Логотип exploitDog
bind:"GHSA-48hw-cv6f-mcpj" OR bind:"CVE-2025-60876"
Консоль
Логотип exploitDog

exploitDog

bind:"GHSA-48hw-cv6f-mcpj" OR bind:"CVE-2025-60876"

Количество 8

Количество 8

github логотип

GHSA-48hw-cv6f-mcpj

3 месяца назад

BusyBox wget thru 1.3.7 accepted raw CR (0x0D)/LF (0x0A) and other C0 control bytes in the HTTP request-target (path/query), allowing the request line to be split and attacker-controlled headers to be injected. To preserve the HTTP/1.1 request-line shape METHOD SP request-target SP HTTP/1.1, a raw space (0x20) in the request-target must also be rejected (clients should use %20).

CVSS3: 6.5
EPSS: Низкий
ubuntu логотип

CVE-2025-60876

3 месяца назад

BusyBox wget thru 1.3.7 accepted raw CR (0x0D)/LF (0x0A) and other C0 control bytes in the HTTP request-target (path/query), allowing the request line to be split and attacker-controlled headers to be injected. To preserve the HTTP/1.1 request-line shape METHOD SP request-target SP HTTP/1.1, a raw space (0x20) in the request-target must also be rejected (clients should use %20).

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2025-60876

3 месяца назад

BusyBox wget thru 1.3.7 accepted raw CR (0x0D)/LF (0x0A) and other C0 control bytes in the HTTP request-target (path/query), allowing the request line to be split and attacker-controlled headers to be injected. To preserve the HTTP/1.1 request-line shape METHOD SP request-target SP HTTP/1.1, a raw space (0x20) in the request-target must also be rejected (clients should use %20).

CVSS3: 6.5
EPSS: Низкий
msrc логотип

CVE-2025-60876

2 месяца назад

BusyBox wget thru 1.3.7 accepted raw CR (0x0D)/LF (0x0A) and other C0 control bytes in the HTTP request-target (path/query), allowing the request line to be split and attacker-controlled headers to be injected. To preserve the HTTP/1.1 request-line shape METHOD SP request-target SP HTTP/1.1, a raw space (0x20) in the request-target must also be rejected (clients should use %20).

EPSS: Низкий
debian логотип

CVE-2025-60876

3 месяца назад

BusyBox wget thru 1.3.7 accepted raw CR (0x0D)/LF (0x0A) and other C0 ...

CVSS3: 6.5
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2026:20090-1

14 дней назад

Security update for busybox

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0236-1

15 дней назад

Security update for busybox

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0235-1

15 дней назад

Security update for busybox

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-48hw-cv6f-mcpj

BusyBox wget thru 1.3.7 accepted raw CR (0x0D)/LF (0x0A) and other C0 control bytes in the HTTP request-target (path/query), allowing the request line to be split and attacker-controlled headers to be injected. To preserve the HTTP/1.1 request-line shape METHOD SP request-target SP HTTP/1.1, a raw space (0x20) in the request-target must also be rejected (clients should use %20).

CVSS3: 6.5
0%
Низкий
3 месяца назад
ubuntu логотип
CVE-2025-60876

BusyBox wget thru 1.3.7 accepted raw CR (0x0D)/LF (0x0A) and other C0 control bytes in the HTTP request-target (path/query), allowing the request line to be split and attacker-controlled headers to be injected. To preserve the HTTP/1.1 request-line shape METHOD SP request-target SP HTTP/1.1, a raw space (0x20) in the request-target must also be rejected (clients should use %20).

CVSS3: 6.5
0%
Низкий
3 месяца назад
nvd логотип
CVE-2025-60876

BusyBox wget thru 1.3.7 accepted raw CR (0x0D)/LF (0x0A) and other C0 control bytes in the HTTP request-target (path/query), allowing the request line to be split and attacker-controlled headers to be injected. To preserve the HTTP/1.1 request-line shape METHOD SP request-target SP HTTP/1.1, a raw space (0x20) in the request-target must also be rejected (clients should use %20).

CVSS3: 6.5
0%
Низкий
3 месяца назад
msrc логотип
CVE-2025-60876

BusyBox wget thru 1.3.7 accepted raw CR (0x0D)/LF (0x0A) and other C0 control bytes in the HTTP request-target (path/query), allowing the request line to be split and attacker-controlled headers to be injected. To preserve the HTTP/1.1 request-line shape METHOD SP request-target SP HTTP/1.1, a raw space (0x20) in the request-target must also be rejected (clients should use %20).

0%
Низкий
2 месяца назад
debian логотип
CVE-2025-60876

BusyBox wget thru 1.3.7 accepted raw CR (0x0D)/LF (0x0A) and other C0 ...

CVSS3: 6.5
0%
Низкий
3 месяца назад
suse-cvrf логотип
openSUSE-SU-2026:20090-1

Security update for busybox

14 дней назад
suse-cvrf логотип
SUSE-SU-2026:0236-1

Security update for busybox

15 дней назад
suse-cvrf логотип
SUSE-SU-2026:0235-1

Security update for busybox

15 дней назад

Уязвимостей на страницу