Vulnerability Details CVE-2021-31923
Ping Identity PingAccess before 5.3.3 allows HTTP request smuggling via header manipulation.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 44.8%
CVSS Severity
CVSS v3 Score 5.3
CVSS v2 Score 5.0
Products affected by CVE-2021-31923
-
cpe:2.3:a:pingidentity:pingaccess:1.0
-
cpe:2.3:a:pingidentity:pingaccess:1.1
-
cpe:2.3:a:pingidentity:pingaccess:1.2
-
cpe:2.3:a:pingidentity:pingaccess:1.3
-
cpe:2.3:a:pingidentity:pingaccess:1.3.2
-
cpe:2.3:a:pingidentity:pingaccess:2.0
-
cpe:2.3:a:pingidentity:pingaccess:2.0.1
-
cpe:2.3:a:pingidentity:pingaccess:2.1
-
cpe:2.3:a:pingidentity:pingaccess:2.1.1
-
cpe:2.3:a:pingidentity:pingaccess:2.1.2
-
cpe:2.3:a:pingidentity:pingaccess:2.1.3
-
cpe:2.3:a:pingidentity:pingaccess:2.1.4
-
cpe:2.3:a:pingidentity:pingaccess:3.0
-
cpe:2.3:a:pingidentity:pingaccess:3.0.1
-
cpe:2.3:a:pingidentity:pingaccess:3.0.2
-
cpe:2.3:a:pingidentity:pingaccess:3.0.3
-
cpe:2.3:a:pingidentity:pingaccess:3.1
-
cpe:2.3:a:pingidentity:pingaccess:3.2
-
cpe:2.3:a:pingidentity:pingaccess:3.2.1
-
cpe:2.3:a:pingidentity:pingaccess:3.2.2
-
cpe:2.3:a:pingidentity:pingaccess:3.2.4
-
cpe:2.3:a:pingidentity:pingaccess:3.2.5
-
cpe:2.3:a:pingidentity:pingaccess:3.2.6
-
cpe:2.3:a:pingidentity:pingaccess:3.4.3
-
cpe:2.3:a:pingidentity:pingaccess:4.0
-
cpe:2.3:a:pingidentity:pingaccess:4.0.1
-
cpe:2.3:a:pingidentity:pingaccess:4.0.2
-
cpe:2.3:a:pingidentity:pingaccess:4.0.3
-
cpe:2.3:a:pingidentity:pingaccess:4.0.4
-
cpe:2.3:a:pingidentity:pingaccess:4.0.5
-
cpe:2.3:a:pingidentity:pingaccess:4.0.6
-
cpe:2.3:a:pingidentity:pingaccess:4.1
-
cpe:2.3:a:pingidentity:pingaccess:4.1.1
-
cpe:2.3:a:pingidentity:pingaccess:4.1.2
-
cpe:2.3:a:pingidentity:pingaccess:4.1.3
-
cpe:2.3:a:pingidentity:pingaccess:4.1.4
-
cpe:2.3:a:pingidentity:pingaccess:4.1.5
-
cpe:2.3:a:pingidentity:pingaccess:4.2
-
cpe:2.3:a:pingidentity:pingaccess:4.2.1
-
cpe:2.3:a:pingidentity:pingaccess:4.2.2
-
cpe:2.3:a:pingidentity:pingaccess:4.2.3
-
cpe:2.3:a:pingidentity:pingaccess:4.2.4
-
cpe:2.3:a:pingidentity:pingaccess:4.2.5
-
cpe:2.3:a:pingidentity:pingaccess:4.3
-
cpe:2.3:a:pingidentity:pingaccess:4.3.1
-
cpe:2.3:a:pingidentity:pingaccess:4.3.2
-
cpe:2.3:a:pingidentity:pingaccess:4.3.3
-
cpe:2.3:a:pingidentity:pingaccess:4.3.4
-
cpe:2.3:a:pingidentity:pingaccess:4.3.5
-
cpe:2.3:a:pingidentity:pingaccess:4.3.6
-
cpe:2.3:a:pingidentity:pingaccess:4.3.7
-
cpe:2.3:a:pingidentity:pingaccess:5.0
-
cpe:2.3:a:pingidentity:pingaccess:5.0.1
-
cpe:2.3:a:pingidentity:pingaccess:5.0.2
-
cpe:2.3:a:pingidentity:pingaccess:5.0.3
-
cpe:2.3:a:pingidentity:pingaccess:5.0.4
-
cpe:2.3:a:pingidentity:pingaccess:5.0.5
-
cpe:2.3:a:pingidentity:pingaccess:5.0.6
-
cpe:2.3:a:pingidentity:pingaccess:5.0.7
-
cpe:2.3:a:pingidentity:pingaccess:5.0.8
-
cpe:2.3:a:pingidentity:pingaccess:5.1
-
cpe:2.3:a:pingidentity:pingaccess:5.1.1
-
cpe:2.3:a:pingidentity:pingaccess:5.1.2
-
cpe:2.3:a:pingidentity:pingaccess:5.1.3
-
cpe:2.3:a:pingidentity:pingaccess:5.1.4
-
cpe:2.3:a:pingidentity:pingaccess:5.1.5
-
cpe:2.3:a:pingidentity:pingaccess:5.2
-
cpe:2.3:a:pingidentity:pingaccess:5.2.1
-
cpe:2.3:a:pingidentity:pingaccess:5.2.2
-
cpe:2.3:a:pingidentity:pingaccess:5.2.3
-
cpe:2.3:a:pingidentity:pingaccess:5.2.4
-
cpe:2.3:a:pingidentity:pingaccess:5.2.5
-
cpe:2.3:a:pingidentity:pingaccess:5.3
-
cpe:2.3:a:pingidentity:pingaccess:5.3.1
-
cpe:2.3:a:pingidentity:pingaccess:5.3.2