vendor:
NX5Linkx
by:
SecurityFocus
7.5
CVSS
HIGH
HTTP Response-Splitting
113
CWE
Product Name: NX5Linkx
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: N/A
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2002
NX5Linkx HTTP Response-Splitting Vulnerability
NX5Linkx is prone to an HTTP response-splitting vulnerability because the application fails to properly sanitize user-supplied input. A remote attacker may exploit this vulnerability to influence or misrepresent how web content is served, cached, or interpreted. This could aid in various attacks that attempt to entice client users into a false sense of trust.
Mitigation:
Input validation should be used to ensure that user-supplied data does not contain malicious content.