Show filters
31 Total Results
Displaying 11-20 of 31
Sort by:
Attacker Value
Unknown
CVE-2019-5096
Disclosure Date: December 03, 2019 (last updated November 27, 2024)
An exploitable code execution vulnerability exists in the processing of multi-part/form-data requests within the base GoAhead web server application in versions v5.0.1, v.4.1.1 and v3.6.5. A specially crafted HTTP request can lead to a use-after-free condition during the processing of this request that can be used to corrupt heap structures that could lead to full code execution. The request can be unauthenticated in the form of GET or POST requests, and does not require the requested resource to exist on the server.
0
Attacker Value
Unknown
CVE-2019-19240
Disclosure Date: November 22, 2019 (last updated November 27, 2024)
Embedthis GoAhead before 5.0.1 mishandles redirected HTTP requests with a large Host header. The GoAhead WebsRedirect uses a static host buffer that has a limited length and can overflow. This can cause a copy of the Host header to fail, leaving that buffer uninitialized, which may leak uninitialized data in a response.
0
Attacker Value
Unknown
CVE-2019-16645
Disclosure Date: September 20, 2019 (last updated November 27, 2024)
An issue was discovered in Embedthis GoAhead 2.5.0. Certain pages (such as goform/login and config/log_off_page.htm) create links containing a hostname obtained from an arbitrary HTTP Host header sent by an attacker. This could potentially be used in a phishing attack.
0
Attacker Value
Unknown
CVE-2019-12822
Disclosure Date: June 14, 2019 (last updated November 27, 2024)
In http.c in Embedthis GoAhead before 4.1.1 and 5.x before 5.0.1, a header parsing vulnerability causes a memory assertion, out-of-bounds memory reference, and potential DoS, as demonstrated by a colon on a line by itself.
0
Attacker Value
Unknown
CVE-2018-15504
Disclosure Date: August 18, 2018 (last updated November 27, 2024)
An issue was discovered in Embedthis GoAhead before 4.0.1 and Appweb before 7.0.2. The server mishandles some HTTP request fields associated with time, which results in a NULL pointer dereference, as demonstrated by If-Modified-Since or If-Unmodified-Since with a month greater than 11.
0
Attacker Value
Unknown
CVE-2018-15505
Disclosure Date: August 18, 2018 (last updated November 27, 2024)
An issue was discovered in Embedthis GoAhead before 4.0.1 and Appweb before 7.0.2. An HTTP POST request with a specially crafted "Host" header field may cause a NULL pointer dereference and thus cause a denial of service, as demonstrated by the lack of a trailing ']' character in an IPv6 address.
0
Attacker Value
Unknown
CVE-2018-8715
Disclosure Date: March 15, 2018 (last updated November 26, 2024)
The Embedthis HTTP library, and Appweb versions before 7.0.3, have a logic flaw related to the authCondition function in http/httpLib.c. With a forged HTTP request, it is possible to bypass authentication for the form and digest login types.
0
Attacker Value
Unknown
CVE-2017-1000471
Disclosure Date: January 03, 2018 (last updated November 26, 2024)
EmbedThis GoAhead Webserver version 4.0.0 is vulnerable to a NULL pointer dereference in the CGI handler resulting in memory corruption or denial of service.
0
Attacker Value
Unknown
CVE-2017-1000470
Disclosure Date: January 03, 2018 (last updated November 26, 2024)
EmbedThis GoAhead Webserver versions 4.0.0 and earlier is vulnerable to an integer overflow in the HTTP listener resulting in denial of service.
0
Attacker Value
Unknown
CVE-2017-17562
Disclosure Date: December 12, 2017 (last updated July 25, 2024)
Embedthis GoAhead before 3.6.5 allows remote code execution if CGI is enabled and a CGI program is dynamically linked. This is a result of initializing the environment of forked CGI scripts using untrusted HTTP request parameters in the cgiHandler function in cgi.c. When combined with the glibc dynamic linker, this behaviour can be abused for remote code execution using special parameter names such as LD_PRELOAD. An attacker can POST their shared object payload in the body of the request, and reference it using /proc/self/fd/0.
0