Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2015-2156

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-18 Oct, 2017 | 15:00
Updated At-06 Aug, 2024 | 05:10
Rejected At-
Credits

Netty before 3.9.8.Final, 3.10.x before 3.10.3.Final, 4.0.x before 4.0.28.Final, and 4.1.x before 4.1.0.Beta5 and Play Framework 2.x before 2.3.9 might allow remote attackers to bypass the httpOnly flag on cookies and obtain sensitive information by leveraging improper validation of cookie name and value characters.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:18 Oct, 2017 | 15:00
Updated At:06 Aug, 2024 | 05:10
Rejected At:
▼CVE Numbering Authority (CNA)

Netty before 3.9.8.Final, 3.10.x before 3.10.3.Final, 4.0.x before 4.0.28.Final, and 4.1.x before 4.1.0.Beta5 and Play Framework 2.x before 2.3.9 might allow remote attackers to bypass the httpOnly flag on cookies and obtain sensitive information by leveraging improper validation of cookie name and value characters.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://netty.io/news/2015/05/08/3-9-8-Final-and-3.html
x_refsource_CONFIRM
https://www.playframework.com/security/vulnerability/CVE-2015-2156-HttpOnlyBypass
x_refsource_MISC
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159379.html
vendor-advisory
x_refsource_FEDORA
https://bugzilla.redhat.com/show_bug.cgi?id=1222923
x_refsource_CONFIRM
https://github.com/netty/netty/pull/3754
x_refsource_CONFIRM
http://lists.fedoraproject.org/pipermail/package-announce/2015-May/159166.html
vendor-advisory
x_refsource_FEDORA
http://www.securityfocus.com/bid/74704
vdb-entry
x_refsource_BID
http://www.openwall.com/lists/oss-security/2015/05/17/1
mailing-list
x_refsource_MLIST
https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E
mailing-list
x_refsource_MLIST
https://lists.apache.org/thread.html/a19bb1003b0d6cd22475ba83c019b4fc7facfef2a9e13f71132529d3%40%3Ccommits.cassandra.apache.org%3E
mailing-list
x_refsource_MLIST
https://lists.apache.org/thread.html/dc1275aef115bda172851a231c76c0932d973f9ffd8bc375c4aba769%40%3Ccommits.cassandra.apache.org%3E
mailing-list
x_refsource_MLIST
https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3E
mailing-list
x_refsource_MLIST
Hyperlink: http://netty.io/news/2015/05/08/3-9-8-Final-and-3.html
Resource:
x_refsource_CONFIRM
Hyperlink: https://www.playframework.com/security/vulnerability/CVE-2015-2156-HttpOnlyBypass
Resource:
x_refsource_MISC
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159379.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=1222923
Resource:
x_refsource_CONFIRM
Hyperlink: https://github.com/netty/netty/pull/3754
Resource:
x_refsource_CONFIRM
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2015-May/159166.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://www.securityfocus.com/bid/74704
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://www.openwall.com/lists/oss-security/2015/05/17/1
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: https://lists.apache.org/thread.html/a19bb1003b0d6cd22475ba83c019b4fc7facfef2a9e13f71132529d3%40%3Ccommits.cassandra.apache.org%3E
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: https://lists.apache.org/thread.html/dc1275aef115bda172851a231c76c0932d973f9ffd8bc375c4aba769%40%3Ccommits.cassandra.apache.org%3E
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3E
Resource:
mailing-list
x_refsource_MLIST
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://netty.io/news/2015/05/08/3-9-8-Final-and-3.html
x_refsource_CONFIRM
x_transferred
https://www.playframework.com/security/vulnerability/CVE-2015-2156-HttpOnlyBypass
x_refsource_MISC
x_transferred
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159379.html
vendor-advisory
x_refsource_FEDORA
x_transferred
https://bugzilla.redhat.com/show_bug.cgi?id=1222923
x_refsource_CONFIRM
x_transferred
https://github.com/netty/netty/pull/3754
x_refsource_CONFIRM
x_transferred
http://lists.fedoraproject.org/pipermail/package-announce/2015-May/159166.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://www.securityfocus.com/bid/74704
vdb-entry
x_refsource_BID
x_transferred
http://www.openwall.com/lists/oss-security/2015/05/17/1
mailing-list
x_refsource_MLIST
x_transferred
https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E
mailing-list
x_refsource_MLIST
x_transferred
https://lists.apache.org/thread.html/a19bb1003b0d6cd22475ba83c019b4fc7facfef2a9e13f71132529d3%40%3Ccommits.cassandra.apache.org%3E
mailing-list
x_refsource_MLIST
x_transferred
https://lists.apache.org/thread.html/dc1275aef115bda172851a231c76c0932d973f9ffd8bc375c4aba769%40%3Ccommits.cassandra.apache.org%3E
mailing-list
x_refsource_MLIST
x_transferred
https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3E
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://netty.io/news/2015/05/08/3-9-8-Final-and-3.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://www.playframework.com/security/vulnerability/CVE-2015-2156-HttpOnlyBypass
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159379.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=1222923
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://github.com/netty/netty/pull/3754
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2015-May/159166.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://www.securityfocus.com/bid/74704
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2015/05/17/1
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: https://lists.apache.org/thread.html/a19bb1003b0d6cd22475ba83c019b4fc7facfef2a9e13f71132529d3%40%3Ccommits.cassandra.apache.org%3E
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: https://lists.apache.org/thread.html/dc1275aef115bda172851a231c76c0932d973f9ffd8bc375c4aba769%40%3Ccommits.cassandra.apache.org%3E
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3E
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:18 Oct, 2017 | 15:29
Updated At:20 Apr, 2025 | 01:37

Netty before 3.9.8.Final, 3.10.x before 3.10.3.Final, 4.0.x before 4.0.28.Final, and 4.1.x before 4.1.0.Beta5 and Play Framework 2.x before 2.3.9 might allow remote attackers to bypass the httpOnly flag on cookies and obtain sensitive information by leveraging improper validation of cookie name and value characters.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.07.5HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Primary2.04.3MEDIUM
AV:N/AC:M/Au:N/C:P/I:N/A:N
Type: Primary
Version: 3.0
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Type: Primary
Version: 2.0
Base score: 4.3
Base severity: MEDIUM
Vector:
AV:N/AC:M/Au:N/C:P/I:N/A:N
CPE Matches

The Netty Project
netty
>>netty>>Versions up to 3.9.7(inclusive)
cpe:2.3:a:netty:netty:*:*:*:*:*:*:*:*
The Netty Project
netty
>>netty>>3.10.0
cpe:2.3:a:netty:netty:3.10.0:*:*:*:*:*:*:*
The Netty Project
netty
>>netty>>3.10.1
cpe:2.3:a:netty:netty:3.10.1:*:*:*:*:*:*:*
The Netty Project
netty
>>netty>>3.10.2
cpe:2.3:a:netty:netty:3.10.2:*:*:*:*:*:*:*
The Netty Project
netty
>>netty>>4.0.0
cpe:2.3:a:netty:netty:4.0.0:*:*:*:*:*:*:*
The Netty Project
netty
>>netty>>4.0.1
cpe:2.3:a:netty:netty:4.0.1:*:*:*:*:*:*:*
The Netty Project
netty
>>netty>>4.0.2
cpe:2.3:a:netty:netty:4.0.2:*:*:*:*:*:*:*
The Netty Project
netty
>>netty>>4.0.3
cpe:2.3:a:netty:netty:4.0.3:*:*:*:*:*:*:*
The Netty Project
netty
>>netty>>4.0.4
cpe:2.3:a:netty:netty:4.0.4:*:*:*:*:*:*:*
The Netty Project
netty
>>netty>>4.0.5
cpe:2.3:a:netty:netty:4.0.5:*:*:*:*:*:*:*
The Netty Project
netty
>>netty>>4.0.6
cpe:2.3:a:netty:netty:4.0.6:*:*:*:*:*:*:*
The Netty Project
netty
>>netty>>4.0.7
cpe:2.3:a:netty:netty:4.0.7:*:*:*:*:*:*:*
The Netty Project
netty
>>netty>>4.0.8
cpe:2.3:a:netty:netty:4.0.8:*:*:*:*:*:*:*
The Netty Project
netty
>>netty>>4.0.9
cpe:2.3:a:netty:netty:4.0.9:*:*:*:*:*:*:*
The Netty Project
netty
>>netty>>4.0.10
cpe:2.3:a:netty:netty:4.0.10:*:*:*:*:*:*:*
The Netty Project
netty
>>netty>>4.0.11
cpe:2.3:a:netty:netty:4.0.11:*:*:*:*:*:*:*
The Netty Project
netty
>>netty>>4.0.12
cpe:2.3:a:netty:netty:4.0.12:*:*:*:*:*:*:*
The Netty Project
netty
>>netty>>4.0.13
cpe:2.3:a:netty:netty:4.0.13:*:*:*:*:*:*:*
The Netty Project
netty
>>netty>>4.0.14
cpe:2.3:a:netty:netty:4.0.14:*:*:*:*:*:*:*
The Netty Project
netty
>>netty>>4.0.15
cpe:2.3:a:netty:netty:4.0.15:*:*:*:*:*:*:*
The Netty Project
netty
>>netty>>4.0.16
cpe:2.3:a:netty:netty:4.0.16:*:*:*:*:*:*:*
The Netty Project
netty
>>netty>>4.0.17
cpe:2.3:a:netty:netty:4.0.17:*:*:*:*:*:*:*
The Netty Project
netty
>>netty>>4.0.18
cpe:2.3:a:netty:netty:4.0.18:*:*:*:*:*:*:*
The Netty Project
netty
>>netty>>4.0.19
cpe:2.3:a:netty:netty:4.0.19:*:*:*:*:*:*:*
The Netty Project
netty
>>netty>>4.0.20
cpe:2.3:a:netty:netty:4.0.20:*:*:*:*:*:*:*
The Netty Project
netty
>>netty>>4.0.21
cpe:2.3:a:netty:netty:4.0.21:*:*:*:*:*:*:*
The Netty Project
netty
>>netty>>4.0.22
cpe:2.3:a:netty:netty:4.0.22:*:*:*:*:*:*:*
The Netty Project
netty
>>netty>>4.0.23
cpe:2.3:a:netty:netty:4.0.23:*:*:*:*:*:*:*
The Netty Project
netty
>>netty>>4.0.24
cpe:2.3:a:netty:netty:4.0.24:*:*:*:*:*:*:*
The Netty Project
netty
>>netty>>4.0.25
cpe:2.3:a:netty:netty:4.0.25:*:*:*:*:*:*:*
The Netty Project
netty
>>netty>>4.0.26
cpe:2.3:a:netty:netty:4.0.26:*:*:*:*:*:*:*
The Netty Project
netty
>>netty>>4.0.27
cpe:2.3:a:netty:netty:4.0.27:*:*:*:*:*:*:*
