Логотип exploitDog
bind:CVE-2017-2666
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2017-2666

Количество 5

Количество 5

ubuntu логотип

CVE-2017-2666

больше 7 лет назад

It was discovered in Undertow that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other than their own.

CVSS3: 6.5
EPSS: Низкий
redhat логотип

CVE-2017-2666

больше 8 лет назад

It was discovered in Undertow that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other than their own.

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2017-2666

больше 7 лет назад

It was discovered in Undertow that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other than their own.

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2017-2666

больше 7 лет назад

It was discovered in Undertow that the code that parsed the HTTP reque ...

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-mcfm-h73v-635m

больше 7 лет назад

Undertow-core vulnerable to HTTP Request Smuggling

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2017-2666

It was discovered in Undertow that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other than their own.

CVSS3: 6.5
1%
Низкий
больше 7 лет назад
redhat логотип
CVE-2017-2666

It was discovered in Undertow that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other than their own.

CVSS3: 6.5
1%
Низкий
больше 8 лет назад
nvd логотип
CVE-2017-2666

It was discovered in Undertow that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other than their own.

CVSS3: 6.5
1%
Низкий
больше 7 лет назад
debian логотип
CVE-2017-2666

It was discovered in Undertow that the code that parsed the HTTP reque ...

CVSS3: 6.5
1%
Низкий
больше 7 лет назад
github логотип
GHSA-mcfm-h73v-635m

Undertow-core vulnerable to HTTP Request Smuggling

CVSS3: 6.5
1%
Низкий
больше 7 лет назад

Уязвимостей на страницу