Логотип exploitDog
bind:"GHSA-jchw-25xp-jwwc" OR bind:"CVE-2023-26159"
Консоль
Логотип exploitDog

exploitDog

bind:"GHSA-jchw-25xp-jwwc" OR bind:"CVE-2023-26159"

Количество 7

Количество 7

github логотип

GHSA-jchw-25xp-jwwc

около 2 лет назад

Follow Redirects improperly handles URLs in the url.parse() function

CVSS3: 6.1
EPSS: Низкий
ubuntu логотип

CVE-2023-26159

около 2 лет назад

Versions of the package follow-redirects before 1.15.4 are vulnerable to Improper Input Validation due to the improper handling of URLs by the url.parse() function. When new URL() throws an error, it can be manipulated to misinterpret the hostname. An attacker could exploit this weakness to redirect traffic to a malicious site, potentially leading to information disclosure, phishing attacks, or other security breaches.

CVSS3: 7.3
EPSS: Низкий
redhat логотип

CVE-2023-26159

около 2 лет назад

Versions of the package follow-redirects before 1.15.4 are vulnerable to Improper Input Validation due to the improper handling of URLs by the url.parse() function. When new URL() throws an error, it can be manipulated to misinterpret the hostname. An attacker could exploit this weakness to redirect traffic to a malicious site, potentially leading to information disclosure, phishing attacks, or other security breaches.

CVSS3: 6.1
EPSS: Низкий
nvd логотип

CVE-2023-26159

около 2 лет назад

Versions of the package follow-redirects before 1.15.4 are vulnerable to Improper Input Validation due to the improper handling of URLs by the url.parse() function. When new URL() throws an error, it can be manipulated to misinterpret the hostname. An attacker could exploit this weakness to redirect traffic to a malicious site, potentially leading to information disclosure, phishing attacks, or other security breaches.

CVSS3: 7.3
EPSS: Низкий
msrc логотип

CVE-2023-26159

около 2 лет назад

CVSS3: 6.1
EPSS: Низкий
debian логотип

CVE-2023-26159

около 2 лет назад

Versions of the package follow-redirects before 1.15.4 are vulnerable ...

CVSS3: 7.3
EPSS: Низкий
fstec логотип

BDU:2024-02114

около 2 лет назад

Уязвимость функции url.parse() модуля Node.js follow-redirects, позволяющая нарушителю проводить фишинг-атаки

CVSS3: 7.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-jchw-25xp-jwwc

Follow Redirects improperly handles URLs in the url.parse() function

CVSS3: 6.1
0%
Низкий
около 2 лет назад
ubuntu логотип
CVE-2023-26159

Versions of the package follow-redirects before 1.15.4 are vulnerable to Improper Input Validation due to the improper handling of URLs by the url.parse() function. When new URL() throws an error, it can be manipulated to misinterpret the hostname. An attacker could exploit this weakness to redirect traffic to a malicious site, potentially leading to information disclosure, phishing attacks, or other security breaches.

CVSS3: 7.3
0%
Низкий
около 2 лет назад
redhat логотип
CVE-2023-26159

Versions of the package follow-redirects before 1.15.4 are vulnerable to Improper Input Validation due to the improper handling of URLs by the url.parse() function. When new URL() throws an error, it can be manipulated to misinterpret the hostname. An attacker could exploit this weakness to redirect traffic to a malicious site, potentially leading to information disclosure, phishing attacks, or other security breaches.

CVSS3: 6.1
0%
Низкий
около 2 лет назад
nvd логотип
CVE-2023-26159

Versions of the package follow-redirects before 1.15.4 are vulnerable to Improper Input Validation due to the improper handling of URLs by the url.parse() function. When new URL() throws an error, it can be manipulated to misinterpret the hostname. An attacker could exploit this weakness to redirect traffic to a malicious site, potentially leading to information disclosure, phishing attacks, or other security breaches.

CVSS3: 7.3
0%
Низкий
около 2 лет назад
msrc логотип
CVSS3: 6.1
0%
Низкий
около 2 лет назад
debian логотип
CVE-2023-26159

Versions of the package follow-redirects before 1.15.4 are vulnerable ...

CVSS3: 7.3
0%
Низкий
около 2 лет назад
fstec логотип
BDU:2024-02114

Уязвимость функции url.parse() модуля Node.js follow-redirects, позволяющая нарушителю проводить фишинг-атаки

CVSS3: 7.3
0%
Низкий
около 2 лет назад

Уязвимостей на страницу