Логотип exploitDog
bind:CVE-2009-0804
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2009-0804

Количество 4

Количество 4

ubuntu логотип

CVE-2009-0804

почти 17 лет назад

Ziproxy 2.6.0, when transparent interception mode is enabled, uses the HTTP Host header to determine the remote endpoint, which allows remote attackers to bypass access controls for Flash, Java, Silverlight, and probably other technologies, and possibly communicate with restricted intranet sites, via a crafted web page that causes a client to send HTTP requests with a modified Host header.

CVSS2: 5.4
EPSS: Низкий
nvd логотип

CVE-2009-0804

почти 17 лет назад

Ziproxy 2.6.0, when transparent interception mode is enabled, uses the HTTP Host header to determine the remote endpoint, which allows remote attackers to bypass access controls for Flash, Java, Silverlight, and probably other technologies, and possibly communicate with restricted intranet sites, via a crafted web page that causes a client to send HTTP requests with a modified Host header.

CVSS2: 5.4
EPSS: Низкий
debian логотип

CVE-2009-0804

почти 17 лет назад

Ziproxy 2.6.0, when transparent interception mode is enabled, uses the ...

CVSS2: 5.4
EPSS: Низкий
github логотип

GHSA-3v7f-ppjx-349f

больше 3 лет назад

Ziproxy 2.6.0, when transparent interception mode is enabled, uses the HTTP Host header to determine the remote endpoint, which allows remote attackers to bypass access controls for Flash, Java, Silverlight, and probably other technologies, and possibly communicate with restricted intranet sites, via a crafted web page that causes a client to send HTTP requests with a modified Host header.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2009-0804

Ziproxy 2.6.0, when transparent interception mode is enabled, uses the HTTP Host header to determine the remote endpoint, which allows remote attackers to bypass access controls for Flash, Java, Silverlight, and probably other technologies, and possibly communicate with restricted intranet sites, via a crafted web page that causes a client to send HTTP requests with a modified Host header.

CVSS2: 5.4
0%
Низкий
почти 17 лет назад
nvd логотип
CVE-2009-0804

Ziproxy 2.6.0, when transparent interception mode is enabled, uses the HTTP Host header to determine the remote endpoint, which allows remote attackers to bypass access controls for Flash, Java, Silverlight, and probably other technologies, and possibly communicate with restricted intranet sites, via a crafted web page that causes a client to send HTTP requests with a modified Host header.

CVSS2: 5.4
0%
Низкий
почти 17 лет назад
debian логотип
CVE-2009-0804

Ziproxy 2.6.0, when transparent interception mode is enabled, uses the ...

CVSS2: 5.4
0%
Низкий
почти 17 лет назад
github логотип
GHSA-3v7f-ppjx-349f

Ziproxy 2.6.0, when transparent interception mode is enabled, uses the HTTP Host header to determine the remote endpoint, which allows remote attackers to bypass access controls for Flash, Java, Silverlight, and probably other technologies, and possibly communicate with restricted intranet sites, via a crafted web page that causes a client to send HTTP requests with a modified Host header.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу