Search Results (Refine Search)
- Results Type: Overview
- Keyword (text search): cpe:2.3:a:netty:netty:4.1.84:*:*:*:*:*:*:*
- CPE Name Search: true
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2022-41915 |
Netty project is an event-driven asynchronous network application framework. Starting in version 4.1.83.Final and prior to 4.1.86.Final, when calling `DefaultHttpHeadesr.set` with an _iterator_ of values, header value validation was not performed, allowing malicious header values in the iterator to perform HTTP Response Splitting. This issue has been patched in version 4.1.86.Final. Integrators can work around the issue by changing the `DefaultHttpHeaders.set(CharSequence, Iterator<?>)` call, into a `remove()` call, and call `add()` in a loop over the iterator of values. Published: December 13, 2022; 2:15:13 AM -0500 |
V3.1: 6.5 MEDIUM V2.0:(not available) |
CVE-2022-41881 |
Netty project is an event-driven asynchronous network application framework. In versions prior to 4.1.86.Final, a StackOverflowError can be raised when parsing a malformed crafted message due to an infinite recursion. This issue is patched in version 4.1.86.Final. There is no workaround, except using a custom HaProxyMessageDecoder. Published: December 12, 2022; 1:15:12 PM -0500 |
V3.1: 7.5 HIGH V2.0:(not available) |