Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Shellinabox
(Shellinabox_project)Repositories | https://github.com/shellinabox/shellinabox |
#Vulnerabilities | 2 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2019-03-21 | CVE-2018-16789 | libhttp/url.c in shellinabox through 2.20 has an implementation flaw in the HTTP request parsing logic. By sending a crafted multipart/form-data HTTP request, an attacker could exploit this to force shellinaboxd into an infinite loop, exhausting available CPU resources and taking the service down. | Shellinabox | 7.5 | ||
2016-01-12 | CVE-2015-8400 | The HTTPS fallback implementation in Shell In A Box (aka shellinabox) before 2.19 makes it easier for remote attackers to conduct DNS rebinding attacks via the "/plain" URL. | Fedora, Shellinabox | 7.4 |