Логотип exploitDog
bind:CVE-2020-7622
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-7622

Количество 2

Количество 2

nvd логотип

CVE-2020-7622

почти 6 лет назад

This affects the package io.jooby:jooby-netty before 1.6.9, from 2.0.0 and before 2.2.1. The DefaultHttpHeaders is set to false which means it does not validates that the header isn't being abused for HTTP Response Splitting.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-gv3v-92v6-m48j

почти 6 лет назад

Improper Neutralization of CRLF Sequences in HTTP Headers in Jooby ('HTTP Response Splitting)

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-7622

This affects the package io.jooby:jooby-netty before 1.6.9, from 2.0.0 and before 2.2.1. The DefaultHttpHeaders is set to false which means it does not validates that the header isn't being abused for HTTP Response Splitting.

CVSS3: 6.5
0%
Низкий
почти 6 лет назад
github логотип
GHSA-gv3v-92v6-m48j

Improper Neutralization of CRLF Sequences in HTTP Headers in Jooby ('HTTP Response Splitting)

CVSS3: 9.8
0%
Низкий
почти 6 лет назад

Уязвимостей на страницу