icon

We found results for “

CVE-2016-4993

Severity Score

Weakness Type (CWE)

Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')

CWE-113

Improper Neutralization of CRLF Sequences ('CRLF Injection')

CWE-93

Top Fix

icon

Upgrade Version

Upgrade to version io.fabric8.quickstarts:spring-boot-camel-rest-3scale:no_fix;io.undertow:undertow-core:2.0.30.Final;io.undertow:undertow-core:2.0.31.Final;io.undertow:undertow-core:1.3.28.Final;io.undertow:undertow-core:2.0.29.Final;io.undertow:undertow-core:1.4.19.Final;io.undertow:undertow-core:2.1.4.Final;io.undertow:undertow-core:2.0.23.Final;io.undertow:undertow-core:1.4.12.Final;io.undertow:undertow-core:2.2.10.Final;io.undertow:undertow-core:1.3.22.Final;io.undertow:undertow-core:2.0.39.Final;io.undertow:undertow-core:2.2.4.Final;io.undertow:undertow-core:1.3.5.Final;io.undertow:undertow-core:2.2.6.Final;io.undertow:undertow-core:2.0.24.Final;io.undertow:undertow-core:2.0.21.Final;io.undertow:undertow-core:2.0.10.Final;io.undertow:undertow-core:2.0.42.Final;io.undertow:undertow-core:2.0.20.Final;io.undertow:undertow-core:2.0.40.Final;io.undertow:undertow-core:2.0.33.Final;io.undertow:undertow-core:1.3.24.Final;io.undertow:undertow-core:2.2.16.Final;io.undertow:undertow-core:2.0.36.Final;io.undertow:undertow-core:2.0.27.Final;io.undertow:undertow-core:2.2.1.Final;io.undertow:undertow-core:2.0.14.Final;io.undertow:undertow-core:2.0.22.Final;io.undertow:undertow-core:1.3.29.Final;io.undertow:undertow-core:1.3.32.Final;io.undertow:undertow-core:2.0.1.Final;io.undertow:undertow-core:2.2.13.Final;io.undertow:undertow-core:1.3.8.Final;io.undertow:undertow-core:2.0.32.Final;io.undertow:undertow-core:2.0.34.Final;io.undertow:undertow-core:2.0.16.Final;io.undertow:undertow-core:2.0.26.Final;io.undertow:undertow-core:2.2.14.Final;io.undertow:undertow-core:2.2.17.Final;io.undertow:undertow-core:2.0.35.Final;io.undertow:undertow-core:1.4.17.Final;io.undertow:undertow-core:2.0.29.Final;io.undertow:undertow-core:1.3.25.Final;io.undertow:undertow-core:1.3.26.Final;io.fabric8.quickstarts:spring-boot-camel-amq:no_fix;com.redhat.fuse.boosters.tracing:greetings-service:no_fix;org.jboss.redhat-fuse.apicurio:fuse-apicurito-generator:no_fix;io.syndesis.server:server-runtime:1.13.1;io.fabric8.quickstarts:spring-boot-camel-soap-rest-bridge:no_fix;io.fabric8.quickstarts:spring-boot-camel-soap-rest-bridge:no_fix;org.jboss.eap:wildfly-client-all:no_fix;org.jboss.eap:wildfly-client-all:no_fix;org.jboss.eap:wildfly-client-all:no_fix;org.jboss.eap:wildfly-client-all:no_fix;io.fabric8.quickstarts:spring-boot-camel-rhosak:no_fix;io.fabric8.quickstarts:spring-boot-camel-rhosak:no_fix;io.fabric8.quickstarts:spring-boot-camel-drools:no_fix;io.fabric8.quickstarts:spring-boot-camel-drools:no_fix;io.syndesis.meta:meta:1.13.1;io.syndesis.meta:meta:1.13.1;io.fabric8.quickstarts.cxf.jaxrs:spring-boot-cxf-jaxrs:no_fix;com.redhat.fuse.boosters:fuse-rest-http-booster:no_fix;com.redhat.fuse.boosters:name-service:no_fix;io.fabric8.quickstarts.cxf.jaxws:spring-boot-cxf-jaxws-xml:no_fix;io.fabric8.quickstarts.cxf.jaxrs:spring-boot-cxf-jaxrs-xml:no_fix;io.fabric8.quickstarts:spring-boot-camel-config:no_fix;io.fabric8.quickstarts:spring-boot-camel-config:no_fix;io.fabric8.quickstarts.cxf.jaxws:spring-boot-cxf-jaxws:no_fix;io.fabric8.quickstarts:spring-boot-camel:no_fix;com.redhat.fuse.boosters:fuse-health-check-booster:no_fix;com.redhat.fuse.boosters:fuse-configmap-booster:no_fix;com.redhat.fuse.boosters:greetings-service:no_fix;org.amqphub.jca:resource-adapter-thorntail-example:no_fix;io.fabric8.quickstarts:spring-boot-camel-rest-sql:no_fix;com.redhat.fuse.boosters.tracing:name-service:no_fix;com.redhat.fuse.quickstarts:spring-boot-camel-xa:no_fix;io.fabric8.quickstarts:spring-boot-camel-xml:no_fix;io.fabric8.quickstarts:spring-boot-camel-infinispan:no_fix

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): REQUIRED
Scope (S): CHANGED
Confidentiality (C): LOW
Integrity (I): LOW
Availability (A): NONE

CVSS v2

Base Score:
Access Vector (AV): NETWORK
Access Complexity (AC): MEDIUM
Authentication (AU): NONE
Confidentiality (C): NONE
Integrity (I): PARTIAL
Availability (A): NONE
Additional information:

Do you need more information?

Contact Us