{"api_version":"1","generated_at":"2026-04-23T02:11:32+00:00","cve":"CVE-2016-8024","urls":{"html":"https://cve.report/CVE-2016-8024","api":"https://cve.report/api/cve/CVE-2016-8024.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2016-8024","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2016-8024"},"summary":{"title":"CVE-2016-8024","description":"Improper neutralization of CRLF sequences in HTTP headers vulnerability in Intel Security VirusScan Enterprise Linux (VSEL) 2.0.3 (and earlier) allows remote unauthenticated attacker to obtain sensitive information via the server HTTP response spoofing.","state":"PUBLIC","assigner":"secure@intel.com","published_at":"2017-03-14 22:59:00","updated_at":"2017-09-03 01:29:00"},"problem_types":["CWE-113"],"metrics":[],"references":[{"url":"https://www.exploit-db.com/exploits/40911/","name":"40911","refsource":"EXPLOIT-DB","tags":[],"title":"Exploit – Page 40911 – Exploits Database","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10181","name":"https://kc.mcafee.com/corporate/index?page=content&id=SB10181","refsource":"CONFIRM","tags":["Vendor Advisory"],"title":"McAfee Corporate KB - Intel Security - Security Bulletin: VirusScan Enterprise for Linux/LinuxShield update fixes multiple vulnerabilities (CVE-2016-8016, CVE-2016-8017, CVE-2016-8018, CVE-2016-8019, CVE-2016-8020, CVE-2016-8021, CVE-2016-8022, CVE-2016-8023, CVE-2016-8024, CVE-2016-8025) SB10181","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/94823","name":"94823","refsource":"BID","tags":[],"title":"McAfee VirusScan Enterprise Multiple Security Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://www.securitytracker.com/id/1037433","name":"1037433","refsource":"SECTRACK","tags":[],"title":"McAfee VirusScan Enterprise for Linux Multiple Bugs Let Remote Users Deny Service, Execute Arbitrary Code, and Obtain Potentially Sensitive Information - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2016-8024","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-8024","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2016","cve_id":"8024","vulnerable":"1","versionEndIncluding":"2.0.3","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mcafee","cpe5":"virusscan_enterprise","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"linux","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"secure@intel.com","ID":"CVE-2016-8024","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"VirusScan Enterprise Linux (VSEL)","version":{"version_data":[{"version_value":"2.0.3 (and earlier)"}]}}]},"vendor_name":"Intel"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Improper neutralization of CRLF sequences in HTTP headers vulnerability in Intel Security VirusScan Enterprise Linux (VSEL) 2.0.3 (and earlier) allows remote unauthenticated attacker to obtain sensitive information via the server HTTP response spoofing."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Improper neutralization of CRLF sequences in HTTP headers vulnerability"}]}]},"references":{"reference_data":[{"name":"94823","refsource":"BID","url":"http://www.securityfocus.com/bid/94823"},{"name":"1037433","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1037433"},{"name":"https://kc.mcafee.com/corporate/index?page=content&id=SB10181","refsource":"CONFIRM","url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10181"},{"name":"40911","refsource":"EXPLOIT-DB","url":"https://www.exploit-db.com/exploits/40911/"}]}},"nvd":{"publishedDate":"2017-03-14 22:59:00","lastModifiedDate":"2017-09-03 01:29:00","problem_types":["CWE-113"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH"},"exploitabilityScore":2.2,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":6.8},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mcafee:virusscan_enterprise:*:*:*:*:*:linux:*:*","versionEndIncluding":"2.0.3","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2016","CveId":"8024","Ordinal":"94638","Title":"CVE-2016-8024","CVE":"CVE-2016-8024","Year":"2016"},"notes":[{"CveYear":"2016","CveId":"8024","Ordinal":"1","NoteData":"Improper neutralization of CRLF sequences in HTTP headers vulnerability in Intel Security VirusScan Enterprise Linux (VSEL) 2.0.3 (and earlier) allows remote unauthenticated attacker to obtain sensitive information via the server HTTP response spoofing.","Type":"Description","Title":null},{"CveYear":"2016","CveId":"8024","Ordinal":"2","NoteData":"2017-03-14","Type":"Other","Title":"Published"},{"CveYear":"2016","CveId":"8024","Ordinal":"3","NoteData":"2017-09-02","Type":"Other","Title":"Modified"}]}}}