Логотип exploitDog
bind:CVE-2016-8720
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2016-8720

Количество 2

Количество 2

nvd логотип

CVE-2016-8720

почти 9 лет назад

An exploitable HTTP Header Injection vulnerability exists in the Web Application functionality of the Moxa AWK-3131A Wireless Access Point running firmware 1.1. A specially crafted HTTP request can inject a payload in the bkpath parameter which will be copied in to Location header of the HTTP response.

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-hq6q-jfv4-xqv9

больше 3 лет назад

An exploitable HTTP Header Injection vulnerability exists in the Web Application functionality of the Moxa AWK-3131A Wireless Access Point running firmware 1.1. A specially crafted HTTP request can inject a payload in the bkpath parameter which will be copied in to Location header of the HTTP response.

CVSS3: 4.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2016-8720

An exploitable HTTP Header Injection vulnerability exists in the Web Application functionality of the Moxa AWK-3131A Wireless Access Point running firmware 1.1. A specially crafted HTTP request can inject a payload in the bkpath parameter which will be copied in to Location header of the HTTP response.

CVSS3: 4.3
1%
Низкий
почти 9 лет назад
github логотип
GHSA-hq6q-jfv4-xqv9

An exploitable HTTP Header Injection vulnerability exists in the Web Application functionality of the Moxa AWK-3131A Wireless Access Point running firmware 1.1. A specially crafted HTTP request can inject a payload in the bkpath parameter which will be copied in to Location header of the HTTP response.

CVSS3: 4.3
1%
Низкий
больше 3 лет назад

Уязвимостей на страницу