Логотип exploitDog
bind:CVE-2022-3767
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-3767

Количество 4

Количество 4

ubuntu логотип

CVE-2022-3767

почти 3 года назад

Missing validation in DAST analyzer affecting all versions from 1.11.0 prior to 3.0.32, allows custom request headers to be sent with every request, regardless of the host.

CVSS3: 7.7
EPSS: Низкий
nvd логотип

CVE-2022-3767

почти 3 года назад

Missing validation in DAST analyzer affecting all versions from 1.11.0 prior to 3.0.32, allows custom request headers to be sent with every request, regardless of the host.

CVSS3: 7.7
EPSS: Низкий
debian логотип

CVE-2022-3767

почти 3 года назад

Missing validation in DAST analyzer affecting all versions from 1.11.0 ...

CVSS3: 7.7
EPSS: Низкий
github логотип

GHSA-5xvv-4r9w-mw22

почти 3 года назад

Missing validation in DAST analyzer affecting all versions from 1.11.0 prior to 3.0.32, allows custom request headers to be sent with every request, regardless of the host.

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2022-3767

Missing validation in DAST analyzer affecting all versions from 1.11.0 prior to 3.0.32, allows custom request headers to be sent with every request, regardless of the host.

CVSS3: 7.7
0%
Низкий
почти 3 года назад
nvd логотип
CVE-2022-3767

Missing validation in DAST analyzer affecting all versions from 1.11.0 prior to 3.0.32, allows custom request headers to be sent with every request, regardless of the host.

CVSS3: 7.7
0%
Низкий
почти 3 года назад
debian логотип
CVE-2022-3767

Missing validation in DAST analyzer affecting all versions from 1.11.0 ...

CVSS3: 7.7
0%
Низкий
почти 3 года назад
github логотип
GHSA-5xvv-4r9w-mw22

Missing validation in DAST analyzer affecting all versions from 1.11.0 prior to 3.0.32, allows custom request headers to be sent with every request, regardless of the host.

CVSS3: 6.5
0%
Низкий
почти 3 года назад

Уязвимостей на страницу