GET, POST etc.) of the request. If the attacker can control the HTTP version of the request it will be able to modify the request (request smuggling). This issue has been patched in version 3.9.0.

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2023-49082

больше 1 года назад

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Improper validation makes it possible for an attacker to modify the HTTP request (e.g. insert a new header) or even create a new HTTP request if the attacker controls the HTTP method. The vulnerability occurs only if the attacker can control the HTTP method (GET, POST etc.) of the request. If the attacker can control the HTTP version of the request it will be able to modify the request (request smuggling). This issue has been patched in version 3.9.0.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2023-49082

больше 1 года назад

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Improper validation makes it possible for an attacker to modify the HTTP request (e.g. insert a new header) or even create a new HTTP request if the attacker controls the HTTP method. The vulnerability occurs only if the attacker can control the HTTP method (GET, POST etc.) of the request. If the attacker can control the HTTP version of the request it will be able to modify the request (request smuggling). This issue has been patched in version 3.9.0.

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2023-49082

больше 1 года назад

aiohttp is an asynchronous HTTP client/server framework for asyncio an ...

CVSS3: 5.3
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:0168-1

больше 1 года назад

Security update for python-aiohttp

EPSS: Низкий
github логотип

GHSA-qvrw-v9rv-5rjx

больше 1 года назад

aiohttp's ClientSession is vulnerable to CRLF injection via method

CVSS3: 5.3
EPSS: Низкий
fstec логотип

BDU:2023-08273

больше 1 года назад

Уязвимость HTTP-клиента aiohttp, связанная с непринятием мер по нейтрализации последовательностей CRLF, позволяющая нарушителю отправить скрытый HTTP-запрос (атака типа HTTP Request Smuggling)

CVSS3: 5.3
EPSS: Низкий
redos логотип

ROS-20240318-01

больше 1 года назад

Множественные уязвимости python3-aiohttp

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-49082

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Improper validation makes it possible for an attacker to modify the HTTP request (e.g. insert a new header) or even create a new HTTP request if the attacker controls the HTTP method. The vulnerability occurs only if the attacker can control the HTTP method (GET, POST etc.) of the request. If the attacker can control the HTTP version of the request it will be able to modify the request (request smuggling). This issue has been patched in version 3.9.0.

CVSS3: 5.3
0%
Низкий
больше 1 года назад
redhat логотип
CVE-2023-49082

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Improper validation makes it possible for an attacker to modify the HTTP request (e.g. insert a new header) or even create a new HTTP request if the attacker controls the HTTP method. The vulnerability occurs only if the attacker can control the HTTP method (GET, POST etc.) of the request. If the attacker can control the HTTP version of the request it will be able to modify the request (request smuggling). This issue has been patched in version 3.9.0.

CVSS3: 5.3
0%
Низкий
больше 1 года назад
nvd логотип
CVE-2023-49082

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Improper validation makes it possible for an attacker to modify the HTTP request (e.g. insert a new header) or even create a new HTTP request if the attacker controls the HTTP method. The vulnerability occurs only if the attacker can control the HTTP method (GET, POST etc.) of the request. If the attacker can control the HTTP version of the request it will be able to modify the request (request smuggling). This issue has been patched in version 3.9.0.

CVSS3: 5.3
0%
Низкий
больше 1 года назад
debian логотип
CVE-2023-49082

aiohttp is an asynchronous HTTP client/server framework for asyncio an ...

CVSS3: 5.3
0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:0168-1

Security update for python-aiohttp

0%
Низкий
больше 1 года назад
github логотип
GHSA-qvrw-v9rv-5rjx

aiohttp's ClientSession is vulnerable to CRLF injection via method

CVSS3: 5.3
0%
Низкий
больше 1 года назад
fstec логотип
BDU:2023-08273

Уязвимость HTTP-клиента aiohttp, связанная с непринятием мер по нейтрализации последовательностей CRLF, позволяющая нарушителю отправить скрытый HTTP-запрос (атака типа HTTP Request Smuggling)

CVSS3: 5.3
0%
Низкий
больше 1 года назад
redos логотип
ROS-20240318-01

Множественные уязвимости python3-aiohttp

CVSS3: 7.5
больше 1 года назад

Уязвимостей на страницу