The Netty Project
netty
>>netty>>4.1.0
cpe:2.3:a:netty:netty:4.1.0:beta1:*:*:*:*:*:*
The Netty Project
netty
>>netty>>4.1.0
cpe:2.3:a:netty:netty:4.1.0:beta2:*:*:*:*:*:*
The Netty Project
netty
>>netty>>4.1.0
cpe:2.3:a:netty:netty:4.1.0:beta3:*:*:*:*:*:*
The Netty Project
netty
>>netty>>4.1.0
cpe:2.3:a:netty:netty:4.1.0:beta4:*:*:*:*:*:*
lightbend
lightbend
>>play_framework>>2.0
cpe:2.3:a:lightbend:play_framework:2.0:rc3:*:*:*:*:*:*
lightbend
lightbend
>>play_framework>>2.0
cpe:2.3:a:lightbend:play_framework:2.0:rc4:*:*:*:*:*:*
lightbend
lightbend
>>play_framework>>2.0
cpe:2.3:a:lightbend:play_framework:2.0:rc5:*:*:*:*:*:*
lightbend
lightbend
>>play_framework>>2.0.2
cpe:2.3:a:lightbend:play_framework:2.0.2:*:*:*:*:*:*:*
lightbend
lightbend
>>play_framework>>2.0.2
cpe:2.3:a:lightbend:play_framework:2.0.2:rc1:*:*:*:*:*:*
lightbend
lightbend
>>play_framework>>2.0.2
cpe:2.3:a:lightbend:play_framework:2.0.2:rc2:*:*:*:*:*:*
lightbend
lightbend
>>play_framework>>2.0.3
cpe:2.3:a:lightbend:play_framework:2.0.3:*:*:*:*:*:*:*
lightbend
lightbend
>>play_framework>>2.0.3
cpe:2.3:a:lightbend:play_framework:2.0.3:rc1:*:*:*:*:*:*
lightbend
lightbend
>>play_framework>>2.0.3
cpe:2.3:a:lightbend:play_framework:2.0.3:rc2:*:*:*:*:*:*
lightbend
lightbend
>>play_framework>>2.0.4
cpe:2.3:a:lightbend:play_framework:2.0.4:*:*:*:*:*:*:*
lightbend
lightbend
>>play_framework>>2.0.4
cpe:2.3:a:lightbend:play_framework:2.0.4:rc1:*:*:*:*:*:*
lightbend
lightbend
>>play_framework>>2.0.4
cpe:2.3:a:lightbend:play_framework:2.0.4:rc2:*:*:*:*:*:*
lightbend
lightbend
>>play_framework>>2.0.5
cpe:2.3:a:lightbend:play_framework:2.0.5:*:*:*:*:*:*:*
lightbend
lightbend
>>play_framework>>2.0.5
cpe:2.3:a:lightbend:play_framework:2.0.5:rc1:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-20Primarynvd@nist.gov
CWE ID: CWE-20
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159379.htmlcve@mitre.org
Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2015-May/159166.htmlcve@mitre.org
Third Party Advisory
http://netty.io/news/2015/05/08/3-9-8-Final-and-3.htmlcve@mitre.org
Vendor Advisory
http://www.openwall.com/lists/oss-security/2015/05/17/1cve@mitre.org
Mailing List
Third Party Advisory
http://www.securityfocus.com/bid/74704cve@mitre.org
Third Party Advisory
VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=1222923cve@mitre.org
Issue Tracking
Third Party Advisory
https://github.com/netty/netty/pull/3754cve@mitre.org
Third Party Advisory
https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3Ecve@mitre.org
N/A
https://lists.apache.org/thread.html/a19bb1003b0d6cd22475ba83c019b4fc7facfef2a9e13f71132529d3%40%3Ccommits.cassandra.apache.org%3Ecve@mitre.org
N/A
https://lists.apache.org/thread.html/dc1275aef115bda172851a231c76c0932d973f9ffd8bc375c4aba769%40%3Ccommits.cassandra.apache.org%3Ecve@mitre.org
N/A
https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3Ecve@mitre.org
N/A
https://www.playframework.com/security/vulnerability/CVE-2015-2156-HttpOnlyBypasscve@mitre.org
Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159379.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2015-May/159166.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://netty.io/news/2015/05/08/3-9-8-Final-and-3.htmlaf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.openwall.com/lists/oss-security/2015/05/17/1af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
