Логотип exploitDog
bind:CVE-2024-10491
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-10491

Количество 5

Количество 5

ubuntu логотип

CVE-2024-10491

8 месяцев назад

A vulnerability has been identified in the Express response.links function, allowing for arbitrary resource injection in the Link header when unsanitized data is used. The issue arises from improper sanitization in `Link` header values, which can allow a combination of characters like `,`, `;`, and `<>` to preload malicious resources. This vulnerability is especially relevant for dynamic parameters.

CVSS3: 4
EPSS: Низкий
redhat логотип

CVE-2024-10491

8 месяцев назад

A vulnerability has been identified in the Express response.links function, allowing for arbitrary resource injection in the Link header when unsanitized data is used. The issue arises from improper sanitization in `Link` header values, which can allow a combination of characters like `,`, `;`, and `<>` to preload malicious resources. This vulnerability is especially relevant for dynamic parameters.

CVSS3: 5.4
EPSS: Низкий
nvd логотип

CVE-2024-10491

8 месяцев назад

A vulnerability has been identified in the Express response.links function, allowing for arbitrary resource injection in the Link header when unsanitized data is used. The issue arises from improper sanitization in `Link` header values, which can allow a combination of characters like `,`, `;`, and `<>` to preload malicious resources. This vulnerability is especially relevant for dynamic parameters.

CVSS3: 4
EPSS: Низкий
debian логотип

CVE-2024-10491

8 месяцев назад

A vulnerability has been identified in the Express response.linksfunct ...

CVSS3: 4
EPSS: Низкий
github логотип

GHSA-cm5g-3pgc-8rg4

8 месяцев назад

Express ressource injection

CVSS3: 4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-10491

A vulnerability has been identified in the Express response.links function, allowing for arbitrary resource injection in the Link header when unsanitized data is used. The issue arises from improper sanitization in `Link` header values, which can allow a combination of characters like `,`, `;`, and `<>` to preload malicious resources. This vulnerability is especially relevant for dynamic parameters.

CVSS3: 4
0%
Низкий
8 месяцев назад
redhat логотип
CVE-2024-10491

A vulnerability has been identified in the Express response.links function, allowing for arbitrary resource injection in the Link header when unsanitized data is used. The issue arises from improper sanitization in `Link` header values, which can allow a combination of characters like `,`, `;`, and `<>` to preload malicious resources. This vulnerability is especially relevant for dynamic parameters.

CVSS3: 5.4
0%
Низкий
8 месяцев назад
nvd логотип
CVE-2024-10491

A vulnerability has been identified in the Express response.links function, allowing for arbitrary resource injection in the Link header when unsanitized data is used. The issue arises from improper sanitization in `Link` header values, which can allow a combination of characters like `,`, `;`, and `<>` to preload malicious resources. This vulnerability is especially relevant for dynamic parameters.

CVSS3: 4
0%
Низкий
8 месяцев назад
debian логотип
CVE-2024-10491

A vulnerability has been identified in the Express response.linksfunct ...

CVSS3: 4
0%
Низкий
8 месяцев назад
github логотип
GHSA-cm5g-3pgc-8rg4

Express ressource injection

CVSS3: 4
0%
Низкий
8 месяцев назад

Уязвимостей на страницу