Show filters
871 Total Results
Displaying 161-170 of 871
Sort by:
Attacker Value
Unknown
CVE-2022-36901
Disclosure Date: July 27, 2022 (last updated February 24, 2025)
Jenkins HTTP Request Plugin 1.15 and earlier stores HTTP Request passwords unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.
0
Attacker Value
Unknown
CVE-2022-32213
Disclosure Date: July 14, 2022 (last updated February 24, 2025)
The llhttp parser <v14.20.1, <v16.17.1 and <v18.9.1 in the http module in Node.js does not correctly parse and validate Transfer-Encoding headers and can lead to HTTP Request Smuggling (HRS).
0
Attacker Value
Unknown
CVE-2022-32215
Disclosure Date: July 14, 2022 (last updated February 24, 2025)
The llhttp parser <v14.20.1, <v16.17.1 and <v18.9.1 in the http module in Node.js does not correctly handle multi-line Transfer-Encoding headers. This can lead to HTTP Request Smuggling (HRS).
0
Attacker Value
Unknown
CVE-2022-32214
Disclosure Date: July 14, 2022 (last updated February 24, 2025)
The llhttp parser <v14.20.1, <v16.17.1 and <v18.9.1 in the http module in Node.js does not strictly use the CRLF sequence to delimit HTTP requests. This can lead to HTTP Request Smuggling (HRS).
0
Attacker Value
Unknown
CVE-2022-31081
Disclosure Date: June 27, 2022 (last updated February 24, 2025)
HTTP::Daemon is a simple http server class written in perl. Versions prior to 6.15 are subject to a vulnerability which could potentially be exploited to gain privileged access to APIs or poison intermediate caches. It is uncertain how large the risks are, most Perl based applications are served on top of Nginx or Apache, not on the `HTTP::Daemon`. This library is commonly used for local development and tests. Users are advised to update to resolve this issue. Users unable to upgrade may add additional request handling logic as a mitigation. After calling `my $rqst = $conn->get_request()` one could inspect the returned `HTTP::Request` object. Querying the 'Content-Length' (`my $cl = $rqst->header('Content-Length')`) will show any abnormalities that should be dealt with by a `400` response. Expected strings of 'Content-Length' SHOULD consist of either a single non-negative integer, or, a comma separated repetition of that number. (that is `42` or `42, 42, 42`). Anything else MUST be re…
0
Attacker Value
Unknown
CVE-2022-33124
Disclosure Date: June 23, 2022 (last updated February 23, 2025)
AIOHTTP 3.8.1 can report a "ValueError: Invalid IPv6 URL" outcome, which can lead to a Denial of Service (DoS). NOTE: multiple third parties dispute this issue because there is no example of a context in which denial of service would occur, and many common contexts have exception handing in the calling application
0
Attacker Value
Unknown
CVE-2022-30780
Disclosure Date: June 11, 2022 (last updated February 23, 2025)
Lighttpd 1.4.56 through 1.4.58 allows a remote attacker to cause a denial of service (CPU consumption from stuck connections) because connection_read_header_more in connections.c has a typo that disrupts use of multiple read operations on large headers.
0
Attacker Value
Unknown
CVE-2022-31813
Disclosure Date: June 09, 2022 (last updated February 23, 2025)
Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* headers to the origin server based on client side Connection header hop-by-hop mechanism. This may be used to bypass IP based authentication on the origin server/application.
0
Attacker Value
Unknown
CVE-2022-30556
Disclosure Date: June 09, 2022 (last updated February 23, 2025)
Apache HTTP Server 2.4.53 and earlier may return lengths to applications calling r:wsread() that point past the end of the storage allocated for the buffer.
0
Attacker Value
Unknown
CVE-2022-30522
Disclosure Date: June 09, 2022 (last updated February 23, 2025)
If Apache HTTP Server 2.4.53 is configured to do transformations with mod_sed in contexts where the input to mod_sed may be very large, mod_sed may make excessively large memory allocations and trigger an abort.
0