http://www.securityfocus.com/bid/74704af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=1222923af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
Third Party Advisory
https://github.com/netty/netty/pull/3754af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3Eaf854a3a-2127-422b-91ae-364da2661108
N/A
https://lists.apache.org/thread.html/a19bb1003b0d6cd22475ba83c019b4fc7facfef2a9e13f71132529d3%40%3Ccommits.cassandra.apache.org%3Eaf854a3a-2127-422b-91ae-364da2661108
N/A
https://lists.apache.org/thread.html/dc1275aef115bda172851a231c76c0932d973f9ffd8bc375c4aba769%40%3Ccommits.cassandra.apache.org%3Eaf854a3a-2127-422b-91ae-364da2661108
N/A
https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3Eaf854a3a-2127-422b-91ae-364da2661108
N/A
https://www.playframework.com/security/vulnerability/CVE-2015-2156-HttpOnlyBypassaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159379.html
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2015-May/159166.html
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://netty.io/news/2015/05/08/3-9-8-Final-and-3.html
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://www.openwall.com/lists/oss-security/2015/05/17/1
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://www.securityfocus.com/bid/74704
Source: cve@mitre.org
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=1222923
Source: cve@mitre.org
Resource:
Issue Tracking
Third Party Advisory
Hyperlink: https://github.com/netty/netty/pull/3754
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3E
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://lists.apache.org/thread.html/a19bb1003b0d6cd22475ba83c019b4fc7facfef2a9e13f71132529d3%40%3Ccommits.cassandra.apache.org%3E
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://lists.apache.org/thread.html/dc1275aef115bda172851a231c76c0932d973f9ffd8bc375c4aba769%40%3Ccommits.cassandra.apache.org%3E
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://www.playframework.com/security/vulnerability/CVE-2015-2156-HttpOnlyBypass
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159379.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2015-May/159166.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://netty.io/news/2015/05/08/3-9-8-Final-and-3.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://www.openwall.com/lists/oss-security/2015/05/17/1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://www.securityfocus.com/bid/74704
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=1222923
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Third Party Advisory
Hyperlink: https://github.com/netty/netty/pull/3754
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3E
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://lists.apache.org/thread.html/a19bb1003b0d6cd22475ba83c019b4fc7facfef2a9e13f71132529d3%40%3Ccommits.cassandra.apache.org%3E
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://lists.apache.org/thread.html/dc1275aef115bda172851a231c76c0932d973f9ffd8bc375c4aba769%40%3Ccommits.cassandra.apache.org%3E
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://www.playframework.com/security/vulnerability/CVE-2015-2156-HttpOnlyBypass
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

