Логотип exploitDog
bind:CVE-2023-26159
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-26159

Количество 7

Количество 7

ubuntu логотип

CVE-2023-26159

около 2 лет назад

Versions of the package follow-redirects before 1.15.4 are vulnerable to Improper Input Validation due to the improper handling of URLs by the url.parse() function. When new URL() throws an error, it can be manipulated to misinterpret the hostname. An attacker could exploit this weakness to redirect traffic to a malicious site, potentially leading to information disclosure, phishing attacks, or other security breaches.

CVSS3: 7.3
EPSS: Низкий
redhat логотип

CVE-2023-26159

около 2 лет назад

Versions of the package follow-redirects before 1.15.4 are vulnerable to Improper Input Validation due to the improper handling of URLs by the url.parse() function. When new URL() throws an error, it can be manipulated to misinterpret the hostname. An attacker could exploit this weakness to redirect traffic to a malicious site, potentially leading to information disclosure, phishing attacks, or other security breaches.

CVSS3: 6.1
EPSS: Низкий
nvd логотип

CVE-2023-26159

около 2 лет назад

Versions of the package follow-redirects before 1.15.4 are vulnerable to Improper Input Validation due to the improper handling of URLs by the url.parse() function. When new URL() throws an error, it can be manipulated to misinterpret the hostname. An attacker could exploit this weakness to redirect traffic to a malicious site, potentially leading to information disclosure, phishing attacks, or other security breaches.

CVSS3: 7.3
EPSS: Низкий
msrc логотип

CVE-2023-26159

около 2 лет назад

CVSS3: 6.1
EPSS: Низкий
debian логотип

CVE-2023-26159

около 2 лет назад

Versions of the package follow-redirects before 1.15.4 are vulnerable ...

CVSS3: 7.3
EPSS: Низкий
github логотип

GHSA-jchw-25xp-jwwc

около 2 лет назад

Follow Redirects improperly handles URLs in the url.parse() function

CVSS3: 6.1
EPSS: Низкий
fstec логотип

BDU:2024-02114

около 2 лет назад

Уязвимость функции url.parse() модуля Node.js follow-redirects, позволяющая нарушителю проводить фишинг-атаки

CVSS3: 7.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-26159

Versions of the package follow-redirects before 1.15.4 are vulnerable to Improper Input Validation due to the improper handling of URLs by the url.parse() function. When new URL() throws an error, it can be manipulated to misinterpret the hostname. An attacker could exploit this weakness to redirect traffic to a malicious site, potentially leading to information disclosure, phishing attacks, or other security breaches.

CVSS3: 7.3
0%
Низкий
около 2 лет назад
redhat логотип
CVE-2023-26159

Versions of the package follow-redirects before 1.15.4 are vulnerable to Improper Input Validation due to the improper handling of URLs by the url.parse() function. When new URL() throws an error, it can be manipulated to misinterpret the hostname. An attacker could exploit this weakness to redirect traffic to a malicious site, potentially leading to information disclosure, phishing attacks, or other security breaches.

CVSS3: 6.1
0%
Низкий
около 2 лет назад
nvd логотип
CVE-2023-26159

Versions of the package follow-redirects before 1.15.4 are vulnerable to Improper Input Validation due to the improper handling of URLs by the url.parse() function. When new URL() throws an error, it can be manipulated to misinterpret the hostname. An attacker could exploit this weakness to redirect traffic to a malicious site, potentially leading to information disclosure, phishing attacks, or other security breaches.

CVSS3: 7.3
0%
Низкий
около 2 лет назад
msrc логотип
CVSS3: 6.1
0%
Низкий
около 2 лет назад
debian логотип
CVE-2023-26159

Versions of the package follow-redirects before 1.15.4 are vulnerable ...

CVSS3: 7.3
0%
Низкий
около 2 лет назад
github логотип
GHSA-jchw-25xp-jwwc

Follow Redirects improperly handles URLs in the url.parse() function

CVSS3: 6.1
0%
Низкий
около 2 лет назад
fstec логотип
BDU:2024-02114

Уязвимость функции url.parse() модуля Node.js follow-redirects, позволяющая нарушителю проводить фишинг-атаки

CVSS3: 7.3
0%
Низкий
около 2 лет назад

Уязвимостей на страницу