Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2016-5699
Description:CRLF injection vulnerability in the HTTPConnection.putheader function in urllib2 and urllib in CPython (aka Python) before 2.7.10 and 3.x before 3.4.4 allows remote attackers to inject arbitrary HTTP headers via CRLF sequences in a URL.
Test IDs: 1.3.6.1.4.1.25623.1.0.809219   1.3.6.1.4.1.25623.1.0.118224   1.3.6.1.4.1.25623.1.1.1.2.2016.522   1.3.6.1.4.1.25623.1.0.118222   1.3.6.1.4.1.25623.1.0.809218   1.3.6.1.4.1.25623.1.0.891663   1.3.6.1.4.1.25623.1.0.118223  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2016-5699
91226
http://www.securityfocus.com/bid/91226
RHSA-2016:1626
http://rhn.redhat.com/errata/RHSA-2016-1626.html
RHSA-2016:1627
http://rhn.redhat.com/errata/RHSA-2016-1627.html
RHSA-2016:1628
http://rhn.redhat.com/errata/RHSA-2016-1628.html
RHSA-2016:1629
http://rhn.redhat.com/errata/RHSA-2016-1629.html
RHSA-2016:1630
http://rhn.redhat.com/errata/RHSA-2016-1630.html
[debian-lts-announce] 20190207 [SECURITY] [DLA 1663-1] python3.4 security update
https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html
[oss-security] 20160614 CVE request: Python HTTP header injection in urrlib2/urllib/httplib/http.client
http://www.openwall.com/lists/oss-security/2016/06/14/7
[oss-security] 20160615 Re: CVE request: Python HTTP header injection in urrlib2/urllib/httplib/http.client
http://www.openwall.com/lists/oss-security/2016/06/15/12
[oss-security] 20160616 Re: CVE request: Python HTTP header injection in urrlib2/urllib/httplib/http.client
http://www.openwall.com/lists/oss-security/2016/06/16/2
http://blog.blindspotsecurity.com/2016/06/advisory-http-header-injection-in.html
http://blog.blindspotsecurity.com/2016/06/advisory-http-header-injection-in.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
http://www.splunk.com/view/SP-CAAAPUE
https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-4
https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-4
https://hg.python.org/cpython/raw-file/v2.7.10/Misc/NEWS
https://hg.python.org/cpython/raw-file/v2.7.10/Misc/NEWS
https://hg.python.org/cpython/rev/1c45047c5102
https://hg.python.org/cpython/rev/1c45047c5102
https://hg.python.org/cpython/rev/bf3e1c9b80e9
https://hg.python.org/cpython/rev/bf3e1c9b80e9
openSUSE-SU-2020:0086
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html




© 1998-2025 E-Soft Inc. All rights reserved.