163Records found

CVE-2018-4417
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.20% / 41.89%
||
7 Day CHG~0.00%
Published-03 Apr, 2019 | 17:43
Updated-05 Aug, 2024 | 05:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A validation issue was addressed with improved input sanitization. This issue affected versions prior to macOS Mojave 10.14.

Action-Not Available
Vendor-n/aApple Inc.
Product-mac_os_xmacOS
CWE ID-CWE-20
Improper Input Validation
CVE-2019-9414
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-5.9||MEDIUM
EPSS-0.14% / 35.08%
||
7 Day CHG~0.00%
Published-27 Sep, 2019 | 18:05
Updated-04 Aug, 2024 | 21:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In wpa_supplicant, there is a possible man in the middle vulnerability due to improper input validation of the basicConstraints field of intermediary certificates. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-111893041

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-20
Improper Input Validation
CVE-2019-7292
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.63% / 69.31%
||
7 Day CHG~0.00%
Published-18 Dec, 2019 | 17:33
Updated-04 Aug, 2024 | 20:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A validation issue was addressed with improved logic. This issue is fixed in iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may result in the disclosure of process memory.

Action-Not Available
Vendor-Apple Inc.
Product-itunesiphone_oswatchostvossafariicloudiTunes for WindowswatchOSSafariiCloud for WindowsiOStvOS
CWE ID-CWE-20
Improper Input Validation
CVE-2019-7843
Matching Score-4
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-4
Assigner-Adobe Systems Incorporated
CVSS Score-7.5||HIGH
EPSS-4.46% / 88.65%
||
7 Day CHG~0.00%
Published-18 Jul, 2019 | 21:46
Updated-04 Aug, 2024 | 21:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Adobe Campaign Classic version 18.10.5-8984 and earlier versions have an Insufficient input validation vulnerability. Successful exploitation could lead to Information Disclosure in the context of the current user.

Action-Not Available
Vendor-n/aAdobe Inc.Linux Kernel Organization, IncMicrosoft Corporation
Product-windowscampaignlinux_kernelAdobe Campaign
CWE ID-CWE-20
Improper Input Validation
CVE-2014-1369
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.54% / 66.69%
||
7 Day CHG~0.00%
Published-01 Jul, 2014 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

WebKit in Apple Safari before 6.1.5 and 7.x before 7.0.5 allows user-assisted remote attackers to access file: URLs by leveraging a URL drag operation that originates at a crafted web site.

Action-Not Available
Vendor-n/aApple Inc.
Product-safarin/a
CWE ID-CWE-20
Improper Input Validation
CVE-2024-4321
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
ShareView Details
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
CVSS Score-7.5||HIGH
EPSS-0.21% / 43.43%
||
7 Day CHG~0.00%
Published-16 May, 2024 | 09:03
Updated-10 Jul, 2025 | 16:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Local File Inclusion (LFI) in gaizhenbiao/chuanhuchatgpt

A Local File Inclusion (LFI) vulnerability exists in the gaizhenbiao/chuanhuchatgpt application, specifically within the functionality for uploading chat history. The vulnerability arises due to improper input validation when handling file paths during the chat history upload process. An attacker can exploit this vulnerability by intercepting requests and manipulating the 'name' parameter to specify arbitrary file paths. This allows the attacker to read sensitive files on the server, leading to information leakage, including API keys and private information. The issue affects version 20240310 of the application.

