Flaw in hyper's HTTP/1 server code parsing `Content-Length` prefixed with plus sign can lead to desync attacks
Reporter | Title | Published | Views | Family All 14 |
---|---|---|---|---|
![]() | CVE-2021-32715 | 7 Jul 202100:00 | – | ubuntucve |
![]() | CVE-2021-32715 | 7 Jul 202120:15 | – | nvd |
![]() | Lenient `hyper` header parsing of `Content-Length` could allow request smuggling | 7 Jul 202112:00 | – | rustsec |
![]() | RUSTSEC-2021-0078 Lenient `hyper` header parsing of `Content-Length` could allow request smuggling | 7 Jul 202112:00 | – | osv |
![]() | UBUNTU-CVE-2021-32715 | 7 Jul 202120:15 | – | osv |
![]() | CVE-2021-32715 | 7 Jul 202120:15 | – | osv |
![]() | GHSA-F3PG-QWVG-P99C Lenient Parsing of Content-Length Header When Prefixed with Plus Sign | 12 Jul 202116:54 | – | osv |
![]() | OPENSUSE-SU-2024:11751-1 afterburn-5.0.0-6.1 on GA media | 15 Jun 202400:00 | – | osv |
![]() | CVE-2021-32715 | 20 May 202223:02 | – | redhatcve |
![]() | Design/Logic Flaw | 7 Jul 202120:15 | – | prion |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo