cvelist/2020/35xxx/CVE-2020-35863.json

62 lines
1.8 KiB
JSON
Raw Normal View History

2020-12-31 09:02:20 +00:00
{
"CVE_data_meta": {
2020-12-31 09:02:58 +00:00
"ASSIGNER": "cve@mitre.org",
2020-12-31 10:01:40 +00:00
"ID": "CVE-2020-35863",
"STATE": "PUBLIC"
2020-12-31 09:02:20 +00:00
},
2020-12-31 10:01:40 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2020-12-31 09:02:20 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2020-12-31 10:01:40 +00:00
"value": "An issue was discovered in the hyper crate before 0.12.34 for Rust. HTTP request smuggling can occur. Remote code execution can occur in certain situations with an HTTP server on the loopback interface."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0008.html",
"refsource": "MISC",
"name": "https://rustsec.org/advisories/RUSTSEC-2020-0008.html"
2020-12-31 09:02:20 +00:00
}
]
}
}