Lucene search

K

CVE-2021-21409

🗓️ 30 Mar 2021 15:14:15Reported by Debian Security Bug TrackerType 
debiancve
 debiancve
🔗 security-tracker.debian.org👁 28 Views

Vulnerability in Netty before version 4.1.61.Final enables request smuggling due to improper validation of content-length header in Http2HeaderFrame. Risk of request smuggling if translated to HTTP/1.1. Followup of CVE-2021-21295. Fixed in 4.1.61.Final.

Show more
Related
Packages
ReporterTitlePublishedViews
Family
Cvelist
CVE-2021-21409 Possible request smuggling in HTTP/2 due missing validation of content-length
30 Mar 202115:05
cvelist
Cvelist
CVE-2021-21295 Possible request smuggling in HTTP/2 due missing validation
9 Mar 202118:35
cvelist
Cvelist
CVE-2022-0552
11 Apr 202219:38
cvelist
Prion
Design/Logic Flaw
30 Mar 202115:15
prion
Prion
Design/Logic Flaw
9 Mar 202119:15
prion
Prion
Design/Logic Flaw
11 Apr 202220:15
prion
OSV
Possible request smuggling in HTTP/2 due missing validation
9 Mar 202118:49
osv
OSV
CVE-2021-21295
9 Mar 202119:15
osv
OSV
Possible request smuggling in HTTP/2 due missing validation of content-length
30 Mar 202115:10
osv
OSV
BIT-zookeeper-2021-21295
6 Mar 202411:09
osv
Rows per page
OSOS VersionArchitecturePackagePackage VersionFilename
Debian12allnetty1:4.1.48-4netty_1:4.1.48-4_all.deb
Debian11allnetty1:4.1.48-4netty_1:4.1.48-4_all.deb
Debian999allnetty1:4.1.48-4netty_1:4.1.48-4_all.deb
Debian13allnetty1:4.1.48-4netty_1:4.1.48-4_all.deb

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
30 Mar 2021 15:15Current
6.8Medium risk
Vulners AI Score6.8
EPSS0.162
28
.json
Report