Show filters
77 Total Results
Displaying 21-30 of 77
Sort by:
Attacker Value
Unknown
CVE-2021-22293
Disclosure Date: February 06, 2021 (last updated February 22, 2025)
Some Huawei products have an inconsistent interpretation of HTTP requests vulnerability. Attackers can exploit this vulnerability to cause information leak. Affected product versions include: CampusInsight versions V100R019C10; ManageOne versions 6.5.1.1, 6.5.1.SPC100, 6.5.1.SPC200, 6.5.1RC1, 6.5.1RC2, 8.0.RC2. Affected product versions include: Taurus-AL00A versions 10.0.0.1(C00E1R1P1).
0
Attacker Value
Unknown
CVE-2021-25762
Disclosure Date: February 03, 2021 (last updated February 22, 2025)
In JetBrains Ktor before 1.4.3, HTTP Request Smuggling was possible.
0
Attacker Value
Unknown
CVE-2020-28483
Disclosure Date: January 20, 2021 (last updated February 22, 2025)
This affects all versions of package github.com/gin-gonic/gin. When gin is exposed directly to the internet, a client's IP can be spoofed by setting the X-Forwarded-For header.
0
Attacker Value
Unknown
CVE-2020-28473
Disclosure Date: January 18, 2021 (last updated February 22, 2025)
The package bottle from 0 and before 0.12.19 are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter.
0
Attacker Value
Unknown
CVE-2021-21445
Disclosure Date: January 12, 2021 (last updated February 22, 2025)
SAP Commerce Cloud, versions - 1808, 1811, 1905, 2005, 2011, allows an authenticated attacker to include invalidated data in the HTTP response Content Type header, due to improper input validation, and sent to a Web user. A successful exploitation of this vulnerability may lead to advanced attacks, including cross-site scripting and page hijacking.
0
Attacker Value
Unknown
CVE-2020-17509
Disclosure Date: January 11, 2021 (last updated February 22, 2025)
ATS negative cache option is vulnerable to a cache poisoning attack. If you have this option enabled, please upgrade or disable this feature. Apache Traffic Server versions 7.0.0 to 7.1.11 and 8.0.0 to 8.1.0 are affected.
0
Attacker Value
Unknown
CVE-2020-8287
Disclosure Date: January 06, 2021 (last updated February 22, 2025)
Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 allow two copies of a header field in an HTTP request (for example, two Transfer-Encoding header fields). In this case, Node.js identifies the first header field and ignores the second. This can lead to HTTP Request Smuggling.
0
Attacker Value
Unknown
CVE-2020-35863
Disclosure Date: December 31, 2020 (last updated February 22, 2025)
An issue was discovered in the hyper crate before 0.12.34 for Rust. HTTP request smuggling can occur. Remote code execution can occur in certain situations with an HTTP server on the loopback interface.
0
Attacker Value
Unknown
CVE-2020-35884
Disclosure Date: December 31, 2020 (last updated February 22, 2025)
An issue was discovered in the tiny_http crate through 2020-06-16 for Rust. HTTP Request smuggling can occur via a malformed Transfer-Encoding header.
0
Attacker Value
Unknown
CVE-2020-26281
Disclosure Date: December 21, 2020 (last updated February 22, 2025)
async-h1 is an asynchronous HTTP/1.1 parser for Rust (crates.io). There is a request smuggling vulnerability in async-h1 before version 2.3.0. This vulnerability affects any webserver that uses async-h1 behind a reverse proxy, including all such Tide applications. If the server does not read the body of a request which is longer than some buffer length, async-h1 will attempt to read a subsequent request from the body content starting at that offset into the body. One way to exploit this vulnerability would be for an adversary to craft a request such that the body contains a request that would not be noticed by a reverse proxy, allowing it to forge forwarded/x-forwarded headers. If an application trusted the authenticity of these headers, it could be misled by the smuggled request. Another potential concern with this vulnerability is that if a reverse proxy is sending multiple http clients' requests along the same keep-alive connection, it would be possible for the smuggled request to …
0