Action-Not Available
Vendor-gaizhenbiaogaizhenbiaochuanhuchatgpt_project
Product-chuanhuchatgptgaizhenbiao/chuanhuchatgptchuanhuchatgpt
CWE ID-CWE-20
Improper Input Validation
CVE-2013-3159
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-4.3||MEDIUM
EPSS-25.44% / 96.00%
||
7 Day CHG~0.00%
Published-11 Sep, 2013 | 10:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Microsoft Excel 2003 SP3, 2007 SP3, and 2010 SP1 and SP2; Excel Viewer; and Microsoft Office Compatibility Pack SP3 allow remote attackers to read arbitrary files via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue, aka "XML External Entities Resolution Vulnerability."

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-exceln/a
CWE ID-CWE-20
Improper Input Validation
CVE-2016-8785
Matching Score-4
Assigner-Huawei Technologies
ShareView Details
Matching Score-4
Assigner-Huawei Technologies
CVSS Score-4.3||MEDIUM
EPSS-0.10% / 28.82%
||
7 Day CHG~0.00%
Published-09 Mar, 2018 | 21:00
Updated-06 Aug, 2024 | 02:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Huawei S12700 V200R007C00, V200R008C00, S5700 V200R007C00, S7700 V200R002C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, S9700 V200R007C00 have an input validation vulnerability. Due to the lack of input validation, an attacker may craft a malformed packet and send it to the device using VRP, causing the device to display additional memory data and possibly leading to sensitive information leakage.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-s12700s5700_firmwares9700s12700_firmwares9700_firmwares7700_firmwares5700s7700S12700, S5700, S7700, S9700
CWE ID-CWE-20
Improper Input Validation
CVE-2020-6399
Matching Score-4
Assigner-Chrome
ShareView Details
Matching Score-4
Assigner-Chrome
CVSS Score-6.5||MEDIUM
EPSS-1.09% / 77.02%
||
7 Day CHG~0.00%
Published-11 Feb, 2020 | 14:42
Updated-04 Aug, 2024 | 09:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient policy enforcement in AppCache in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to leak cross-origin data via a crafted HTML page.

Action-Not Available
Vendor-openSUSEGoogle LLC
Product-chromebackports_sleChrome
CWE ID-CWE-20
Improper Input Validation
CVE-2017-11177
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.25% / 48.30%
||
7 Day CHG~0.00%
Published-06 Nov, 2017 | 17:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

TRITON AP-EMAIL 8.2 before 8.2 IB does not properly restrict file access in an unspecified directory.

Action-Not Available
Vendor-websensen/a
Product-triton_ap_emailn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2016-9201
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-1.25% / 78.53%
||
7 Day CHG~0.00%
Published-14 Dec, 2016 | 00:37
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the Zone-Based Firewall feature of Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to pass traffic that should otherwise have been dropped based on the configuration. More Information: CSCuz21015. Known Affected Releases: 15.3(3)M3. Known Fixed Releases: 15.6(2)T0.1 15.6(2.0.1a)T0 15.6(2.19)T 15.6(3)M.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-iosCisco IOS and Cisco IOS XE
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2018-1000815
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.31% / 53.46%
||
7 Day CHG~0.00%
Published-20 Dec, 2018 | 15:00
Updated-16 Sep, 2024 | 23:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Brave Software Inc. Brave version version 0.22.810 to 0.24.0 contains a Other/Unknown vulnerability in function ContentSettingsObserver::AllowScript() in content_settings_observer.cc that can result in Websites can run inline JavaScript even if script is blocked, making attackers easier to track users. This attack appear to be exploitable via the victim must visit a specially crafted website. This vulnerability appears to have been fixed in 0.25.2.

Action-Not Available
Vendor-braven/a
Product-braven/a
CWE ID-CWE-20
Improper Input Validation
CVE-2017-6652
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-3.01% / 86.08%
||
7 Day CHG~0.00%
Published-18 May, 2017 | 19:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the web framework of the Cisco TelePresence IX5000 Series could allow an unauthenticated, remote attacker to access arbitrary files on an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by using directory traversal techniques to read files within the Cisco TelePresence IX5000 Series filesystem. This vulnerability affects Cisco TelePresence IX5000 Series devices running software version 8.2.0. Cisco Bug IDs: CSCvc52325.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-telepresence_ix5000Cisco TelePresence IX5000 Series
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
  • Previous
  • 1
  • 2
  • 3
  • 4
  • Next
Details not found