Логотип exploitDog
bind:CVE-2026-3234
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-3234

Количество 4

Количество 4

redhat логотип

CVE-2026-3234

29 дней назад

A flaw was found in mod_proxy_cluster. This vulnerability, a Carriage Return Line Feed (CRLF) injection in the decodeenc() function, allows a remote attacker to bypass input validation. By injecting CRLF sequences into the cluster configuration, an attacker can corrupt the response body of INFO endpoint responses. Exploitation requires network access to the MCMP protocol port, but no authentication is needed.

CVSS3: 4.3
EPSS: Низкий
nvd логотип

CVE-2026-3234

15 дней назад

A flaw was found in mod_proxy_cluster. This vulnerability, a Carriage Return Line Feed (CRLF) injection in the decodeenc() function, allows a remote attacker to bypass input validation. By injecting CRLF sequences into the cluster configuration, an attacker can corrupt the response body of INFO endpoint responses. Exploitation requires network access to the MCMP protocol port, but no authentication is needed.

CVSS3: 4.3
EPSS: Низкий
debian логотип

CVE-2026-3234

15 дней назад

A flaw was found in mod_proxy_cluster. This vulnerability, a Carriage ...

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-rxq8-r4ww-hxv7

15 дней назад

A flaw was found in mod_proxy_cluster. This vulnerability, a Carriage Return Line Feed (CRLF) injection in the decodeenc() function, allows a remote attacker to bypass input validation. By injecting CRLF sequences into the cluster configuration, an attacker can corrupt the response body of INFO endpoint responses. Exploitation requires network access to the MCMP protocol port, but no authentication is needed.

CVSS3: 4.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2026-3234

A flaw was found in mod_proxy_cluster. This vulnerability, a Carriage Return Line Feed (CRLF) injection in the decodeenc() function, allows a remote attacker to bypass input validation. By injecting CRLF sequences into the cluster configuration, an attacker can corrupt the response body of INFO endpoint responses. Exploitation requires network access to the MCMP protocol port, but no authentication is needed.

CVSS3: 4.3
0%
Низкий
29 дней назад
nvd логотип
CVE-2026-3234

A flaw was found in mod_proxy_cluster. This vulnerability, a Carriage Return Line Feed (CRLF) injection in the decodeenc() function, allows a remote attacker to bypass input validation. By injecting CRLF sequences into the cluster configuration, an attacker can corrupt the response body of INFO endpoint responses. Exploitation requires network access to the MCMP protocol port, but no authentication is needed.

CVSS3: 4.3
0%
Низкий
15 дней назад
debian логотип
CVE-2026-3234

A flaw was found in mod_proxy_cluster. This vulnerability, a Carriage ...

CVSS3: 4.3
0%
Низкий
15 дней назад
github логотип
GHSA-rxq8-r4ww-hxv7

A flaw was found in mod_proxy_cluster. This vulnerability, a Carriage Return Line Feed (CRLF) injection in the decodeenc() function, allows a remote attacker to bypass input validation. By injecting CRLF sequences into the cluster configuration, an attacker can corrupt the response body of INFO endpoint responses. Exploitation requires network access to the MCMP protocol port, but no authentication is needed.

CVSS3: 4.3
0%
Низкий
15 дней назад

Уязвимостей на страницу