Логотип exploitDog
bind:CVE-2023-26137
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-26137

Количество 2

Количество 2

nvd логотип

CVE-2023-26137

больше 2 лет назад

All versions of the package drogonframework/drogon are vulnerable to HTTP Response Splitting when untrusted user input is used to build header values in the addHeader and addCookie functions. An attacker can add the \r\n (carriage return line feeds) characters to end the HTTP response headers and inject malicious content.

CVSS3: 7.2
EPSS: Низкий
github логотип

GHSA-73h3-w2hp-q47q

больше 2 лет назад

All versions of the package drogonframework/drogon are vulnerable to HTTP Response Splitting when untrusted user input is used to build header values in the addHeader and addCookie functions. An attacker can add the \r\n (carriage return line feeds) characters to end the HTTP response headers and inject malicious content.

CVSS3: 7.2
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-26137

All versions of the package drogonframework/drogon are vulnerable to HTTP Response Splitting when untrusted user input is used to build header values in the addHeader and addCookie functions. An attacker can add the \r\n (carriage return line feeds) characters to end the HTTP response headers and inject malicious content.

CVSS3: 7.2
0%
Низкий
больше 2 лет назад
github логотип
GHSA-73h3-w2hp-q47q

All versions of the package drogonframework/drogon are vulnerable to HTTP Response Splitting when untrusted user input is used to build header values in the addHeader and addCookie functions. An attacker can add the \r\n (carriage return line feeds) characters to end the HTTP response headers and inject malicious content.

CVSS3: 7.2
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу